<?xml version='1.0' encoding='utf-8' ?>
<feed xmlns='http://www.w3.org/2005/Atom'>
<title>GitLab All Releases</title>
<id>https://about.gitlab.com/releases</id>
<link href='https://about.gitlab.com/releases/categories/releases/' />
<updated>2024-12-11T00:00:00+00:00</updated>
<author>
<name>The GitLab Team</name>
</author>
<entry>
<title>GitLab Patch Release: 17.6.2, 17.5.4, 17.4.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/12/11/patch-release-gitlab-17-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/12/11/patch-release-gitlab-17-6-2-released/</id>
<published>2024-12-11T00:00:00+00:00</published>
<updated>2024-12-11T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.6.2, 17.5.4, 17.4.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#injection-of-network-error-logging-nel-headers-in-kubernetes-proxy-response-could-lead-to-ato-abusing-oauth-flows&quot;&gt;Injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to account takeover abusing OAuth flows&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-by-repeatedly-sending-unauthenticated-requests-for-diff-files&quot;&gt;Denial of Service by repeatedly sending unauthenticated requests for diff-files&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ci_job_token-could-be-used-to-obtain-gitlab-session&quot;&gt;CI_JOB_TOKEN could be used to obtain GitLab session&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirect-in-releases-api&quot;&gt;Open redirect in releases API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#client-side-path-traversal-in-harbor-artifact-links&quot;&gt;Client-Side Path Traversal in Harbor artifact links&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-injection-in-vulnerability-details-could-lead-to-cross-site-scripting&quot;&gt;HTML injection in vulnerability details could lead to Cross Site Scripting&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#leak-branch-names-of-projects-with-confidential-repository&quot;&gt;Leak branch names of projects with confidential repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#non-member-can-view-unresolved-threads-marked-as-internal-notes&quot;&gt;Non member can view unresolved threads marked as internal notes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#uncontrolled-resource-consumption-through-a-maliciously-crafted--file&quot;&gt;Uncontrolled Resource Consumption through a maliciously crafted  file&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#certain-sensitive-information-passed-as-literals-inside-graphql-mutations-retained-in-graphql-logs&quot;&gt;Certain sensitive information passed as literals inside GraphQL mutations retained in GraphQL logs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#information-disclosure-of-confidential-incidents-details-to-a-group-member-in-gitlab-wiki&quot;&gt;Information disclosure of confidential incidents details to a group member in Gitlab Wiki&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#domain-confusion-in-gitlab-pages-unique-domain-implementation&quot;&gt;Domain Confusion in GitLab Pages Unique Domain Implementation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;injection-of-network-error-logging-nel-headers-in-kubernetes-proxy-response-could-lead-to-ato-abusing-oauth-flows&quot;&gt;Injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to ATO abusing OAuth flows&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.1 before 17.4.6, starting from 17.5 before 17.5.4, and starting from 17.6 before 17.6.2, injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to session data exfiltration.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-11274&quot;&gt;CVE-2024-11274&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-by-repeatedly-sending-unauthenticated-requests-for-diff-files&quot;&gt;Denial of Service by repeatedly sending unauthenticated requests for diff-files&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 9.4 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could cause a denial of service with requests for diff files on a commit or merge request.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 7.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8233&quot;&gt;CVE-2024-8233&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a92847865&quot;&gt;a92847865&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ci_job_token-could-be-used-to-obtain-gitlab-session&quot;&gt;CI_JOB_TOKEN could be used to obtain GitLab session&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.7 before 17.4.6, from 17.5 before 17.5.4, and from 17.6 before 17.6.2. It may have been possible for an attacker with a victim&#x27;s &lt;code&gt;CI_JOB_TOKEN&lt;&#x2F;code&gt; to obtain a GitLab session token belonging to the victim.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-12570&quot;&gt;CVE-2024-12570&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;open-redirect-in-releases-api&quot;&gt;Open redirect in releases API&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions from 11.8 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could potentially perform an open redirect against a given releases API endpoint.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9387&quot;&gt;CVE-2024-9387&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;swiftee&quot;&gt;swiftee&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;client-side-path-traversal-in-harbor-artifact-links&quot;&gt;Client-Side Path Traversal in Harbor artifact links&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab affecting all versions starting 15.2 before 17.4.6, 17.5 before  17.5.4, and 17.6 before 17.6.2. On self hosted installs, it was possible to leak the cross site request forgery (CSRF) token to an external site while the Harbor integration was enabled.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8647&quot;&gt;CVE-2024-8647&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;html-injection-in-vulnerability-details-could-lead-to-cross-site-scripting&quot;&gt;HTML injection in vulnerability details could lead to Cross Site Scripting&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 17.3 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. Improper output encoding could lead to Cross Site Scripting (XSS) if Content Security Policy (CSP) is not enabled.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8179&quot;&gt;CVE-2024-8179&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;leak-branch-names-of-projects-with-confidential-repository&quot;&gt;Leak branch names of projects with confidential repository&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16.9 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. By using a specific GraphQL query, under specific conditions an unauthorised user can retrieve branch names.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8116&quot;&gt;CVE-2024-8116&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;non-member-can-view-unresolved-threads-marked-as-internal-notes&quot;&gt;Non member can view unresolved threads marked as internal notes&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions from 15.0 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2 that allowed non-member users to view unresolved threads marked as internal notes in public projects merge requests.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8650&quot;&gt;CVE-2024-8650&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;salh4ckr&quot;&gt;salh4ckr&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;uncontrolled-resource-consumption-through-a-maliciously-crafted--file&quot;&gt;Uncontrolled Resource Consumption through a maliciously crafted  file&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.9 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2, that allows an attacker to cause uncontrolled resource consumption, potentially leading to a Denial of Service (DoS) condition while parsing templates to generate changelogs.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9367&quot;&gt;CVE-2024-9367&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;l33thaxor&quot;&gt;l33thaxor&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;certain-sensitive-information-passed-as-literals-inside-graphql-mutations-retained-in-graphql-logs&quot;&gt;Certain sensitive information passed as literals inside GraphQL mutations retained in GraphQL logs&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.0 before 17.4.6, starting from 17.5 before 17.5.4, and starting from 17.6 before 17.6.2, where sensitive information passed in GraphQL mutations may have been retained in GraphQL logs.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:L&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:L&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.0).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-12292&quot;&gt;CVE-2024-12292&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;radbatnag&quot;&gt;Radamanthus Batnag&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;information-disclosure-of-confidential-incidents-details-to-a-group-member-in-gitlab-wiki&quot;&gt;Information disclosure of confidential incidents details to a group member in Gitlab Wiki&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 17.4.6, all versions starting from 17.5 before 17.5.4 all versions starting from 17.6 before 17.6.2, that allows group users to view confidential incident title through the Wiki History Diff feature, potentially leading to information disclosure.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-10043&quot;&gt;CVE-2024-10043&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mateuszek&quot;&gt;mateuszek&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;domain-confusion-in-gitlab-pages-unique-domain-implementation&quot;&gt;Domain Confusion in GitLab Pages Unique Domain Implementation&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.3 before 17.4.2, all versions starting from 17.5 before 17.5.4, all versions starting from 17.6 before 17.6.2. This issue allows an attacker to create a group with a name matching an existing unique Pages domain, potentially leading to domain confusion attacks.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9633&quot;&gt;CVE-2024-9633&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;psycho_012&quot;&gt;psycho_012&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1762&quot;&gt;17.6.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2120&quot;&gt;Upgrade to Postgres 16.6 for client libraries, openssl 3.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173193&quot;&gt;Fix 401 errors when installing the GitLab for Jira app&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174008&quot;&gt;Backport &#x27;dattang&#x2F;allow-release-environments-to-fail&#x27; to 17.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174254&quot;&gt;Backport &#x27;always-build-qa-image-for-release-environments&#x27; to 17.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174291&quot;&gt;Add guard clause to Wiki#find_page when title is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174583&quot;&gt;Merge branch &#x27;498768-graphql-subscriptions-ignore-unauthorized-error&#x27; into &#x27;17-6-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174512&quot;&gt;Merge branch &#x27;nd&#x2F;fix-progressbar-progress&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174700&quot;&gt;Backport 17-6 Remove unused matched_lines_count&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174701&quot;&gt;Backport Zoekt indices without zoekt_repositories stuck in initializing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174549&quot;&gt;Backport &#x27;Zoekt: Do not process failed repos&#x27; into 17.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174214&quot;&gt;Bump devfile gem to 0.1.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1754&quot;&gt;17.5.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2121&quot;&gt;Upgrade to Postgres 16.6 for client libraries, openssl 3.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173196&quot;&gt;Fix 401 errors when installing the GitLab for Jira app&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174255&quot;&gt;Backport &#x27;always-build-qa-image-for-release-environments&#x27; to 17.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174581&quot;&gt;Merge branch &#x27;498768-graphql-subscriptions-ignore-unauthorized-error&#x27; into &#x27;17-5-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171140&quot;&gt;Backport https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170141 into 17.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;175190&quot;&gt;Quarantine Custom model features specs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1746&quot;&gt;17.4.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2122&quot;&gt;Upgrade to Postgres 16.6 for client libraries, openssl 3.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173428&quot;&gt;Add param filtering to avoid error while saving project settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173197&quot;&gt;Fix 401 errors when installing the GitLab for Jira app&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174256&quot;&gt;Backport &#x27;always-build-qa-image-for-release-environments&#x27; to 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;174756&quot;&gt;Backport fix for flaky tests in search_results spec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.6.1, 17.5.3, 17.4.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/11/26/patch-release-gitlab-17-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/11/26/patch-release-gitlab-17-6-1-released/</id>
<published>2024-11-26T00:00:00+00:00</published>
<updated>2024-11-26T00:00:00+00:00</updated>
<author>
<name>Ottilia Westerlund</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.6.1, 17.5.3, 17.4.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#privilege-escalation-via-lfs-tokens&quot;&gt;Privilege Escalation via LFS Tokens&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-through-uncontrolled-resource-consumption-when-viewing-a-maliciously-crafted-cargotoml-file&quot;&gt;DoS through uncontrolled resource consumption when viewing a maliciously crafted cargo.toml file.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unintended-access-to-usage-data-via-scoped-tokens&quot;&gt;Unintended access to Usage Data via Scoped Tokens&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-dos-via-harbor-registry-integration&quot;&gt;Gitlab DOS via Harbor registry integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#resource-exhaustion-and-denial-of-service-with-test_report-api-calls&quot;&gt;Resource exhaustion and denial of service with test_report API calls&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#streaming-endpoint-did-not-invalidate-tokens-after-revocation&quot;&gt;Streaming endpoint did not invalidate tokens after revocation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;privilege-escalation-via-lfs-tokens&quot;&gt;Privilege Escalation via LFS Tokens&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 8.12 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. This issue allows an attacker with access to a victim&#x27;s Personal Access Token (PAT) to escalate privileges.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N &lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.2).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8114&quot;&gt;CVE-2024-8114&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dos-through-uncontrolled-resource-consumption-when-viewing-a-maliciously-crafted-cargotoml-file&quot;&gt;DoS through uncontrolled resource consumption when viewing a maliciously crafted cargo.toml file.&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) issue has been discovered in GitLab CE&#x2F;EE affecting all versions prior to 12.6 prior to 17.4.5, 17.5 prior to 17.5.3, and 17.6 prior to 17.6.1. An attacker could cause a denial of service with a crafted cargo.toml file.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8237&quot;&gt;CVE-2024-8237&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;l33thaxor&quot;&gt;l33thaxor&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unintended-access-to-usage-data-via-scoped-tokens&quot;&gt;Unintended Access to Usage Data via Scoped Tokens&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions from 16.9.8 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. Certain API endpoints could potentially allow unauthorized access to sensitive data due to overly broad application of token scopes.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-11669&quot;&gt;CVE-2024-11669&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by a GitLab team member, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;DylanGriffith&quot;&gt;Dylan Griffith&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;gitlab-dos-via-harbor-registry-integration&quot;&gt;Gitlab DOS via Harbor registry integration&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.6 prior to 17.4.5, starting from 17.5 prior to 17.5.3, starting from 17.6 prior to 17.6.1 which could cause Denial of Service via integrating a malicious harbor registry.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8177&quot;&gt;CVE-2024-8177&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a92847865&quot;&gt;a92847865&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;resource-exhaustion-and-denial-of-service-with-test_report-api-calls&quot;&gt;Resource exhaustion and denial of service with test_report API calls&lt;&#x2F;h3&gt;

&lt;p&gt;A denial of service (DoS) condition was discovered in GitLab CE&#x2F;EE affecting all versions from 13.2.4 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-11828&quot;&gt;CVE-2024-11828&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;luryus&quot;&gt;luryus&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;streaming-endpoint-did-not-invalidate-tokens-after-revocation&quot;&gt;Streaming endpoint did not invalidate tokens after revocation&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16.11 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. Long-lived connections could potentially bypass authentication controls, allowing unauthorized access to streaming results.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.2).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-11668&quot;&gt;CVE-2024-11668&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team members, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;DylanGriffith&quot;&gt;Dylan Griffith&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;engwan&quot;&gt;Heinrich Lee Yu&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1761&quot;&gt;17.6.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173427&quot;&gt;Revert &quot;Merge branch &#x27;include-sec-in-sidekiq-worker-attributes-concern&#x27; into &#x27;master&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173288&quot;&gt;Revert &quot;Merge branch &#x27;421376-part-1-move-history-button&#x27; into &#x27;master&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173464&quot;&gt;Backport to 17.6 the fix for sbom ingestion failure when license spdx id is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173593&quot;&gt;Cherry-pick &#x27;jennli-patch-compile-prod-assets-rules&#x27; into 17-6-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1753&quot;&gt;17.5.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172339&quot;&gt;Disable http router in tests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171715&quot;&gt;Ensure auto_merge_enabled is set when validating merge trains&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172391&quot;&gt;Backport Index work items when project visibility level changes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172767&quot;&gt;Backport fix for token revocation to 17.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172871&quot;&gt;Backport Publish AuthorizationsAddedEvent with multiple projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173185&quot;&gt;Make assertion order independent&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;173594&quot;&gt;Cherry-pick &#x27;jennli-patch-compile-prod-assets-rules&#x27; into 17-5-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.6 released with self-hosted Duo Chat in beta</title>
<release>17.6</release>
<link href='https://about.gitlab.com/releases/2024/11/21/gitlab-17-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/11/21/gitlab-17-6-released/</id>
<published>2024-11-21T00:00:00+00:00</published>
<updated>2024-11-21T00:00:00+00:00</updated>
<author>
<name>Magdalena Frankiewicz</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 17.6 with &lt;a href=&quot;#use-self-hosted-model-for-gitlab-duo-chat&quot;&gt;self-hosted Duo Chat in beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#new-adherence-checks-for-sast-and-dast-security-scanners&quot;&gt;adherence checks for SAST and DAST security scanners&lt;&#x2F;a&gt;, &lt;a href=&quot;#vulnerability-report-grouping&quot;&gt;vulnerability report grouping&lt;&#x2F;a&gt;, &lt;a href=&quot;#model-registry-now-generally-available&quot;&gt;generally available model registry&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from nearly 150 improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 265 contributions you provided to GitLab 17.6!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.7 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_6&#x2F;17_6-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.5.2, 17.4.4, 17.3.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/</id>
<published>2024-11-13T00:00:00+00:00</published>
<updated>2024-11-13T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.5.2, 17.4.4, 17.3.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-access-to-kubernetes-cluster-agent&quot;&gt;Unauthorized access to Kubernetes cluster agent&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#device-oauth-flow-allows-for-cross-window-forgery&quot;&gt;Device OAuth flow allows for cross window forgery&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload&quot;&gt;Denial of Service by importing malicious crafted FogBugz import payload&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-through-javascript-url-in-analytics-dashboards&quot;&gt;Stored XSS through javascript URL in Analytics dashboards&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-injection-in-vulnerability-code-flow-could-lead-to-xss-on-self-hosted-instances&quot;&gt;HTML injection in vulnerability Code flow could lead to XSS on self hosted instances&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#information-disclosure-through-an-api-endpoint&quot;&gt;Information disclosure through an API endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;unauthorized-access-to-kubernetes-cluster-agent&quot;&gt;Unauthorized access to Kubernetes cluster agent&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.0 prior to 17.3.7, starting from 17.4 prior to 17.4.4, and starting from 17.5 prior to 17.5.2, which could have allowed unauthorized access to the Kubernetes agent in a cluster under specific configurations.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9693&quot;&gt;CVE-2024-9693&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by a GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;tigerwnz&quot;&gt;Tiger Watson&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;device-oauth-flow-allows-for-cross-window-forgery&quot;&gt;Device OAuth flow allows for cross window forgery&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 17.2 prior to 17.3.7, starting from 17.4 prior to 17.4.4 and starting from 17.5 prior to 17.5.2, which could have allowed an attacker gaining full API access as the victim via the Device OAuth flow.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.8).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-7404&quot;&gt;CVE-2024-7404&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload&quot;&gt;Denial of Service by importing malicious crafted FogBugz import payload&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 7.14.1 prior to 17.3.7, 17.4 prior to 17.4.4, and 17.5 prior to 17.5.2. A denial of service could occur upon importing maliciously crafted content using the Fogbugz importer.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a92847865&quot;&gt;a92847865&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;stored-xss-through-javascript-url-in-analytics-dashboards&quot;&gt;Stored XSS through javascript URL in Analytics dashboards&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. The vulnerability could allow an attacker to inject malicious JavaScript code in Analytics Dashboards through a specially crafted URL.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8648&quot;&gt;CVE-2024-8648&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;html-injection-in-vulnerability-code-flow-could-lead-to-xss-on-self-hosted-instances&quot;&gt;HTML injection in vulnerability Code flow could lead to XSS on self hosted instances&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 17.3 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. Improper output encoding could lead to XSS if CSP is not enabled.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8180&quot;&gt;CVE-2024-8180&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;information-disclosure-through-an-api-endpoint&quot;&gt;Information disclosure through an API endpoint&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 17.3 before 17.3.7, all versions starting from 17.4 before 17.4.4, all versions starting from 17.5 before 17.5.2 in which an unauthenticated user may be able to read some information about an MR in a private project, under certain circumstances.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-10240&quot;&gt;CVE-2024-10240&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;patrickbajao&quot;&gt;Patrick Bajao&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-updates-october-28-2024&quot;&gt;Mattermost Security Updates October 28, 2024&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost has been updated to versions 10.1.2, which contains several patches and security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1752&quot;&gt;17.5.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170051&quot;&gt;Security patch upgrade alert: Only expose to admins 17-5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170814&quot;&gt;[backport] Add epic to the scope and fix the flaky spec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170641&quot;&gt;[Backport] Fix indexing subgroup associations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170777&quot;&gt;Skip creating tables as partitions if any partition exists&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170058&quot;&gt;Add knn index setting for workitem index for opensearch clusters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;169904&quot;&gt;[Backport]Fix new project group templates pagination&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170981&quot;&gt;Update pdf worker file path in pdf viewer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170961&quot;&gt;[backport] Fix issue label facet can overwrite selected labels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171634&quot;&gt;Fix workitem job in 17-5-stable-ee branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171703&quot;&gt;[Backport] Go-get: return 404 error code when personal token is invalid&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171554&quot;&gt;Add param filtering to avoid error while saving project settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171926&quot;&gt;Skip multi-version upgrade migration spec on default branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171891&quot;&gt;Fix group wiki activity events breaking the user feed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172133&quot;&gt;Destroy merge train car after branch deletion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171585&quot;&gt;Backport: Remove permissions JSONB column from the condition&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1744&quot;&gt;17.4.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7400&quot;&gt;Backport fix for incorrect error classification to 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7414&quot;&gt;Backport 17-4: Update GoCloud to a version that supports s3ForcePathStyle&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170209&quot;&gt;Use dump from 17.3.5 since 17.3 is the previous required stop&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170055&quot;&gt;Security patch upgrade alert: Only expose to admins 17-4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171630&quot;&gt;Fix workitem job in 17-4-stable-ee branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171784&quot;&gt;Don&#x27;t run e2e:test-product-analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171736&quot;&gt;Ensure auto_merge_enabled is set when validating merge trains&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172134&quot;&gt;Destroy merge train car after branch deletion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;172135&quot;&gt;Fix broken merge train merge when target branch deleted&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171586&quot;&gt;Backport: Remove permissions JSONB column from the condition&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170978&quot;&gt;Update pdf worker file path in pdf viewer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1737&quot;&gt;17.3.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7396&quot;&gt;Backport dragonboat&#x27;s file permission error to 17.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170208&quot;&gt;Use dump from 16.11.8 since 16.11 is the previous required stop&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;171632&quot;&gt;Fix workitem job in 17-3-stable-ee branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.5.1, 17.4.3, 17.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/10/23/patch-release-gitlab-17-5-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/10/23/patch-release-gitlab-17-5-1-released/</id>
<published>2024-10-23T00:00:00+00:00</published>
<updated>2024-10-23T00:00:00+00:00</updated>
<author>
<name>Kevin Morrison</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.5.1, 17.4.3, 17.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-injection-in-global-search-may-lead-to-xss&quot;&gt;HTML injection in Global Search may lead to XSS&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-via-xml-manifest-file-import&quot;&gt;DoS via XML manifest file import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;html-injection-in-global-search-may-lead-to-xss&quot;&gt;HTML injection in Global Search may lead to XSS&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 15.10 before 17.3.6, 17.4 before 17.4.3, and 17.5 before 17.5.1. An attacker could inject HTML into the Global Search field on a diff view leading to XSS.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8312&quot;&gt;CVE-2024-8312&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dos-via-xml-manifest-file-import&quot;&gt;DoS via XML manifest file import&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 11.2 before 17.3.6, 17.4 before 17.4.3, and 17.5 before 17.5.1. A denial of service could occur via importing a malicious crafted XML manifest file.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6826&quot;&gt;CVE-2024-6826&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a92847865&quot;&gt;a92847865&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-regarding-helm-charts-devkit-and-analytics-stack&quot;&gt;Update regarding helm charts, devkit and analytics stack&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;code&gt;Helm charts&lt;&#x2F;code&gt;, &lt;code&gt;devkit&lt;&#x2F;code&gt; and &lt;code&gt;analytics stack&lt;&#x2F;code&gt; have been patched to no longer support dynamic funnels.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;bump-ingress-nginx-controller-image-to-1112&quot;&gt;Bump Ingress NGINX Controller image to 1.11.2&lt;&#x2F;h3&gt;

&lt;p&gt;The GitLab chart bundles a forked Ingress NGINX Controller subchart. We&#x27;ve updated its image version to 1.11.2.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1751&quot;&gt;17.5.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;170051&quot;&gt;Security patch upgrade alert: Only expose to admins&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7995&quot;&gt;Backport: Ensure postgresql_new is included in GitLab CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1743&quot;&gt;17.4.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2058&quot;&gt;Resolve &quot;UBI FIPS: Error in bashrc due to hardening script&quot; (17.4)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2044&quot;&gt;Backport: fix: Allow non-root user to run the bundle-certificates script 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7351&quot;&gt;Backport gocloud.dev update to 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7362&quot;&gt;Backport bundle fetch fsck fix to 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168691&quot;&gt;Backport Stable Branch Danger Checks to 17-4-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168669&quot;&gt;Add version to pdf.js file in webpack builds&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168793&quot;&gt;Backport: Skip rspec fail-fast jobs if pipeline:skip-rspec-fail-fast label is set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168569&quot;&gt;Backport fix Zoekt global code search&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168776&quot;&gt;Set author on issuable to current user if it is not already set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;169190&quot;&gt;Backport LabKit v1.21.2 update to fix broken dependency&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;169625&quot;&gt;Fix broken duo chat spec after free access cutoff [17.4]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7998&quot;&gt;Backport: Ensure postgresql_new is included in GitLab CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1736&quot;&gt;17.3.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2057&quot;&gt;Resolve &quot;UBI FIPS: Error in bashrc due to hardening script&quot; (17.3)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7339&quot;&gt;Backport CreateRepositoryFromURL error handling to 17.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168938&quot;&gt;Set author on issuable to current user if it is not already set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;169627&quot;&gt;Fix broken duo chat spec after free access cutoff [17.3]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168818&quot;&gt;Backport Stable Branch Danger Checks to 17-3-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.5 released with Duo Quick Chat AI code assistance.</title>
<release>17.5</release>
<link href='https://about.gitlab.com/releases/2024/10/17/gitlab-17-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/10/17/gitlab-17-5-released/</id>
<published>2024-10-17T00:00:00+00:00</published>
<updated>2024-10-17T00:00:00+00:00</updated>
<author>
<name>John Crowley</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 17.5 with &lt;a href=&quot;#introducing-duo-quick-chat&quot;&gt;code assistance in IDEs from GitLab Duo Quick Chat&lt;&#x2F;a&gt;, &lt;a href=&quot;#use-self-hosted-model-for-gitlab-duo-code-suggestions&quot;&gt;self-hosted models for GitLab Duo Code Suggestions&lt;&#x2F;a&gt;, &lt;a href=&quot;#export-code-suggestion-usage-events&quot;&gt;export code suggestion usage events&lt;&#x2F;a&gt;, &lt;a href=&quot;#have-a-conversation-with-gitlab-duo-chat-about-your-merge-request&quot;&gt;MR conversations with GitLab Duo Chat&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 125+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 200 contributions you provided to GitLab 17.5!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.6 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_5&#x2F;17_5-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/10/09/patch-release-gitlab-17-4-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/10/09/patch-release-gitlab-17-4-2-released/</id>
<published>2024-10-09T00:00:00+00:00</published>
<updated>2024-10-09T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.4.2, 17.3.5, 17.2.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. &lt;strong&gt;GitLab Dedicated customers do not need to take action.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#run-pipelines-on-arbitrary-branches&quot;&gt;Run pipelines on arbitrary branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#an-attacker-can-impersonate-arbitrary-user&quot;&gt;An attacker can impersonate arbitrary user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ssrf-in-analytics-dashboard&quot;&gt;SSRF in Analytics Dashboard&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#viewing-diffs-of-mr-with-conflicts-can-be-slow&quot;&gt;Viewing diffs of MR with conflicts can be slow&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#htmli-in--oauth-page&quot;&gt;HTMLi in  OAuth page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#deploy-keys-can-push-changes-to-an-archived-repository&quot;&gt;Deploy Keys can push changes to an archived repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guests-can-disclose-project-templates&quot;&gt;Guests can disclose project templates&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-instance-version-disclosed-to-unauthorized-users&quot;&gt;GitLab instance version disclosed to unauthorized users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;run-pipelines-on-arbitrary-branches&quot;&gt;Run pipelines on arbitrary branches&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches.
This is a critical severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 9.6).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9164&quot;&gt;CVE-2024-9164&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;an-attacker-can-impersonate-arbitrary-user&quot;&gt;An attacker can impersonate arbitrary user&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.6 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.2).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8970&quot;&gt;CVE-2024-8970&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ssrf-in-analytics-dashboard&quot;&gt;SSRF in Analytics Dashboard&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.2).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8977&quot;&gt;CVE-2024-8977&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;viewing-diffs-of-mr-with-conflicts-can-be-slow&quot;&gt;Viewing diffs of MR with conflicts can be slow&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.6 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, were viewing diffs of MR with conflicts can be slow. This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9631&quot;&gt;CVE-2024-9631&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a92847865&quot;&gt;a92847865&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;htmli-in-oauth-page&quot;&gt;HTMLi in OAuth page&lt;&#x2F;h3&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When authorising a new application, it can be made to render as HTML under specific circumstances.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 7.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6530&quot;&gt;CVE-2024-6530&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;deploy-keys-can-push-changes-to-an-archived-repository&quot;&gt;Deploy Keys can push changes to an archived repository&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository. This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.9).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9623&quot;&gt;CVE-2024-9623&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;stevenorman&quot;&gt;stevenorman&lt;&#x2F;a&gt; for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;guests-can-disclose-project-templates&quot;&gt;Guests can disclose project templates&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered discovered in GitLab EE&#x2F;CE affecting all versions starting from 11.4 before 17.2.9, all versions starting from 17.3 before 17.3.5, all versions starting from 17.4 before 17.4.2 It was possible for guest users to disclose project templates using the API.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5005&quot;&gt;CVE-2024-5005&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;gitlab-instance-version-disclosed-to-unauthorized-users&quot;&gt;GitLab instance version disclosed to unauthorized users&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. It was possible for an unauthenticated attacker to determine the GitLab version number for a GitLab instance.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 3.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-9596&quot;&gt;CVE-2024-9596&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;pgascouvaillancourt&quot;&gt;Paul Gascou-Vaillancourt&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1742&quot;&gt;17.4.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2041&quot;&gt;Backport: fix: Specify an absolute directory for SCHEMA_VERSIONS_DIR to 17-4-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7323&quot;&gt;Backport grpc-go v1.67.1 upgrade to 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;167033&quot;&gt;Update expected vulnerability in enable_advanced_sast_spec.rb&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166877&quot;&gt;Skip multi-version upgrade job for stable branch MRs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168099&quot;&gt;Backport 17.4 Fix label filter by name for search&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168238&quot;&gt;Restrict duo pro assignment email to duo pro for sm&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168156&quot;&gt;Drop project_id not null constraint ci_deleted_objects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;167937&quot;&gt;[Backport] Go-get: fix 401 error for unauthenticated requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1735&quot;&gt;17.3.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2042&quot;&gt;Backport: fix: Specify an absolute directory for SCHEMA_VERSIONS_DIR to 17-3-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2045&quot;&gt;Backport: fix: Allow non-root user to run the bundle-certificates script 17.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166881&quot;&gt;Skip multi-version upgrade job for stable branch MRs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168015&quot;&gt;Ensure restricted visibility levels is an array - 17.3 backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1729&quot;&gt;17.2.9&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166883&quot;&gt;Skip multi-version upgrade job for stable branch MRs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;168016&quot;&gt;Ensure restricted visibility levels is an array - 17.2 backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.4.1, 17.3.4, 17.2.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/09/25/patch-release-gitlab-17-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/25/patch-release-gitlab-17-4-1-released/</id>
<published>2024-09-25T00:00:00+00:00</published>
<updated>2024-09-25T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.4.1, 17.3.4, 17.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below be &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-dependency-proxy-password-by-changing-dependency-proxy-url-via-crafted-post-request&quot;&gt;Maintainer can leak Dependency Proxy password by changing Dependency Proxy URL via crafted POST request&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ai-feature-reads-unsanitized-content-allowing-for-attacker-to-hide-prompt-injection&quot;&gt;AI feature reads unsanitized content, allowing for attacker to hide prompt injection&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-reference-can-be-exposed-in-system-notes&quot;&gt;Project reference can be exposed in system notes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;maintainer-can-leak-dependency-proxy-password-by-changing-dependency-proxy-url-via-crafted-post-request&quot;&gt;Maintainer can leak Dependency Proxy password by changing Dependency Proxy URL via crafted POST request&lt;&#x2F;h3&gt;

&lt;p&gt;An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting via a POST request.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4278&quot;&gt;CVE-2024-4278&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ac7n0w&quot;&gt;ac7n0w&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ai-feature-reads-unsanitized-content-allowing-for-attacker-to-hide-prompt-injection&quot;&gt;AI feature reads unsanitized content, allowing for attacker to hide prompt injection&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. An AI feature was found to read unsanitized content in a way that could&#x27;ve allowed an attacker to hide prompt injection.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4099&quot;&gt;CVE-2024-4099&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-reference-can-be-exposed-in-system-notes&quot;&gt;Project reference can be exposed in system notes&lt;&#x2F;h3&gt;

&lt;p&gt;An information disclosure issue has been discovered in Gitlab EE&#x2F;CE affecting all versions from 15.6 prior to 17.2.8, 17.3 prior to 17.3.4, and 17.4 prior to 17.4.1. In specific conditions it was possible to disclose the path of a private project to an unauthorized user.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 2.6).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8974&quot;&gt;CVE-2024-8974&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;leipert&quot;&gt;Lukas Eipert&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-updates-august-27-2024&quot;&gt;Mattermost Security Updates August 27, 2024&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost has been updated to version 9.11.1, which contains several patches and security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1741&quot;&gt;17.4.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166427&quot;&gt;Improve OpenSSL callout message&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166564&quot;&gt;Change urgency of API project&#x2F;:id&#x2F;share to &lt;code&gt;low&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166363&quot;&gt;Check commit message for issue close pattern setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166540&quot;&gt;Backport: Fixes issues with incorrectly displaying VR button&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166694&quot;&gt;Backport &#x27;Fix incorrect gitlab-shell-check filename&#x27; into 17.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166933&quot;&gt;Update OpenSSL v3 callout to delay update to GitLab 17.7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1734&quot;&gt;17.3.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166181&quot;&gt;Improve OpenSSL callout message&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166302&quot;&gt;Fix Code Review AI features policies to check duo features enabled toggle&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166934&quot;&gt;Update OpenSSL v3 callout to delay update to GitLab 17.7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1728&quot;&gt;17.2.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166183&quot;&gt;Improve OpenSSL callout message&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166935&quot;&gt;Update OpenSSL v3 callout to delay update to GitLab 17.7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Patch Release: 16.10.10, 16.9.11, 16.8.10, 16.7.10, 16.6.10, 16.5.10, 16.4.7, 16.3.9, 16.2.11, 16.1.8, 16.0.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/09/25/patch-release-gitlab-16-10-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/25/patch-release-gitlab-16-10-10-released/</id>
<published>2024-09-25T00:00:00+00:00</published>
<updated>2024-09-25T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.10.10, 16.9.11, 16.8.10, 16.7.10, 16.6.10, 16.5.10, 16.4.7, 16.3.9, 16.2.11, 16.1.8, and 16.0.10 for GitLab Community Edition (CE) and Enterprise Edition (EE). This extends the security fixes previously added to 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10.&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain backports of an important security fix which was previously &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2024&#x2F;09&#x2F;17&#x2F;patch-release-gitlab-17-3-3-released&#x2F;&quot;&gt;released for GitLab versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, and 16.11.10&lt;&#x2F;a&gt;.
We strongly recommend that all affected self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;p&gt;Special thanks goes to Roger Meier (@bufferoverflow) who originally created the merge request in Canonical.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issue described below be &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#saml-authentication-bypass&quot;&gt;SAML authentication bypass&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;saml-authentication-bypass&quot;&gt;SAML authentication bypass&lt;&#x2F;h3&gt;

&lt;p&gt;Updates dependencies &lt;code&gt;omniauth-saml&lt;&#x2F;code&gt; to version 2.2.1 and &lt;code&gt;ruby-saml&lt;&#x2F;code&gt; to 1.17.0 to mitigate &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;. This security vulnerability applies only to instances which
have configured SAML based authentication.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;self-managed-gitlab-known-mitigations&quot;&gt;Self Managed GitLab: Known Mitigations&lt;&#x2F;h4&gt;

&lt;p&gt;The following mitigation for self-managed GitLab installations prevents successful exploitation of &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Enable GitLab &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;account&#x2F;two_factor_authentication.html&quot;&gt;two-factor authentication&lt;&#x2F;a&gt; for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;two_factor_authentication.html#enforce-2fa-for-all-users&quot;&gt;all user accounts&lt;&#x2F;a&gt; on the GitLab self-managed instance (NOTE: Enabling identity provider multi-factor authentication does not mitigate this vulnerability) &lt;strong&gt;and&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Do not allow the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#bypass-two-factor-authentication&quot;&gt;SAML two-factor bypass&lt;&#x2F;a&gt; option in GitLab.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h4 id=&quot;self-managed-gitlab-identifying--detecting-exploitation-attempts&quot;&gt;Self Managed GitLab: Identifying &amp;amp; Detecting Exploitation Attempts&lt;&#x2F;h4&gt;

&lt;p&gt;Evidence of attempted or successful exploitation of Ruby-SAML (&lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;) will be present in the GitLab &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;logs&#x2F;#application_jsonlog&quot;&gt;application_json&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;logs&#x2F;#auth_jsonlog&quot;&gt;auth_json&lt;&#x2F;a&gt; log files.&lt;&#x2F;p&gt;

&lt;h5 id=&quot;unsuccessful-exploit-attempt---hunting&quot;&gt;Unsuccessful Exploit Attempt - Hunting&lt;&#x2F;h5&gt;

&lt;p&gt;Unsuccessful exploitation attempts may generate a &lt;code&gt;ValidationError&lt;&#x2F;code&gt; from the &lt;code&gt;RubySaml&lt;&#x2F;code&gt; library. This could be for a variety of reasons related to the complexity of crafting a working exploit.&lt;&#x2F;p&gt;

&lt;p&gt;Two examples are shown below, but the error may manifest with other descriptions. The common string to search for is &lt;code&gt;RubySaml::ValidationError&lt;&#x2F;code&gt; inside the application_json log.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Invalid ticket due to incorrect callback URL
    &lt;ol&gt;
      &lt;li&gt;Example log event:&lt;&#x2F;li&gt;
      &lt;li&gt;&lt;code&gt;{&quot;severity&quot;:&quot;ERROR&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, The response was received at https:&#x2F;&#x2F;domain.com&#x2F;users&#x2F;auth&#x2F;saml&#x2F;incorrect_callback instead of https:&#x2F;&#x2F;domain.com&#x2F;users&#x2F;auth&#x2F;saml&#x2F;callback&quot;}&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;Invalid ticket due to a certificate signing issue
    &lt;ol&gt;
      &lt;li&gt;Example log event:&lt;&#x2F;li&gt;
      &lt;li&gt;&lt;code&gt;&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, Fingerprint mismatch&quot;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h5 id=&quot;successful-exploitation---hunting&quot;&gt;Successful Exploitation - Hunting&lt;&#x2F;h5&gt;

&lt;p&gt;Successful exploitation attempts will trigger SAML related log events. However, there may be differences that make an exploit attempt unique from legitimate SAML authentication events.&lt;&#x2F;p&gt;

&lt;p&gt;A successful exploitation attempt will log whatever extern_id value is set by the attacker attempting exploitation. Therefore, identifying a unique extern_uid that is not common in your organization could be an indicator of potential exploitation.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Example exploit authentication event in the application_json log file, with a extern_id set in exploit PoC code:
    &lt;ol&gt;
      &lt;li&gt;Log event:&lt;&#x2F;li&gt;
      &lt;li&gt;&lt;code&gt;{&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip&#x2F;0.0.0.0&quot;,&quot;message&quot;:&quot;(SAML) saving user exploit-test-user@domain.com from login with admin =\\u003e false, extern_uid =\\u003e exploit-test-user&quot;}&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;When crafting an exploit, there are many &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#configure-assertions&quot;&gt;SAML assertions&lt;&#x2F;a&gt; an attacker would need to craft to perfectly replicate a legitimate login. These include both the key and value fields that you specify at your IdP, and may be unknown to unauthorized individuals - especially if you have customized these attributes.&lt;&#x2F;p&gt;

&lt;p&gt;You can review your auth_json log file to look for SAML responses with incorrect or missing information in the &lt;code&gt;attributes&lt;&#x2F;code&gt; section.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Example of a SAML authentication event in the auth_json log file.
    &lt;ol&gt;
      &lt;li&gt;&lt;code&gt;&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip&#x2F;0.0.0.0&quot;,&quot;payload_type&quot;:&quot;saml_response&quot;: {&quot;issuer&quot;: [&quot;xxx&quot;],&quot;name_id&quot;: &quot;xxx&quot;,&quot;name_id_format&quot;: &quot;xxx&quot;,&quot;name_id_spnamequalifier&quot;: null,&quot;name_id_namequalifier&quot;: null,&quot;destination&quot;: &quot;xxx&quot;,&quot;audiences&quot;: [&quot;xxx&quot;],&quot;attributes&quot;: {&quot;first_name&quot;: [&quot;xxx&quot;],&quot;last_name&quot;: [&quot;yyy&quot;], &quot;email&quot;: [&quot;zzz&quot;]}}&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h5 id=&quot;detecting-exploitation-attempts&quot;&gt;Detecting Exploitation Attempts&lt;&#x2F;h5&gt;

&lt;p&gt;For self managed customers forwarding GitLab application_json logs to a SIEM, creating detections to detect Ruby-SAML (&lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;) exploitation attempts is possible. Our team is sharing two threat detections rules, written in Sigma format, to detect potential exploitation.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; These detections may need to be tuned and modified to customer environments in order to deliver effective results, and due to varying configurations of different customer environments, customers should validate the legitimacy and accuracy of any events identified by these detections.&lt;&#x2F;p&gt;

&lt;h5 id=&quot;users-with-more-than-1-unique-extern_uid-over-time&quot;&gt;Users with more than 1 unique extern_uid over time&lt;&#x2F;h5&gt;

&lt;p&gt;This detection is designed to identify an authenticated SAML user with more than one extern_uid values linked to authentication events, a potential indication of malicious authentications with an attacker set extern_uid field.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;title: Multiple extern_ids
description: Detects when their are multiple extern_id&#x27;s associated with a user.
author: Gitlab Security Engineering
date: 09&#x2F;15&#x2F;2024
schedule: &quot;*&#x2F;10 * * * *&quot;
pseudocode: |
  select log source application.log
  where 7d &amp;lt; event_time &amp;lt; now()
  where severity=&quot;INFO&quot; and meta_caller_id=&quot;Groups::OmniauthCallbacksController#group_saml&quot;
  regex(message, &quot;saving user (?&amp;lt;user_email&amp;gt;\S+) .*extern_uid \S+ (?&amp;lt;extern_id&amp;gt;[\S]+)&quot;)
  count extern_id by user_email as total_extern_ids
  where total_extern_ids &amp;gt; 1
verify: Review Gitlab application logs for the source IP of the SAML authentications. If there is a singular IP for all extern_ids this could point to a false positive. Cross reference the SAML authentication source IP&#x2F;s with the known user&#x27;s IP from sso authentication logs.
tuning: N&#x2F;A
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h5 id=&quot;gitlab-saml-authentication-from-a-different-ip-address-than-other-idp-events-for-the-same-user-over-time&quot;&gt;GitLab SAML authentication from a different IP address than other iDP events for the same user over time&lt;&#x2F;h5&gt;

&lt;p&gt;This detection is designed to correlate authentication events, grouped by user, against both GitLab SAML authentication events as well as other iDP authentication events in an effort to identify any change in user IP address, which could be an indication of attacker authentication sessions.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;title: Gitlab SAML IP differs from SSO IP
description: Detects when the source IP for the SAML authentication to Gitlab from application.log differs from the users known IP from SSO MFA logs.
author: Gitlab Security Engineering
date: 09&#x2F;15&#x2F;2024
schedule: &quot;*&#x2F;10 * * * *&quot;
pseudocode: |
  select log source application.log
  where severity=&quot;INFO&quot; and meta_caller_id=&quot;Groups::OmniauthCallbacksController#group_saml&quot;
  regex(message, &quot;saving user (?&amp;lt;user_email&amp;gt;\S+) &quot;)
  #Create sub-query to bring in table from SSO authentication data
  select meta_remote_ip, user_email
  where user_email in
    (
    select log source authentication
    where 1d &amp;lt; event_time &amp;lt; now()
    where event_type=&quot;user.authentication.auth_via_mfa&quot;
    group by user_email, sso_source_ip
    )
  where sso_source_ip!=meta_remote_ip
verify: False positives can arise when the user is traveling. Review SSO authentication logs to see if the geo-location is similar to the SAML authentication to Gitlab. If any discrepancies are found, reach out to the user for verification. If the user is not traveling, temporarily lock the user&#x27;s Gitlab account and review their activity through Gitlab&#x27;s application logs.
tuning: If the query is producing high false positives, consider using geolocation functions on IPs to compare the cities and countries that are generating the authentications.
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.4 released with improved context in GitLab Duo</title>
<release>17.4</release>
<link href='https://about.gitlab.com/releases/2024/09/19/gitlab-17-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/19/gitlab-17-4-released/</id>
<published>2024-09-19T00:00:00+00:00</published>
<updated>2024-09-19T00:00:00+00:00</updated>
<author>
<name>Alex Martin</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 17.4 with &lt;a href=&quot;#more-context-aware-gitlab-duo-code-suggestions-using-open-tabs&quot;&gt;more context-aware Code Suggestions using open tabs&lt;&#x2F;a&gt;, &lt;a href=&quot;#auto-merge-when-all-checks-pass&quot;&gt;auto-merging when all checks pass&lt;&#x2F;a&gt;, &lt;a href=&quot;#extension-marketplace-now-available-in-the-web-ide&quot;&gt;extension marketplace in the Web IDE&lt;&#x2F;a&gt;, &lt;a href=&quot;#advanced-sast-is-generally-available&quot;&gt;Advanced SAST generally available&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 140+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 220+ contributions you provided to GitLab 17.4!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month&#x27;s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.5 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_4&#x2F;17_4-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Patch Release: 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-released/</id>
<published>2024-09-17T00:00:00+00:00</published>
<updated>2024-09-17T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;All GitLab Dedicated instances have been upgraded and customers do not need to take action.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;p&gt;Version 17.2.6 has been used to remediate GitLab Dedicated and hasn&#x27;t been made public. Version 17.2.7 contains identical changes.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#saml-authentication-bypass&quot;&gt;SAML authentication bypass&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;saml-authentication-bypass&quot;&gt;SAML authentication bypass&lt;&#x2F;h3&gt;

&lt;p&gt;Updates dependencies &lt;code&gt;omniauth-saml&lt;&#x2F;code&gt; to version 2.2.1 and &lt;code&gt;ruby-saml&lt;&#x2F;code&gt; to 1.17.0 to mitigate &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;. This security vulnerability applies only to instances which
have configured SAML based authentication.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;self-managed-gitlab-known-mitigations&quot;&gt;Self Managed GitLab: Known Mitigations&lt;&#x2F;h4&gt;

&lt;p&gt;The following mitigation for self-managed GitLab installations prevents successful exploitation of &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;
&lt;ol&gt;
  &lt;li&gt;Enable GitLab &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;account&#x2F;two_factor_authentication.html&quot;&gt;two-factor authentication&lt;&#x2F;a&gt; for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;two_factor_authentication.html#enforce-2fa-for-all-users&quot;&gt;all user accounts&lt;&#x2F;a&gt; on the GitLab self-managed instance (NOTE: Enabling identity provider multi-factor authentication does not mitigate this vulnerability) &lt;strong&gt;and&lt;&#x2F;strong&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Do not allow the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#bypass-two-factor-authentication&quot;&gt;SAML two-factor bypass&lt;&#x2F;a&gt; option in GitLab.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h4 id=&quot;self-managed-gitlab-identifying--detecting-exploitation-attempts&quot;&gt;Self Managed GitLab: Identifying &amp;amp; Detecting Exploitation Attempts&lt;&#x2F;h4&gt;

&lt;p&gt;Evidence of attempted or successful exploitation of Ruby-SAML (&lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;) will be present in the GitLab &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;logs&#x2F;#application_jsonlog&quot;&gt;application_json&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;logs&#x2F;#auth_jsonlog&quot;&gt;auth_json&lt;&#x2F;a&gt; log files.&lt;&#x2F;p&gt;

&lt;h5 id=&quot;unsuccessful-exploit-attempt---hunting&quot;&gt;Unsuccessful Exploit Attempt - Hunting&lt;&#x2F;h5&gt;

&lt;p&gt;Unsuccessful exploitation attempts may generate a &lt;code&gt;ValidationError&lt;&#x2F;code&gt; from the &lt;code&gt;RubySaml&lt;&#x2F;code&gt; library. This could be for a variety of reasons related to the complexity of crafting a working exploit.&lt;&#x2F;p&gt;

&lt;p&gt;Two examples are shown below, but the error may manifest with other descriptions. The common string to search for is &lt;code&gt;RubySaml::ValidationError&lt;&#x2F;code&gt; inside the application_json log.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Invalid ticket due to incorrect callback URL
    &lt;ol&gt;
      &lt;li&gt;Example log event:&lt;&#x2F;li&gt;
      &lt;li&gt;&lt;code&gt;{&quot;severity&quot;:&quot;ERROR&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, The response was received at https:&#x2F;&#x2F;domain.com&#x2F;users&#x2F;auth&#x2F;saml&#x2F;incorrect_callback instead of https:&#x2F;&#x2F;domain.com&#x2F;users&#x2F;auth&#x2F;saml&#x2F;callback&quot;}&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;Invalid ticket due to a certificate signing issue
    &lt;ol&gt;
      &lt;li&gt;Example log event:&lt;&#x2F;li&gt;
      &lt;li&gt;&lt;code&gt;&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, Fingerprint mismatch&quot;&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h5 id=&quot;successful-exploitation---hunting&quot;&gt;Successful Exploitation - Hunting&lt;&#x2F;h5&gt;

&lt;p&gt;Successful exploitation attempts will trigger SAML related log events. However, there may be differences that make an exploit attempt unique from legitimate SAML authentication events.&lt;&#x2F;p&gt;

&lt;p&gt;A successful exploitation attempt will log whatever extern_id value is set by the attacker attempting exploitation. Therefore, identifying a unique extern_uid that is not common in your organization could be an indicator of potential exploitation.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Example exploit authentication event in the application_json log file, with a extern_id set in exploit PoC code:
    &lt;ol&gt;
      &lt;li&gt;Log event:&lt;&#x2F;li&gt;
      &lt;li&gt;&lt;code&gt;{&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip&#x2F;0.0.0.0&quot;,&quot;message&quot;:&quot;(SAML) saving user exploit-test-user@domain.com from login with admin =\\u003e false, extern_uid =\\u003e exploit-test-user&quot;}&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;When crafting an exploit, there are many &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#configure-assertions&quot;&gt;SAML assertions&lt;&#x2F;a&gt; an attacker would need to craft to perfectly replicate a legitimate login. These include both the key and value fields that you specify at your IdP, and may be unknown to unauthorized individuals - especially if you have customized these attributes.&lt;&#x2F;p&gt;

&lt;p&gt;You can review your auth_json log file to look for SAML responses with incorrect or missing information in the &lt;code&gt;attributes&lt;&#x2F;code&gt; section.&lt;&#x2F;p&gt;
&lt;ol&gt;
  &lt;li&gt;Example of a SAML authentication event in the auth_json log file.
    &lt;ol&gt;
      &lt;li&gt;&lt;code&gt;&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip&#x2F;0.0.0.0&quot;,&quot;payload_type&quot;:&quot;saml_response&quot;: {&quot;issuer&quot;: [&quot;xxx&quot;],&quot;name_id&quot;: &quot;xxx&quot;,&quot;name_id_format&quot;: &quot;xxx&quot;,&quot;name_id_spnamequalifier&quot;: null,&quot;name_id_namequalifier&quot;: null,&quot;destination&quot;: &quot;xxx&quot;,&quot;audiences&quot;: [&quot;xxx&quot;],&quot;attributes&quot;: {&quot;first_name&quot;: [&quot;xxx&quot;],&quot;last_name&quot;: [&quot;yyy&quot;], &quot;email&quot;: [&quot;zzz&quot;]}}&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h5 id=&quot;detecting-exploitation-attempts&quot;&gt;Detecting Exploitation Attempts&lt;&#x2F;h5&gt;

&lt;p&gt;For self managed customers forwarding GitLab application_json logs to a SIEM, creating detections to detect Ruby-SAML (&lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-45409&quot;&gt;CVE-2024-45409&lt;&#x2F;a&gt;) exploitation attempts is possible. Our team is sharing two threat detections rules, written in Sigma format, to detect potential exploitation.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; These detections may need to be tuned and modified to customer environments in order to deliver effective results, and due to varying configurations of different customer environments, customers should validate the legitimacy and accuracy of any events identified by these detections.&lt;&#x2F;p&gt;

&lt;h5 id=&quot;users-with-more-than-1-unique-extern_uid-over-time&quot;&gt;Users with more than 1 unique extern_uid over time&lt;&#x2F;h5&gt;

&lt;p&gt;This detection is designed to identify an authenticated SAML user with more than one extern_uid values linked to authentication events, a potential indication of malicious authentications with an attacker set extern_uid field.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;title: Multiple extern_ids
description: Detects when their are multiple extern_id&#x27;s associated with a user. 
author: Gitlab Security Engineering
date: 09&#x2F;15&#x2F;2024
schedule: &quot;*&#x2F;10 * * * *&quot;
pseudocode: |
  select log source application.log
  where 7d &amp;lt; event_time &amp;lt; now()
  where severity=&quot;INFO&quot; and meta_caller_id=&quot;Groups::OmniauthCallbacksController#group_saml&quot;
  regex(message, &quot;saving user (?&amp;lt;user_email&amp;gt;\S+) .*extern_uid \S+ (?&amp;lt;extern_id&amp;gt;[\S]+)&quot;)
  count extern_id by user_email as total_extern_ids
  where total_extern_ids &amp;gt; 1
verify: Review Gitlab application logs for the source IP of the SAML authentications. If there is a singular IP for all extern_ids this could point to a false positive. Cross reference the SAML authentication source IP&#x2F;s with the known user&#x27;s IP from sso authentication logs. 
tuning: N&#x2F;A
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h5 id=&quot;gitlab-saml-authentication-from-a-different-ip-address-than-other-idp-events-for-the-same-user-over-time&quot;&gt;GitLab SAML authentication from a different IP address than other iDP events for the same user over time&lt;&#x2F;h5&gt;

&lt;p&gt;This detection is designed to correlate authentication events, grouped by user, against both GitLab SAML authentication events as well as other iDP authentication events in an effort to identify any change in user IP address, which could be an indication of attacker authentication sessions.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;title: Gitlab SAML IP differs from SSO IP
description: Detects when the source IP for the SAML authentication to Gitlab from application.log differs from the users known IP from SSO MFA logs. 
author: Gitlab Security Engineering
date: 09&#x2F;15&#x2F;2024
schedule: &quot;*&#x2F;10 * * * *&quot;
pseudocode: |
  select log source application.log 
  where severity=&quot;INFO&quot; and meta_caller_id=&quot;Groups::OmniauthCallbacksController#group_saml&quot;
  regex(message, &quot;saving user (?&amp;lt;user_email&amp;gt;\S+) &quot;)
  #Create sub-query to bring in table from SSO authentication data
  select meta_remote_ip, user_email
  where user_email in
    (
    select log source authentication
    where 1d &amp;lt; event_time &amp;lt; now()
    where event_type=&quot;user.authentication.auth_via_mfa&quot;
    group by user_email, sso_source_ip
    )
  where sso_source_ip!=meta_remote_ip
verify: False positives can arise when the user is traveling. Review SSO authentication logs to see if the geo-location is similar to the SAML authentication to Gitlab. If any discrepancies are found, reach out to the user for verification. If the user is not traveling, temporarily lock the user&#x27;s Gitlab account and review their activity through Gitlab&#x27;s application logs. 
tuning: If the query is producing high false positives, consider using geolocation functions on IPs to compare the cities and countries that are generating the authentications.
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1733&quot;&gt;17.3.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165585&quot;&gt;Improve OpenSSL 3 upgrading warning notes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166063&quot;&gt;Upgrade bundler for the GitLab Backup CLI gem&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166059&quot;&gt;Update ruby-saml and omniauth-saml&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1727&quot;&gt;17.2.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165587&quot;&gt;Improve OpenSSL 3 upgrading warning notes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166043&quot;&gt;Update ruby-saml and omniauth-saml&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1718&quot;&gt;17.1.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165589&quot;&gt;Improve OpenSSL 3 upgrading warning notes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166058&quot;&gt;Update ruby-saml and omniauth-saml&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1708&quot;&gt;17.0.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166058&quot;&gt;Update ruby-saml and omniauth-saml&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;161110&quot;&gt;16.11.10&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;166058&quot;&gt;Update ruby-saml and omniauth-saml&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Patch Release: 17.3.2, 17.2.5, 17.1.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/11/patch-release-gitlab-17-3-2-released/</id>
<published>2024-09-11T00:00:00+00:00</published>
<updated>2024-09-11T00:00:00+00:00</updated>
<author>
<name>Ottilia Westerlund</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.3.2, 17.2.5, 17.1.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#execute-environment-stop-actions-as-the-owner-of-the-stop-action-job&quot;&gt;Execute environment stop actions as the owner of the stop action job&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#prevent-code-injection-in-product-analytics-funnels-yaml&quot;&gt;Prevent code injection in Product Analytics funnels YAML&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ssrf-via-dependency-proxy&quot;&gt;SSRF via Dependency Proxy&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-sending-a-specific-post-request&quot;&gt;Denial of Service via sending a a specific POST request&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ci_job_token-can-be-used-to-obtain-gitlab-session-token&quot;&gt;CI_JOB_TOKEN can be used to obtain GitLab session token&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#variables-from-settings-are-not-overwritten-by-pep-if-a-template-is-included&quot;&gt;Variables from settings are not overwritten by PEP if a template is included&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guests-can-disclose-the-full-source-code-of-projects-using-custom-group-level-templates&quot;&gt;Guests can disclose the full source code of projects using custom group-level templates&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#identitiescontroller-allows-linking-of-arbitrary-unclaimed-provider-identities&quot;&gt;IdentitiesController allows linking of arbitrary unclaimed provider identities&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirect-in-repotreeid-endpoint-can-lead-to-account-takeover-through-broken-oauth-flow&quot;&gt;Open redirect in repo&#x2F;tree&#x2F;:id endpoint can lead to account takeover through broken OAuth flow&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirect-in-release-permanent-links-can-lead-to-account-takeover-through-broken-oauth-flow&quot;&gt;Open redirect in release permanent links can lead to account takeover through broken OAuth flow&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-user-with-admin-group-member-permission-can-edit-custom-role-to-gain-other-permissions&quot;&gt;Guest user with Admin group member permission can edit custom role to gain other permissions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#exposure-of-protected-and-masked-cicd-variables-by-abusing-on-demand-dast&quot;&gt;Exposure of protected and masked CI&#x2F;CD variables by abusing on-demand DAST&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#credentials-disclosed-when-repository-mirroring-fails&quot;&gt;Credentials disclosed when repository mirroring fails&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#commit-information-visible-through-release-atom-endpoint-for-guest-users&quot;&gt;Commit information visible through release atom endpoint for guest users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dependency-proxy-credentials-are-logged-in-plaintext-in-graphql-logs&quot;&gt;Dependency Proxy Credentials are Logged in Plaintext in graphql Logs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-application-can-spoof-the-redirect-url&quot;&gt;User Application can spoof the redirect url&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-developers-can-view-group-runners-information&quot;&gt;Group Developers can view group runners information&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;execute-environment-stop-actions-as-the-owner-of-the-stop-action-job&quot;&gt;Execute environment stop actions as the owner of the stop action job&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
This is a critical severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 9.9).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6678&quot;&gt;CVE-2024-6678&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;prevent-code-injection-in-product-analytics-funnels-yaml&quot;&gt;Prevent code injection in Product Analytics funnels YAML&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 8.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8640&quot;&gt;CVE-2024-8640&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ssrf-via-dependency-proxy&quot;&gt;SSRF via Dependency Proxy&lt;&#x2F;h3&gt;

&lt;p&gt;A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 7.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8635&quot;&gt;CVE-2024-8635&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;joernchen&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-via-sending-a-specific-post-request&quot;&gt;Denial of Service via sending a specific POST request&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2  which could cause Denial of Service via sending a specific POST request.
This is a high severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 7.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8124&quot;&gt;CVE-2024-8124&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sim4n6&quot;&gt;sim4n6&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ci_job_token-can-be-used-to-obtain-gitlab-session-token&quot;&gt;CI_JOB_TOKEN can be used to obtain GitLab session token&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim&#x27;s CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8641&quot;&gt;CVE-2024-8641&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;variables-from-settings-are-not-overwritten-by-pep-if-a-template-is-included&quot;&gt;Variables from settings are not overwritten by PEP if a template is included&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI&#x2F;CD template.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8311&quot;&gt;CVE-2024-8311&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Andyschoenen&quot;&gt;Andy Schoenen&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;guests-can-disclose-the-full-source-code-of-projects-using-custom-group-level-templates&quot;&gt;Guests can disclose the full source code of projects using custom group-level templates&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4660&quot;&gt;CVE-2024-4660&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;identitiescontroller-allows-linking-of-arbitrary-unclaimed-provider-identities&quot;&gt;IdentitiesController allows linking of arbitrary unclaimed provider identities&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE&#x2F;CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.4).
We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;Joern Schneeweisz&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;open-redirect-in-repotreeid-endpoint-can-lead-to-account-takeover-through-broken-oauth-flow&quot;&gt;Open redirect in repo&#x2F;tree&#x2F;:id endpoint can lead to account takeover through broken OAuth flow&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4283&quot;&gt;CVE-2024-4283&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;open-redirect-in-release-permanent-links-can-lead-to-account-takeover-through-broken-oauth-flow&quot;&gt;Open redirect in release permanent links can lead to account takeover through broken OAuth flow&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4612&quot;&gt;CVE-2024-4612&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;guest-user-with-admin-group-member-permission-can-edit-custom-role-to-gain-other-permissions&quot;&gt;Guest user with Admin group member permission can edit custom role to gain other permissions&lt;&#x2F;h3&gt;

&lt;p&gt;A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8631&quot;&gt;CVE-2024-8631&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;chotebabume&quot;&gt;chotebabume&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;exposure-of-protected-and-masked-cicd-variables-by-abusing-on-demand-dast&quot;&gt;Exposure of protected and masked CI&#x2F;CD variables by abusing on-demand DAST&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2743&quot;&gt;CVE-2024-2743&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xn3va&quot;&gt;0xn3va&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;credentials-disclosed-when-repository-mirroring-fails&quot;&gt;Credentials disclosed when repository mirroring fails&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5435&quot;&gt;CVE-2024-5435&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gudanggaramfilter&quot;&gt;gudanggaramfilter&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;commit-information-visible-through-release-atom-endpoint-for-guest-users&quot;&gt;Commit information visible through release atom endpoint for guest users&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6389&quot;&gt;CVE-2024-6389&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dependency-proxy-credentials-are-logged-in-plaintext-in-graphql-logs&quot;&gt;Dependency Proxy Credentials are Logged in Plaintext in graphql Logs&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:L&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:L&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.0).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4472&quot;&gt;CVE-2024-4472&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ac7n0w&quot;&gt;ac7n0w&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;user-application-can-spoof-the-redirect-url&quot;&gt;User Application can spoof the redirect url&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 3.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6446&quot;&gt;CVE-2024-6446&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;group-developers-can-view-group-runners-information&quot;&gt;Group Developers can view group runners information&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2,  where group runners information was disclosed to unauthorised group members.
This is a low severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6685&quot;&gt;CVE-2024-6685&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1732&quot;&gt;17.3.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;2012&quot;&gt;UBI: Backport openssl gem pin to 17-3-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163188&quot;&gt;Backport &quot;Disable allow_failure for release-environments pipeline&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163437&quot;&gt;Fix issue when resizing images in RTE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163809&quot;&gt;Backport fix for listing projects via API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164228&quot;&gt;Backport lock retries timeout for sliding list strategy to &lt;code&gt;17-3&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164748&quot;&gt;backport archived filter regression bugfix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164791&quot;&gt;Ensure to update updated_at when updating access data&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164894&quot;&gt;Backport OpenSSL v3 callout to 17.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165464&quot;&gt;Quarantine pypi package registry spec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164830&quot;&gt;Fix Sidekiq crashing when GITLAB_LOG_LEVEL set to debug&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165343&quot;&gt;[17.3 Backport] Bump OpenSSL to 3.2.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165279&quot;&gt;Backport 17.3 - Remove elasticsearch call on init&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7890&quot;&gt;Downgrade OpenSSL version to 1.1.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7895&quot;&gt;[17.3 Backport] Deprecate CentOS 7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1725&quot;&gt;17.2.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163189&quot;&gt;Backport &quot;Disable allow_failure for release-environments pipeline&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163421&quot;&gt;Always build assets image when tagging&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162466&quot;&gt;Update google-cloud-core and google-cloud-env gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162937&quot;&gt;Backport to 17.2: Fixes Geo Replication Details incorrectly empty&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164893&quot;&gt;Backport OpenSSL v3 callout to 17.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164561&quot;&gt;Backport to 17.2: Fix JobArtifactState query timeout&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7874&quot;&gt;CI: Add test basic package functionality before release (17.2 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7876&quot;&gt;Use latest builder images for check-packages pipeline (17.2 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7896&quot;&gt;[17.2 Backport] Deprecate CentOS 7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1717&quot;&gt;17.1.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163191&quot;&gt;Backport &quot;Disable allow_failure for release-environments pipeline&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162939&quot;&gt;Backport to 17.1: Fixes Geo Replication Details view&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;164892&quot;&gt;Backport OpenSSL v3 callout to 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165270&quot;&gt;Backport to 17.1: Fix JobArtifactState query timeout&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7875&quot;&gt;CI: Add test basic package functionality before release (17.1 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7877&quot;&gt;Use latest builder images for check-packages pipeline (17.1 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7897&quot;&gt;[17.1 Backport] Deprecate CentOS 7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.0.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/09/11/gitlab-17-0-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/11/gitlab-17-0-7-released/</id>
<published>2024-09-11T00:00:00+00:00</published>
<updated>2024-09-11T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.0.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1707&quot;&gt;17.0.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161490&quot;&gt;Backport 17.0: Release Environments - pipeline level resource group&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161902&quot;&gt;Backport 17.0: Build assets image when running release environments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162294&quot;&gt;Backport 17.0 - Do not run release-environments on tagging&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162494&quot;&gt;Backport canonical RE downstream pipeline removal&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162772&quot;&gt;Update minimum Go version requirement for self-compiled (17.0)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163498&quot;&gt;Backport 17.0: Always build assets image when tagging&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161553&quot;&gt;Backport gitlab-qa shm fix 17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7880&quot;&gt;CI: Add test basic package functionality before release (17.0 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7878&quot;&gt;Use latest builder images for check-packages pipeline (17.0 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7902&quot;&gt;[17.0 Backport] Deprecate CentOS 7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;165271&quot;&gt;Backport to 17.0: Fix JobArtifactState query timeout&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.11.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/09/11/gitlab-16-11-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/09/11/gitlab-16-11-9-released/</id>
<published>2024-09-11T00:00:00+00:00</published>
<updated>2024-09-11T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.11.9 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;16119&quot;&gt;16.11.9&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7207&quot;&gt;repository: Add empty vote in ApplyGitattributes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7881&quot;&gt;CI: Add test basic package functionality before release (16.11 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7879&quot;&gt;Use latest builder images for check-packages pipeline (16.11 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;469443&quot;&gt;Private dotenv artifacts not accessible to downstream jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.3.1, 17.2.4, 17.1.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/08/21/patch-release-gitlab-17-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/08/21/patch-release-gitlab-17-3-1-released/</id>
<published>2024-08-21T00:00:00+00:00</published>
<updated>2024-08-21T00:00:00+00:00</updated>
<author>
<name>Ameya Darshan</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.3.1, 17.2.4, 17.1.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#the-gitlab-web-interface-does-not-guarantee-information-integrity-when-downloading-source-code-from-releases&quot;&gt;The GitLab Web Interface Does Not Guarantee Information Integrity When Downloading Source Code from Releases.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-by-importing-maliciously-crafted-github-repository&quot;&gt;Denial of Service by importing maliciously crafted GitHub repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#prompt-injection-in-resolve-vulnerabilty-results-in-arbitrary-command-execution-in-victims-pipeline&quot;&gt;Prompt injection in &quot;Resolve Vulnerabilty&quot; results in arbitrary command execution in victim&#x27;s pipeline&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#an-unauthorized-user-can-perform-certain-actions-through-graphql-after-a-group-owner-enables-ip-restrictions&quot;&gt;An unauthorized user can perform certain actions through GraphQL after a group owner enables IP restrictions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;the-gitlab-web-interface-does-not-guarantee-information-integrity-when-downloading-source-code-from-releases&quot;&gt;The GitLab Web Interface Does Not Guarantee Information Integrity When Downloading Source Code from Releases.&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.2 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, which allows an attacker to create a branch with the same name as a deleted tag.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6502&quot;&gt;CVE-2024-6502&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-by-importing-maliciously-crafted-github-repository&quot;&gt;Denial of Service by importing maliciously crafted GitHub repository&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) issue has been discovered in GitLab CE&#x2F;EE affecting all versions prior to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1. A denial of service could occur upon importing a maliciously crafted repository using the GitHub importer.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5). 
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-8041&quot;&gt;CVE-2024-8041&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a92847865&quot;&gt;a92847865&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;prompt-injection-in-resolve-vulnerabilty-results-in-arbitrary-command-execution-in-victims-pipeline&quot;&gt;Prompt injection in &quot;Resolve Vulnerabilty&quot; results in arbitrary command execution in victim&#x27;s pipeline&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, allows an attacker to execute arbitrary command in a victim&#x27;s pipeline through prompt injection.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-7110&quot;&gt;CVE-2024-7110&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;hhttps:&#x2F;&#x2F;gitlab.com&#x2F;dappelt&quot;&gt;Dennis Appelt&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;an-unauthorized-user-can-perform-certain-actions-through-graphql-after-a-group-owner-enables-ip-restrictions&quot;&gt;An unauthorized user can perform certain actions through GraphQL after a group owner enables IP restrictions&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 17.1.6, all versions starting from 17.2 before 17.2.4, all versions starting from 17.3 before 17.3.1. Under certain conditions it may be possible to bypass the IP restriction for groups through GraphQL allowing unauthorized users to perform some actions at the group level.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3127&quot;&gt;CVE-2024-3127&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0x777&quot;&gt;0x777&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-updates-july-2-2024&quot;&gt;Mattermost Security Updates July 2, 2024&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost has been updated to versions 9.9.0, which contains several patches and security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1731&quot;&gt;17.3.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162860&quot;&gt;Fix timeout when checking group dependencies (17.3 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162869&quot;&gt;Resolve &quot;Background migrations removed issues&quot; (backport to 17.3)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162798&quot;&gt;Backport to 17.3: Fixes Geo Replication Details incorrectly empty&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162829&quot;&gt;17.3 Backport vulnerability migration bugfix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7852&quot;&gt;Add debian 10 (Buster) to deprecated OS list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7868&quot;&gt;Raise default PostgreSQL shared buffers minimum to 256 MB&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162931&quot;&gt;Include language server version in code suggestions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162968&quot;&gt;Turn NotFound from Gitaly into 404 for InfoRefs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1724&quot;&gt;17.2.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161900&quot;&gt;Backport 17.2: Build assets image when running release environments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161129&quot;&gt;Backport DORA DF score recalculation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162292&quot;&gt;Backport 17.2 - Do not run release-environments on tagging&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162311&quot;&gt;Remove stong_memoization for cloud connector services&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161773&quot;&gt;Check if columns exist before running credit card hashing background migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162491&quot;&gt;Merge branch &#x27;jennykim&#x2F;remove-release-environment-canonical-pipeline&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162523&quot;&gt;Fix empty dependency list page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162544&quot;&gt;Backport 17-2: handle empty repository.ff_merge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162868&quot;&gt;17.2 backport for: Resolve &quot;Background migrations removed in 17.1 cause upgrade issues&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162935&quot;&gt;Include language server version in code suggestions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162969&quot;&gt;Turn NotFound from Gitaly into 404 for InfoRefs)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1716&quot;&gt;17.1.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161489&quot;&gt;Backport 17.1: Release Environments - pipeline level resource group&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161901&quot;&gt;Backport 17.1: Build assets image when running release environments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162293&quot;&gt;Backport 17.1 - Do not run release-environments on tagging&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162001&quot;&gt;Fix backport gitlab-qa shm fix to 17.1 stable branch version&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162492&quot;&gt;Backport canonical RE downstream pipeline removal&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162771&quot;&gt;Update minimum Go version requirement for self-compiled (17.1)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162542&quot;&gt;Backport 17-1: handle empty repository.ff_merge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162865&quot;&gt;Resolve &quot;Background migrations removed issues&quot; (backport to 17.1)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;163169&quot;&gt;Fix: backport !157455 to 17-1-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;162936&quot;&gt;Include language server version in code suggestions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Note: GitLab releases have skipped 17.2.3 and 17.1.5 . There are no patches with these version numbers.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.3 released with GitLab Duo Root Cause Analysis</title>
<release>17.3</release>
<link href='https://about.gitlab.com/releases/2024/08/15/gitlab-17-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/08/15/gitlab-17-3-released/</id>
<published>2024-08-15T00:00:00+00:00</published>
<updated>2024-08-15T00:00:00+00:00</updated>
<author>
<name>Gabe Weaver</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 17.3 with &lt;a href=&quot;#troubleshoot-failed-jobs-with-root-cause-analysis&quot;&gt;GitLab Duo-powered root cause analysis for failed pipeline jobs&lt;&#x2F;a&gt;, &lt;a href=&quot;#resolve-a-vulnerability-with-ai&quot;&gt;AI-assisted vulnerability resolution&lt;&#x2F;a&gt;, &lt;a href=&quot;#ai-impact-analytics-code-suggestions-acceptance-rate-and-gitlab-duo-seats-usage&quot;&gt;AI impact analytics for Code Suggestions acceptance rate and GitLab Duo seats usage&lt;&#x2F;a&gt;, &lt;a href=&quot;#add-multiple-compliance-frameworks-to-a-single-project&quot;&gt;the ability to add multiple compliance frameworks to a single project&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 160+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 130+ contributions you provided to GitLab 17.3!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.4 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_3&#x2F;17-3-cover.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.2.2, 17.1.4, 17.0.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/08/07/patch-release-gitlab-17-2-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/08/07/patch-release-gitlab-17-2-2-released/</id>
<published>2024-08-07T00:00:00+00:00</published>
<updated>2024-08-07T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.2.2, 17.1.4, 17.0.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#privilege-escalation-via-lfs-tokens-granting-unrestricted-repository-access&quot;&gt;Privilege Escalation via LFS Tokens Granting Unrestricted Repository Access&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#cross-project-access-of-security-policy-bot&quot;&gt;Cross project access of Security policy bot&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#advanced-search-redos-in-highlight-for-code-results&quot;&gt;Advanced search ReDOS in highlight for code results&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-banzai-pipeline&quot;&gt;Denial of Service via banzai pipeline&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-using-adoc-files&quot;&gt;Denial of service using adoc files&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-refmatcher-when-matching-branch-names-using-wildcards&quot;&gt;ReDoS in RefMatcher when matching branch names using wildcards&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#path-encoding-can-cause-the-web-interface-to-not-render-diffs-correctly&quot;&gt;Path encoding can cause the Web interface to not render diffs correctly.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-while-viewing-raw-xhtml-files-through-api&quot;&gt;XSS while viewing raw XHTML files through API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ambiguous-tag-name-exploitation&quot;&gt;Ambiguous tag name exploitation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#logs-disclosings-potentially-sensitive-data-in-query-params&quot;&gt;Logs disclosings potentially sensitive data in query params&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#password-bypass-on-approvals-using-policy-projects&quot;&gt;Password bypass on approvals using policy projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-when-parsing-git-push&quot;&gt;ReDoS when parsing git push&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#webhook-deletion-audit-log-can-preserve-auth-credentials&quot;&gt;Webhook deletion audit log can preserve auth credentials&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;privilege-escalation-via-lfs-tokens-granting-unrestricted-repository-access&quot;&gt;Privilege Escalation via LFS Tokens Granting Unrestricted Repository Access&lt;&#x2F;h3&gt;

&lt;p&gt;A permission check vulnerability in GitLab CE&#x2F;EE affecting all versions starting from 8.12 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2  allowed for LFS tokens to read and write to the user owned repositories.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.8).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3035&quot;&gt;CVE-2024-3035&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cross-project-access-of-security-policy-bot&quot;&gt;Cross project access of Security policy bot&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, which allowed cross project access for Security policy bot.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N &lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6356&quot;&gt;CVE-2024-6356&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;advanced-search-redos-in-highlight-for-code-results&quot;&gt;Advanced search ReDOS in highlight for code results&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) condition has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;terrichu&quot;&gt;Terri Chu&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-via-banzai-pipeline&quot;&gt;Denial of Service via banzai pipeline&lt;&#x2F;h3&gt;

&lt;p&gt;Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 1.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2 which allowed an attacker to cause resource exhaustion via banzai pipeline.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5423&quot;&gt;CVE-2024-5423&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-using-adoc-files&quot;&gt;Denial of service using adoc files&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) condition has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 12.6 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause a denial of service using crafted adoc files.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4210&quot;&gt;CVE-2024-4210&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gudanggaramfilter&quot;&gt;gudanggaramfilter&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-refmatcher-when-matching-branch-names-using-wildcards&quot;&gt;ReDoS in RefMatcher when matching branch names using wildcards&lt;&#x2F;h3&gt;

&lt;p&gt;ReDoS flaw in RefMatcher when matching branch names using wildcards in GitLab EE&#x2F;CE affecting all versions from 11.3 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allows denial of service via Regex backtracking.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2800&quot;&gt;CVE-2024-2800&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;path-encoding-can-cause-the-web-interface-to-not-render-diffs-correctly&quot;&gt;Path encoding can cause the Web interface to not render diffs correctly.&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.16 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, which causes the web interface to fail to render the diff correctly when the path is encoded.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6329&quot;&gt;CVE-2024-6329&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;xss-while-viewing-raw-xhtml-files-through-api&quot;&gt;XSS while viewing raw XHTML files through API&lt;&#x2F;h3&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 prior 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N &lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4207&quot;&gt;CVE-2024-4207&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ambiguous-tag-name-exploitation&quot;&gt;Ambiguous tag name exploitation&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. An issue was found that allows someone  to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3958&quot;&gt;CVE-2024-3958&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;logs-disclosings-potentially-sensitive-data-in-query-params&quot;&gt;Logs disclosings potentially sensitive data in query params&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.9 before 17.0.6, all versions starting from 17.1 before 17.1.4, all versions starting from 17.2 before 17.2.2. Under certain conditions, access tokens may have been logged when an API request was made in a specific manner.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.9).
We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;dcouture&quot;&gt;Dominic Couture&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;password-bypass-on-approvals-using-policy-projects&quot;&gt;Password bypass on approvals using policy projects&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.2).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4784&quot;&gt;CVE-2024-4784&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vexin&quot;&gt;vexin&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-when-parsing-git-push&quot;&gt;ReDoS when parsing git push&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3114&quot;&gt;CVE-2024-3114&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;webhook-deletion-audit-log-can-preserve-auth-credentials&quot;&gt;Webhook deletion audit log can preserve auth credentials&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, where webhook deletion audit log preserved auth credentials.
This is a medium severity issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab-com.gitlab.io&#x2F;gl-security&#x2F;product-security&#x2F;appsec&#x2F;cvss-calculator&#x2F;explain#explain=CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&quot;&gt;&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;, 4.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-7586&quot;&gt;CVE-2024-7586&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab Team &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;anton&quot;&gt;Anton Smith&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1722&quot;&gt;17.2.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1932&quot;&gt;Backups: Fix parsing of existing backups in Azure storage (Backport 17.2)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7147&quot;&gt;Do not consider pool repos dangling on restore&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160253&quot;&gt;Never return nil when search for CC service&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160554&quot;&gt;Fix issue in RTE related to adding text before a mention&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160666&quot;&gt;Backport &#x27;Check if params data cannot be JSONified&#x27; into 17.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160434&quot;&gt;Document Rake task to show&#x2F;edit token expirations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160678&quot;&gt;Backport 17.2 - Introduce lock-free rescheduling for duplicate job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160767&quot;&gt;Ignore unknown sequences in sequence fix migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160744&quot;&gt;Fix squished badges rendering in 17.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161081&quot;&gt;Optimize CustomAbility specs to reduce build times&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161200&quot;&gt;Backport Do not index associated issues that are epic work item type&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160911&quot;&gt;bug: Fix template error due to divided by zero&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161241&quot;&gt;Put groups_direct field in CI JWT tokens behind feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161430&quot;&gt;Backport &#x27;Fix cluster check metrics&#x27; into 17.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161539&quot;&gt;Backport Beyond Identity bug fixes to 17.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161543&quot;&gt;Enable &lt;code&gt;project_daily_statistic_counter_attribute_fetch&lt;&#x2F;code&gt; FF by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161488&quot;&gt;Backport 17.2: Release Environments - pipeline level resource group&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161386&quot;&gt;Add require_personal_access_token_expiry application setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-pages&#x2F;-&#x2F;merge_requests&#x2F;1030&quot;&gt;Backport 17.2: Mark Cookie SameSite as default over HTTP&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7814&quot;&gt;Pin QA CI tests to stable gitlab-org&#x2F;gitlab branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1714&quot;&gt;17.1.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1933&quot;&gt;Backups: Fix parsing of existing backups in Azure storage (Backport 17.1)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160679&quot;&gt;Backport 17.1 - Introduce lock-free rescheduling for duplicate job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160941&quot;&gt;Table driven spec needs shorter spec titles backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161079&quot;&gt;Optimize CustomAbility specs to reduce build times&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161242&quot;&gt;Put groups_direct field in CI JWT tokens behind feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161408&quot;&gt;Increase SQL query threashold on work_items test&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160667&quot;&gt;Backport &#x27;Check if params data cannot be JSONified&#x27; into 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161541&quot;&gt;Backport Beyond Identity bug fixes to 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161668&quot;&gt;Backport gitlab-qa shm fix to 17.1 stable branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161388&quot;&gt;Add require_personal_access_token_expiry application setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1706&quot;&gt;17.0.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1934&quot;&gt;Backups: Fix parsing of existing backups in Azure storage (Backport 17.0)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160815&quot;&gt;Backport 17.0 - Introduce lock-free rescheduling for duplicate job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160940&quot;&gt;Table driven spec needs shorter spec titles backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161240&quot;&gt;Put groups_direct field in CI JWT tokens behind feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161389&quot;&gt;Add require_personal_access_token_expiry application setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16118&quot;&gt;16.11.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;161391&quot;&gt;Add require_personal_access_token_expiry application setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;add-require_personal_access_token_expiry-application-setting&quot;&gt;Add require_personal_access_token_expiry application setting&lt;&#x2F;h3&gt;

&lt;p&gt;This default enabled, optional setting added for admins of GitLab self-managed instances on versions 16.11 and above allow them to enable mandatory expiraton on all new personal, project and group access tokens. Expirations set for existing tokens are not affected by this setting. For usage information see &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;account_and_limit_settings.html#require-expiration-dates-for-new-access-tokens&quot;&gt;Require expiration dates for new access tokens&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.2.1, 17.1.3, 17.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/07/24/patch-release-gitlab-17-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/07/24/patch-release-gitlab-17-2-1-released/</id>
<published>2024-07-24T00:00:00+00:00</published>
<updated>2024-07-24T00:00:00+00:00</updated>
<author>
<name>Greg Alfaro</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.2.1, 17.1.3, 17.0.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-via-the-maven-dependency-proxy&quot;&gt;XSS via the Maven Dependency Proxy&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-level-analytics-settings-leaked-in-dom&quot;&gt;Project level analytics settings leaked in DOM&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#reports-can-access-and-download-job-artifacts-despite-use-of-settings-to-prevent-it&quot;&gt;Reports can access and download job artifacts despite use of settings to prevent it&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#direct-transfer---authorised-projectgroup-exports-are-accessible-to-other-users&quot;&gt;Direct Transfer - Authorised project&#x2F;group exports are accessible to other users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-tag-check-and-branch-check-through-imports&quot;&gt;Bypassing tag check and branch check through imports&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-importexport---make-projectgroup-export-files-hidden-to-everyone-except-user-who-initiated-it&quot;&gt;Project Import&#x2F;Export - Make project&#x2F;group export files hidden to everyone except user who initiated it&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;xss-via-the-maven-dependency-proxy&quot;&gt;XSS via the Maven Dependency Proxy&lt;&#x2F;h3&gt;

&lt;p&gt;A cross site scripting vulnerability exists in GitLab CE&#x2F;EE affecting all versions from 16.6 prior to 17.0.5, 17.1 prior to 17.1.3, 17.2 prior to 17.2.1 allowing an attacker to execute arbitrary scripts under the context of the current logged in user.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.7)&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;Joern Schneeweisz&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-level-analytics-settings-leaked-in-dom&quot;&gt;Project level analytics settings leaked in DOM&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.0.5, 17.1 prior to 17.1.3, 17.2 prior to 17.2.1 where certain project-level analytics settings could be leaked in DOM to group members with Developer or higher roles.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N &lt;&#x2F;code&gt;, 4.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5067&quot;&gt;CVE-2024-5067&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;zebraman&quot;&gt;zebraman&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;reports-can-access-and-download-job-artifacts-despite-use-of-settings-to-prevent-it&quot;&gt;Reports can access and download job artifacts despite use of settings to prevent it&lt;&#x2F;h3&gt;

&lt;p&gt;An information disclosure vulnerability in GitLab CE&#x2F;EE affecting all versions starting from 16.7 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where job artifacts can be inappropriately exposed to users lacking the proper authorization level.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-7057&quot;&gt;CVE-2024-7057&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ricardobrito&quot;&gt;ricardobrito&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;direct-transfer---authorised-projectgroup-exports-are-accessible-to-other-users&quot;&gt;Direct Transfer - Authorised project&#x2F;group exports are accessible to other users&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.6 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where it was possible to disclose limited information of an exported group or project to another user.&lt;&#x2F;p&gt;

&lt;p&gt;This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.1 ).&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by a GitLab team member &lt;a href=&quot;hhttps:&#x2F;&#x2F;gitlab.com&#x2F;jnutt&quot;&gt;James Nutt&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;bypassing-tag-check-and-branch-check-through-imports&quot;&gt;Bypassing tag check and branch check through imports&lt;&#x2F;h3&gt;

&lt;p&gt;A resource misdirection vulnerability in GitLab CE&#x2F;EE affecting all versions 12.0 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1 allows an attacker to craft a repository import in such a way as to misdirect commits.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-0231&quot;&gt;CVE-2024-0231&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;aaron_dewes&quot;&gt;aaron_dewes&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-importexport---make-projectgroup-export-files-hidden-to-everyone-except-user-who-initiated-it&quot;&gt;Project Import&#x2F;Export - Make project&#x2F;group export files hidden to everyone except user who initiated it&lt;&#x2F;h3&gt;

&lt;p&gt;An information disclosure vulnerability in GitLab CE&#x2F;EE in project&#x2F;group exports affecting all versions from 15.4 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1 allows unauthorized users to view the resultant export.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.6).&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;wortschi&quot;&gt;Martin Wortschack&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1721&quot;&gt;17.2.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7103&quot;&gt;Revert &quot;Ensure page token is for the same tree&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159815&quot;&gt;Fix order-dependent Elasticsearch spec failure&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159794&quot;&gt;Backport to run Release Environments on RC tag into &#x27;17-2-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159993&quot;&gt;Fix state leak in cluster_util_spec.rb&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160006&quot;&gt;Ensure rspec helpers call curl with –fail&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160047&quot;&gt;Run e2e:package-and-test-ee for MR targeting stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160129&quot;&gt;Remove build-gdk-image, e2e:test-on-gdk, and retag-gdk-image jobs (17.2)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160007&quot;&gt;17.2 backport for fix PEP when SEC is available&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160276&quot;&gt;bugfix: Only run advanced SAST job when Ultimate license present&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160377&quot;&gt;Backport pipeline fixes for 17.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;469443&quot;&gt;Private dotenv artifacts not accessible to downstream jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1713&quot;&gt;17.1.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1921&quot;&gt;Backport mock tag cleanup related fixes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1904&quot;&gt;Multiarch fixes backport (17.1)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158737&quot;&gt;Backport release-environments pipeline in security repo to 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158841&quot;&gt;Backport [17.1] Fix empty minimum_should_match in query&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159016&quot;&gt;Fix wildcard search for package.json in npm upload&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159075&quot;&gt;NPM registry: replace the saj parser (17.1 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159701&quot;&gt;Fix Content-Disposition header for Azure in API download (17.1 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159817&quot;&gt;Fix order-dependent Elasticsearch spec failure&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159795&quot;&gt;Backport to run Release Environments on RC tag into &#x27;17-1-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159995&quot;&gt;Fix state leak in cluster_util_spec.rb&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160094&quot;&gt;Merge branch &#x27;sh-curl-fail-ci&#x27; into &#x27;master&#x27; - 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159003&quot;&gt;Ignore object pool already exists creation errors 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158509&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159049&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160128&quot;&gt;Remove build-gdk-image, e2e:test-on-gdk, and retag-gdk-image jobs (17.1)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160392&quot;&gt;Backport pipeline fixes for 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;469443&quot;&gt;Private dotenv artifacts not accessible to downstream jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1705&quot;&gt;17.0.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1920&quot;&gt;Backport mock tag cleanup related fixes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1903&quot;&gt;Multiarch fixes backport (17.0)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159796&quot;&gt;Backport to run Release Environments on RC tag into &#x27;17-0-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159286&quot;&gt;Backport Resolve &quot;Geo: JWT token expiration too short&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159019&quot;&gt;Ignore object pool already exists creation errors 17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158907&quot;&gt;Fix 500 error using a instance runner registration token&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158511&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158266&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159417&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159054&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160326&quot;&gt;Fix order-dependent custom role definition spec failure&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;160393&quot;&gt;Backport pipeline fixes for 17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;469443&quot;&gt;Private dotenv artifacts not accessible to downstream jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16117&quot;&gt;16.11.7&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159287&quot;&gt;Backport Resolve &quot;Geo: JWT token expiration too short&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159019&quot;&gt;Ignore object pool already exists creation errors 17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157277&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158416&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159418&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159056&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16109&quot;&gt;16.10.9&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158516&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158414&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159419&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159057&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16910&quot;&gt;16.9.10&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158517&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153470&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159421&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159058&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1689&quot;&gt;16.8.9&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158518&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153469&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159424&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159066&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1679&quot;&gt;16.7.9&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158519&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153468&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159426&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159069&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1669&quot;&gt;16.6.9&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158525&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153466&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159429&quot;&gt;Update the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159089&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1659&quot;&gt;16.5.9&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158526&quot;&gt;Backport token logging improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153459&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158110&quot;&gt;Add the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159093&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1646&quot;&gt;16.4.6&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153458&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158474&quot;&gt;Add the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159125&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1638&quot;&gt;16.3.8&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153457&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158475&quot;&gt;Add the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159383&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16210&quot;&gt;16.2.10&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153453&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158479&quot;&gt;Add the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159401&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1617&quot;&gt;16.1.7&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153448&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158476&quot;&gt;Add the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159414&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1609&quot;&gt;16.0.9&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153435&quot;&gt;Drop migration that finalizes migration to add PAT expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158477&quot;&gt;Add the token expiration banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;159446&quot;&gt;Backport add Rake task to show token expiration info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.2 released with log streaming, a new pipeline execution security policy, and vulnerability explanations now generally available</title>
<release>17.2</release>
<link href='https://about.gitlab.com/releases/2024/07/18/gitlab-17-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/07/18/gitlab-17-2-released/</id>
<published>2024-07-18T00:00:00+00:00</published>
<updated>2024-07-18T00:00:00+00:00</updated>
<author>
<name>Viktor Nagy</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 17.2 with &lt;a href=&quot;#vulnerability-explanation&quot;&gt;vulnerability explanations becoming generally available and integrated with GitLab Duo&lt;&#x2F;a&gt; to help understand SAST vulnerabilities, &lt;a href=&quot;#log-streaming-for-kubernetes-pods-and-containers&quot;&gt;log streaming support for Kubernetes&lt;&#x2F;a&gt; to help troubleshoot workloads without leaving GitLab, a new &lt;a href=&quot;#pipeline-execution-policy-type&quot;&gt;pipeline execution security policy type&lt;&#x2F;a&gt; to enforce the execution of CI&#x2F;CD jobs in pipelines, &lt;a href=&quot;#gitlab-duo-chat-and-code-suggestions-available-in-workspaces&quot;&gt;Duo Chat and Code Suggestions support in GitLab workspaces&lt;&#x2F;a&gt; for a productivity boost in the remote development environment, and much more!
These are just a few highlights from the 30+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 160+ contributions you provided to GitLab 17.2!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt;, and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month&#x27;s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.3 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_2&#x2F;17-2-cover.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Patch Release: 17.1.2, 17.0.4, 16.11.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/</id>
<published>2024-07-10T00:00:00+00:00</published>
<updated>2024-07-10T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.1.2, 17.0.4, 16.11.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com and GitLab Dedicated are already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#an-attacker-can-run-pipeline-jobs-as-an-arbitrary-user&quot;&gt;An attacker can run pipeline jobs as an arbitrary user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#developer-user-with-admin_compliance_framework-permission-can-change-group-url&quot;&gt;Developer user with &lt;code&gt;admin_compliance_framework&lt;&#x2F;code&gt; permission can change group URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#admin-push-rules-custom-role-allows-creation-of-project-level-deploy-token&quot;&gt;Admin push rules custom role allows creation of project level deploy token&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#package-registry-vulnerable-to-manifest-confusion&quot;&gt;Package registry vulnerable to manifest confusion&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-with-admin_group_member-permission-can-ban-group-members&quot;&gt;User with &lt;code&gt;admin_group_member&lt;&#x2F;code&gt; permission can ban group members&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#subdomain-takeover-in-gitlab-pages&quot;&gt;Subdomain takeover in GitLab pages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;an-attacker-can-run-pipeline-jobs-as-an-arbitrary-user&quot;&gt;An attacker can run pipeline jobs as an arbitrary user&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting versions 15.8 prior to 16.11.6, 17.0 prior to 17.0.4, and 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.
This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 9.6).
It is now resolved in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6385&quot;&gt;CVE-2024-6385&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;developer-user-with-admin_compliance_framework-permission-can-change-group-url&quot;&gt;Developer user with &lt;code&gt;admin_compliance_framework&lt;&#x2F;code&gt; permission can change group URL&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Developer user with &lt;code&gt;admin_compliance_framework&lt;&#x2F;code&gt; custom role may have been able to modify the URL for a group namespace.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.9).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5257&quot;&gt;CVE-2024-5257&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;admin-push-rules-custom-role-allows-creation-of-project-level-deploy-token&quot;&gt;Admin push rules custom role allows creation of project level deploy token&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Guest user with &lt;code&gt;admin_push_rules&lt;&#x2F;code&gt; permission may have been able to create project-level deploy tokens.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.8).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5470&quot;&gt;CVE-2024-5470&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;indoappsec&quot;&gt;indoappsec&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;package-registry-vulnerable-to-manifest-confusion&quot;&gt;Package registry vulnerable to manifest confusion&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 where it was possible to upload an NPM package with conflicting package data.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.0).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6595&quot;&gt;CVE-2024-6595&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by a GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;ameyadarshan&quot;&gt;Ameya Darshan&lt;&#x2F;a&gt;. Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;x.com&#x2F;darcy&quot;&gt;Darcy Clarke&lt;&#x2F;a&gt; for their work on &lt;a href=&quot;https:&#x2F;&#x2F;blog.vlt.sh&#x2F;blog&#x2F;the-massive-hole-in-the-npm-ecosystem&quot;&gt;manifest confusion&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;user-with-admin_group_member-permission-can-ban-group-members&quot;&gt;User with &lt;code&gt;admin_group_member&lt;&#x2F;code&gt; permission can ban group members&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.5 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 in which a user with &lt;code&gt;admin_group_member&lt;&#x2F;code&gt; custom role permission could ban group members.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2880&quot;&gt;CVE-2024-2880&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;subdomain-takeover-in-gitlab-pages&quot;&gt;Subdomain takeover in GitLab Pages&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows a subdomain takeover in GitLab Pages by checking if the domain is enabled every time the custom domain is resolved.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5528&quot;&gt;CVE-2024-5528&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fdeleite&quot;&gt;fdeleite&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1712&quot;&gt;17.1.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;7058&quot;&gt;git: Update &lt;code&gt;symlinkPointsToGitDir&lt;&#x2F;code&gt; version check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157347&quot;&gt;Fix MailRoom not loading in Omnibus&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157428&quot;&gt;Use static AWS credentials for elasticsearch indexer if set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157655&quot;&gt;ci: For 17-1 Use default Ruby version for MRs targeting stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157430&quot;&gt;Remove transaction opening for non-basic search count&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157757&quot;&gt;Merge branch &#x27;echui-gitlab-master-patch-58822&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157312&quot;&gt;Update FF version info for graphql_minimal_auth_methods&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157608&quot;&gt;Merge branch &#x27;correct_finalize_epics_backfilling&#x27; into &#x27;17-1-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158201&quot;&gt;Fix merge unverified changes modal showing incorrectly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158332&quot;&gt;Backport 17.1: Field needs to be called Url&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158452&quot;&gt;Backport Release Environments notification pipeline change to 17.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157381&quot;&gt;Update dependency slack-messenger to v2.3.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7734&quot;&gt;Force ffi gem to use Ruby platform gem&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7744&quot;&gt;Fix Redis password handling with reserved characters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7765&quot;&gt;Pin QA CI tests to stable gitlab-org&#x2F;gitlab branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1704&quot;&gt;17.0.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158455&quot;&gt;Backport Release Environments notification pipeline change to 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158453&quot;&gt;Backport Release Environments notification pipeline change to 17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157383&quot;&gt;Update dependency slack-messenger to v2.3.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7764&quot;&gt;Pin QA CI tests to stable gitlab-org&#x2F;gitlab branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7745&quot;&gt;Fix Redis password handling with reserved characters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16116&quot;&gt;16.11.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157242&quot;&gt;Update versioning info for graphql FF&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157451&quot;&gt;Define the Ruby patch version to use in CI jobs in 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158326&quot;&gt;For 16.11: Explicitly set Omnibus and CNG Ruby version in CI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;158459&quot;&gt;Backport Release Environments notification pipeline change to 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157385&quot;&gt;Update dependency slack-messenger to v2.3.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7763&quot;&gt;Pin QA CI tests to stable gitlab-org&#x2F;gitlab branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update GitLab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Patch Release: 17.1.1, 17.0.3, 16.11.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/06/26/patch-release-gitlab-17-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/06/26/patch-release-gitlab-17-1-1-released/</id>
<published>2024-06-26T00:00:00+00:00</published>
<updated>2024-06-26T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.1.1, 17.0.3, 16.11.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#run-pipelines-as-any-user&quot;&gt;Run pipelines as any user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-injected-in-imported-projects-commit-notes&quot;&gt;Stored XSS injected in imported project&#x27;s commit notes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#csrf-on-graphql-api-introspectionquery&quot;&gt;CSRF on GraphQL API &lt;code&gt;IntrospectionQuery&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#remove-search-results-from-public-projects-with-unauthorized-repos&quot;&gt;Remove search results from public projects with unauthorized repos&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#cross-window-forgery-in-user-application-oauth-flow&quot;&gt;Cross window forgery in user application OAuth flow&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-maintainers-can-bypass-groups-merge-request-approval-policy&quot;&gt;Project maintainers can bypass group&#x27;s merge request approval policy&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-custom-built-markdown-page&quot;&gt;ReDoS via custom built markdown page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#private-job-artifacts-can-be-accessed-by-any-user&quot;&gt;Private job artifacts can be accessed by any user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#security-fixes-for-banzai-pipeline&quot;&gt;Security fixes for banzai pipeline&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-dependency-linker&quot;&gt;ReDoS in dependency linker&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-using-a-crafted-openapi-file&quot;&gt;Denial of service using a crafted OpenAPI file&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#merge-request-title-disclosure&quot;&gt;Merge request title disclosure&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#access-issues-and-epics-without-having-an-sso-session&quot;&gt;Access issues and epics without having an SSO session&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#non-project-member-can-promote-key-results-to-objectives&quot;&gt;Non project member can promote key results to objectives&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;run-pipelines-as-any-user&quot;&gt;Run pipelines as any user&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.8 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which could allow an attacker to trigger a pipeline as another user under certain circumstances. This is a critical severity issue (CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N, 9.6). It is now resolved in the latest release and is assigned CVE-2024-5655.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ahacker1&quot;&gt;ahacker1&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;p&gt;Breaking changes:&lt;&#x2F;p&gt;
&lt;ol&gt;
  &lt;li&gt;This fix changes the MR re-targeting workflow so that a pipeline will not automatically run when a merge request is automatically re-targeted due to its previous target branch being merged. Users will need  to manually start a pipeline to have CI execute for their changes.&lt;&#x2F;li&gt;
  &lt;li&gt;GraphQL authentication using CI_JOB_TOKEN is disabled by default from 17.0.0, and back ported to 17.0.3, 16.11.5 in the current patch release. If access to the GraphQL API is required, please configure one of the several supported token types for authentication.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;At this time, we have not found evidence of abuse of this vulnerability on the platforms managed by GitLab, including GitLab.com and GitLab Dedicated instances.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;stored-xss-injected-in-imported-projects-commit-notes&quot;&gt;Stored XSS injected in imported project&#x27;s commit notes&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, where a stored XSS vulnerability could be imported from a project with malicious commit notes.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4901&quot;&gt;CVE-2024-4901&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;csrf-on-graphql-api-introspectionquery&quot;&gt;CSRF on GraphQL API &lt;code&gt;IntrospectionQuery&lt;&#x2F;code&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16.1.0 before 16.11.5, all versions starting from 17.0 before 17.0.3, all versions starting from 17.1.0 before 17.1.1 which allowed for a CSRF attack on GitLab&#x27;s GraphQL API leading to the execution of arbitrary GraphQL mutations. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4994&quot;&gt;CVE-2024-4994&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ahacker1&quot;&gt;ahacker1&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remove-search-results-from-public-projects-with-unauthorized-repos&quot;&gt;Remove search results from public projects with unauthorized repos&lt;&#x2F;h3&gt;

&lt;p&gt;Improper authorization in global search in GitLab EE affecting all versions from 16.11 prior to 16.11.5 and 17.0 prior to 17.0.3 and 17.1 prior to 17.1.1 allows an attacker leak content of a private repository in a public project. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-6323&quot;&gt;CVE-2024-6323&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to GitLab Team Member, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;@joernchen&lt;&#x2F;a&gt; for reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cross-window-forgery-in-user-application-oauth-flow&quot;&gt;Cross window forgery in user application OAuth flow&lt;&#x2F;h3&gt;

&lt;p&gt;A Cross Window Forgery vulnerability exists within GitLab CE&#x2F;EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2177&quot;&gt;CVE-2024-2177&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-maintainers-can-bypass-groups-merge-request-approval-policy&quot;&gt;Project maintainers can bypass group&#x27;s merge request approval policy&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.10 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows a project maintainer can delete the merge request approval policy via graphQL. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.8).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5430&quot;&gt;CVE-2024-5430&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-via-custom-built-markdown-page&quot;&gt;ReDoS via custom built markdown page&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) condition has been discovered in GitLab CE&#x2F;EE affecting all versions from 7.10 prior before 16.11.5, version 17.0 before 17.0.3, and 17.1 before 17.1.1. It is possible for an attacker to cause a denial of service using a crafted markdown page. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4025&quot;&gt;CVE-2024-4025&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;private-job-artifacts-can-be-accessed-by-any-user&quot;&gt;Private job artifacts can be accessed by any user&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.7 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows private job artifacts can be accessed by any user. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3959&quot;&gt;CVE-2024-3959&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;security-fixes-for-banzai-pipeline&quot;&gt;Security fixes for banzai pipeline&lt;&#x2F;h3&gt;

&lt;p&gt;Multiple Denial of Service (DoS) issues has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 1.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1 which allowed an attacker to cause resource exhaustion via banzai pipeline. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4557&quot;&gt;CVE-2024-4557&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&quot;&gt;joaxcar&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;setiawan_&quot;&gt;setiawan_&lt;&#x2F;a&gt; for reporting these vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-dependency-linker&quot;&gt;ReDoS in dependency linker&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular  expression DoS attack on the server. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1493&quot;&gt;CVE-2024-1493&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-using-a-crafted-openapi-file&quot;&gt;Denial of service using a crafted OpenAPI file&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows for an attacker to cause a denial of service using a crafted OpenAPI file. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1816&quot;&gt;CVE-2024-1816&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;merge-request-title-disclosure&quot;&gt;Merge request title disclosure&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows merge request title to be visible publicly despite being set as project members only. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2191&quot;&gt;CVE-2024-2191&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;access-issues-and-epics-without-having-an-sso-session&quot;&gt;Access issues and epics without having an SSO session&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3115&quot;&gt;CVE-2024-3115&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;non-project-member-can-promote-key-results-to-objectives&quot;&gt;Non project member can promote key results to objectives&lt;&#x2F;h3&gt;

&lt;p&gt;An issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4011&quot;&gt;CVE-2024-4011&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1711&quot;&gt;17.1.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156799&quot;&gt;Prevent cng e2e test from running in security fork&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157027&quot;&gt;Only enumerate commits in pre-receive check if push came from Web&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156968&quot;&gt;Revert &quot;Allow &lt;code&gt;admin_runner&lt;&#x2F;code&gt; ability to change shared runners setting&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1703&quot;&gt;17.0.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155704&quot;&gt;Fix missing filename when downloading generic package in release page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156392&quot;&gt;Update an expired test certificate&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156424&quot;&gt;Prevent starting multiple Capybara proxy servers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156482&quot;&gt;Backport 3 commits for Merge Train pipelines support in 17-0-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156635&quot;&gt;Fix error when calling GQL ciConfig endpoint with include:component&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155926&quot;&gt;Only allow documented token types for GraphQL authentication&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155242&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;157026&quot;&gt;Only enumerate commits in pre-receive check if push came from Web&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7705&quot;&gt;Backport QA test fixes for stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7724&quot;&gt;Merge branch &#x27;sh-patch-inspec-gem&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16115&quot;&gt;16.11.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156425&quot;&gt;Prevent starting multiple Capybara proxy servers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156393&quot;&gt;Update an expired test certificate&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;156746&quot;&gt;Enable invert_emails_disabled_to_emails_enabled by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155925&quot;&gt;Only allow documented token types for GraphQL authentication&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155265&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7704&quot;&gt;Backport QA test fixes for stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16108&quot;&gt;16.10.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155266&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1699&quot;&gt;16.9.9&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155267&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1688&quot;&gt;16.8.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155268&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1678&quot;&gt;16.7.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155269&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1668&quot;&gt;16.6.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155270&quot;&gt;Add a banner informing about token expiration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.1 released with Model registry available in beta and multiple GitLab Duo Code Suggestions in VS Code</title>
<release>17.1</release>
<link href='https://about.gitlab.com/releases/2024/06/20/gitlab-17-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/06/20/gitlab-17-1-released/</id>
<published>2024-06-20T00:00:00+00:00</published>
<updated>2024-06-20T00:00:00+00:00</updated>
<author>
<name>Gabriel Engel</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 17.1 with &lt;a href=&quot;#model-registry-available-in-beta&quot;&gt;Model registry available in beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#see-multiple-gitlab-duo-code-suggestions-in-vs-code&quot;&gt;multiple GitLab Duo Code Suggestions in VS Code&lt;&#x2F;a&gt;, &lt;a href=&quot;#secret-push-protection-available-in-beta&quot;&gt;Secret Push Protection available in beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#gitlab-runner-autoscaler-is-generally-available&quot;&gt;GitLab Runner Autoscaler is generally available&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 45+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 340+ contributions you provided to GitLab 17.1!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.2 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_1&#x2F;17_1-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.0.2, 16.11.4, 16.10.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/06/12/patch-release-gitlab-17-0-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/06/12/patch-release-gitlab-17-0-2-released/</id>
<published>2024-06-12T00:00:00+00:00</published>
<updated>2024-06-12T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.0.2, 16.11.4, 16.10.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-gomod-dependency-linker&quot;&gt;ReDoS in gomod dependency linker&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-ci-interpolation-fix-bypass&quot;&gt;ReDoS in CI interpolation (fix bypass)&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-asana-integration-issue-mapping-when-webhook-is-called&quot;&gt;ReDoS in Asana integration issue mapping when webhook is called&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-and-content-injection-when-viewing-raw-xhtml-files-on-ios-devices&quot;&gt;XSS and content injection when viewing raw XHTML files on IOS devices&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#missing-agentk-request-validation-could-cause-kas-to-panic&quot;&gt;Missing agentk request validation could cause KAS to panic&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;redos-in-gomod-dependency-linker&quot;&gt;ReDoS in gomod dependency linker&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.1 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. It was possible for an attacker to cause a denial of service using maliciously crafted file.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1495&quot;&gt;CVE-2024-1495&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-ci-interpolation-fix-bypass&quot;&gt;ReDoS in CI interpolation (fix bypass)&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab&#x27;s CI&#x2F;CD pipeline editor could allow for denial of service attacks through maliciously crafted configuration files.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1736&quot;&gt;CVE-2024-1736&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-asana-integration-issue-mapping-when-webhook-is-called&quot;&gt;ReDoS in Asana integration issue mapping when webhook is called&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.4 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab&#x27;s Asana integration allowed an attacker to potentially cause a regular expression denial of service by sending specially crafted requests.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1963&quot;&gt;CVE-2024-1963&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;xss-and-content-injection-when-viewing-raw-xhtml-files-on-ios-devices&quot;&gt;XSS and content injection when viewing raw XHTML files on iOS devices&lt;&#x2F;h3&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 16.10.7, all versions starting from 16.11 before 16.11.4, all versions starting from 17.0 before 17.0.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4201&quot;&gt;CVE-2024-4201&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;missing-agentk-request-validation-could-cause-kas-to-panic&quot;&gt;Missing agentk request validation could cause KAS to panic&lt;&#x2F;h3&gt;

&lt;p&gt;DoS in KAS in GitLab CE&#x2F;EE affecting all versions from 16.10.0 prior to 16.10.6 and 16.11.0 prior to 16.11.3 allows an attacker to crash KAS via crafted gRPC requests.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5469&quot;&gt;CVE-2024-5469&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the Environments team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1702&quot;&gt;17.0.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6996&quot;&gt;Makefile: update Git versions (v17.0 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154018&quot;&gt;Update VERSION files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154019&quot;&gt;Docs: Backport Dedicated AI updates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154505&quot;&gt;Fix failing specs in 17-0-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154624&quot;&gt;Include headers in LfsDownloadObject&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;155385&quot;&gt;[17.0] Deprecate support for Ubuntu 18.04&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16114&quot;&gt;16.11.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6997&quot;&gt;Makefile: update Git versions (v16.11 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153752&quot;&gt;Backport &#x27;run-release-environment-for-tag-commits&#x27; into 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154041&quot;&gt;Dedicated AI updates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153833&quot;&gt;Speed up as-if-foss Rubocop&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154370&quot;&gt;Inclusion of headers in LfsDownloadObject for GitHub imports&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154504&quot;&gt;Fix failing specs on 16-11-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154838&quot;&gt;Stop orphaning pages deployments on Geo secondaries on 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16107&quot;&gt;16.10.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6998&quot;&gt;Makefile: update Git versions (v16.10 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153753&quot;&gt;Backport &#x27;run-release-environment-for-tag-commits&#x27; into 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154503&quot;&gt;Fix failing specs on 16-10-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;154837&quot;&gt;Stop orphaning pages deployments on Geo secondaries on 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 17.0.1, 16.11.3, 16.10.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/05/22/patch-release-gitlab-17-0-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/05/22/patch-release-gitlab-17-0-1-released/</id>
<published>2024-05-22T00:00:00+00:00</published>
<updated>2024-05-22T00:00:00+00:00</updated>
<author>
<name>Greg Alfaro</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 17.0.1, 16.11.3, and 16.10.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#1-click-account-takeover-via-xss-leveraging-the-vs-code-editor-web-ide&quot;&gt;1-click account takeover via XSS leveraging the VS code editor (Web IDE)&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#a-dos-vulnerability-in-the-description-field-of-the-runner&quot;&gt;A DOS vulnerability in the &#x27;description&#x27; field of the runner&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#csrf-via-k8s-cluster-integration&quot;&gt;CSRF via K8s cluster-integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#using-set-pipeline-status-of-a-commit-api-incorrectly-create-a-new-pipeline-when-sha-and-pipeline_id-did-not-match&quot;&gt;Using Set Pipeline Status of a Commit API incorrectly create a new pipeline when SHA and pipeline_id did not match&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-on-wiki-render-apipage&quot;&gt;Redos on wiki render API&#x2F;Page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#resource-exhaustion-and-denial-of-service-with-test_report-api-calls&quot;&gt;Resource exhaustion and denial of service with test_report API calls&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-user-can-view-dependency-lists-of-private-projects-through-job-artifacts&quot;&gt;Guest user can view dependency lists of private projects through job artifacts&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;1-click-account-takeover-via-xss-leveraging-the-vs-code-editor-web-ide&quot;&gt;1-click account takeover via XSS leveraging the VS code editor (Web IDE)&lt;&#x2F;h3&gt;

&lt;p&gt;A XSS condition exists within GitLab in versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1. By leveraging this condition, an attacker can craft a malicious page to exfiltrate sensitive user information.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.0) 
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4835&quot;&gt;CVE-2024-4835&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;matanber&quot;&gt;matanber&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;a-dos-vulnerability-in-the-description-field-of-the-runner&quot;&gt;A DOS vulnerability in the &#x27;description&#x27; field of the runner&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions up to 16.10.6, versions 16.11 up to 16.11.3, and 17.0 up to 17.0.1. A runner registered with a crafted description has the potential to disrupt the loading of targeted GitLab web resources.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2874&quot;&gt;CVE-2024-2874&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ac7n0w&quot;&gt;ac7n0w&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h3 id=&quot;csrf-via-k8s-cluster-integration&quot;&gt;CSRF via K8s cluster-integration&lt;&#x2F;h3&gt;

&lt;p&gt;A CSRF vulnerability exists within GitLab CE&#x2F;EE from versions 16.3 up to 16.10.6, from 16.11 up to 16.11.3, from 17.0 up to 17.0.1. By leveraging this vulnerability, an attacker could exfiltrate anti-CSRF tokens via the Kubernetes Agent Server (KAS).
This is a medium severity issue (&lt;code&gt;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-7045&quot;&gt;CVE-2023-7045&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;imrerad&quot;&gt;imrerad&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h3 id=&quot;using-set-pipeline-status-of-a-commit-api-incorrectly-create-a-new-pipeline-when-sha-and-pipeline_id-did-not-match&quot;&gt;Using Set Pipeline Status of a Commit API incorrectly create a new pipeline when SHA and pipeline_id did not match&lt;&#x2F;h3&gt;

&lt;p&gt;An authorization vulnerability exists within GitLab from versions 16.10 up to 16.10.6, 16.11 up to 16.11.3, and 17.0 up to 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5258&quot;&gt;CVE-2024-5258&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to GitLab Team Member, Andrew Winata for reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-on-wiki-render-apipage&quot;&gt;Redos on wiki render API&#x2F;Page&lt;&#x2F;h3&gt;

&lt;p&gt;A Denial of Service (DoS) condition has been discovered in GitLab CE&#x2F;EE affecting all versions before 16.10.6, version 16.11 before 16.11.3, and 17.0 before 17.0.1. It is possible for an attacker to cause a denial of service using a crafted wiki page.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6502&quot;&gt;CVE-2023-6502&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;code&gt;Anonymizer&lt;&#x2F;code&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;resource-exhaustion-and-denial-of-service-with-test_report-api-calls&quot;&gt;Resource exhaustion and denial of service with test_report API calls&lt;&#x2F;h3&gt;

&lt;p&gt;A denial of service (DoS) condition was discovered in GitLab CE&#x2F;EE affecting all versions from 13.2.4 up to 16.10.6, 16.11 up to 16.11.3, and 17.0 up to 17.0.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1947&quot;&gt;CVE-2024-1947&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;luryus&quot;&gt;luryus&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;guest-user-can-view-dependency-lists-of-private-projects-through-job-artifacts&quot;&gt;Guest user can view dependency lists of private projects through job artifacts&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.11 prior to 16.10.6, starting from 16.11 prior to 16.11.3, and starting from 17.0 prior to 17.0.1. A Guest user can view dependency lists of private projects through job artifacts.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-5318&quot;&gt;CVE-2024-5318&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ricardobrito&quot;&gt;ricardobrito&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;stored-xss-via-pdfjs&quot;&gt;Stored XSS via PDFjs&lt;&#x2F;h3&gt;

&lt;p&gt;Mitigations were made to take care of vulnerability in PDF.js &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-4367&quot;&gt;CVE-2024-4367&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;h4x0r_dz&quot;&gt;h4x0r_dz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-updates-april-25th-2024&quot;&gt;Mattermost Security Updates April 25th, 2024&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost has been updated to versions 9.7.2, which contains several patches and security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1701&quot;&gt;17.0.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6922&quot;&gt;Makefile: update Git versions (v17.0 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153144&quot;&gt;Merge branch &#x27;rymai-master-patch-5345&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153330&quot;&gt;Don&#x27;t fail so loudly if default work item type is invalid&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;152962&quot;&gt;[17.0 backport] Project transfer fix for ES indexing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153304&quot;&gt;Ensure BLPOP&#x2F;BRPOP returns nil instead of raising ReadTimeoutError&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153574&quot;&gt;[17-0] Fix Sidekiq migration timeout&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16113&quot;&gt;16.11.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6919&quot;&gt;Makefile: update Git versions (v16.11 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;152328&quot;&gt;Revert removal of bitbucket_server_convert_mentions_to_users FF&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;152915&quot;&gt;Cherry pick print-out-release-environment-variables to 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;152891&quot;&gt;[16-11] Fix Sidekiq migration timeout&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153146&quot;&gt;Merge branch &#x27;rymai-master-patch-5345&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153302&quot;&gt;Ensure BLPOP&#x2F;BRPOP returns nil instead of raising ReadTimeoutError&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7602&quot;&gt;Draft: Update changelog for 16.11.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7586&quot;&gt;BACKPORT-16-11-stable: Use bundler to install Omnibus gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16106&quot;&gt;16.10.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6920&quot;&gt;Makefile: update Git versions (v16.10 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;152248&quot;&gt;Revert &quot;Remove bitbucket_server_convert_mentions_to_users feature flag&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;152916&quot;&gt;Cherry pick print-out-release-environment-variables to 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153147&quot;&gt;Merge branch &#x27;rymai-master-patch-5345&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;153301&quot;&gt;Ensure BLPOP&#x2F;BRPOP returns nil instead of raising ReadTimeoutError&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7585&quot;&gt;BACKPORT-16-10-stable: Use bundler to install Omnibus gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 17.0 released with generally available CI&#x2F;CD Catalog and AI Impact analytics dashboard</title>
<release>17.0</release>
<link href='https://about.gitlab.com/releases/2024/05/16/gitlab-17-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/05/16/gitlab-17-0-released/</id>
<published>2024-05-16T00:00:00+00:00</published>
<updated>2024-05-16T00:00:00+00:00</updated>
<author>
<name>Gabriel Engel</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 17.0 with &lt;a href=&quot;#cicd-catalog-with-components-and-inputs-now-generally-available&quot;&gt;generally available CI&#x2F;CD Catalog&lt;&#x2F;a&gt;, &lt;a href=&quot;#ai-impact-analytics-in-the-value-streams-dashboard&quot;&gt;AI Impact analytics dashboard&lt;&#x2F;a&gt;, &lt;a href=&quot;#introducing-hosted-runners-on-linux-arm&quot;&gt;hosted runners on Linux Arm&lt;&#x2F;a&gt;, &lt;a href=&quot;#introducing-deployment-detail-pages&quot;&gt;deployment detail pages&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 60+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the unbelievable 344 contributions you provided to GitLab 17.0!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;Join us to explore the new AI-powered features in GitLab 17 that will help you improve collaboration, visibility, security, and cycle times. Register for the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;seventeen&#x2F;&quot;&gt;GitLab 17 release virtual event: The future of AI-driven software development&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.1 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;17_0&#x2F;17_0-cover-image.svg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.9.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/05/09/gitlab-16-9-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/05/09/gitlab-16-9-8-released/</id>
<published>2024-05-09T00:00:00+00:00</published>
<updated>2024-05-09T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.9.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;bug-fixes&quot;&gt;Bug Fixes&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7593&quot;&gt;Pin parser dependency in chef-bin&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.11.2, 16.10.5, 16.9.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/05/08/patch-release-gitlab-16-11-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/05/08/patch-release-gitlab-16-11-2-released/</id>
<published>2024-05-08T00:00:00+00:00</published>
<updated>2024-05-08T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.11.2, 16.10.5, 16.9.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-branch-search-when-using-wildcards&quot;&gt;ReDoS in branch search when using wildcards&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-markdown-render-pipeline&quot;&gt;ReDoS in markdown render pipeline&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-on-discord-integrations&quot;&gt;Redos on Discord integrations&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-on-google-chat-integration&quot;&gt;Redos on Google Chat Integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-attack--via-pin-menu&quot;&gt;Denial of Service Attack via Pin Menu&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-by-filtering-tags-and-branches-via-the-api&quot;&gt;DoS by filtering tags and branches via the API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#mr-approval-via-csrf-in-saml-sso&quot;&gt;MR approval via CSRF in SAML SSO&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#banned-user-from-groups-can-read-issues-updates-via-the-api&quot;&gt;Banned user from groups can read issues updates via the api&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#require-confirmation-before-linking-jwt-identity&quot;&gt;Require confirmation before linking JWT identity&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#view-confidential-issues-title-and-description-of-any-public-project-via-export&quot;&gt;View confidential issues title and description of any public project via export&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ssrf-via-github-importer&quot;&gt;SSRF via Github importer&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;redos-in-branch-search-when-using-wildcards&quot;&gt;ReDoS in branch search when using wildcards&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.7 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible for an attacker to cause a denial of service by crafting unusual search terms for branch names.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2878&quot;&gt;CVE-2024-2878&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-markdown-render-pipeline&quot;&gt;ReDoS in markdown render pipeline&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. It was possible for an attacker to cause a denial of service using maliciously crafted markdown content.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2651&quot;&gt;CVE-2024-2651&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-on-discord-integrations&quot;&gt;Redos on Discord integrations&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.9 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. A problem with the processing logic for Discord Integrations Chat Messages can lead to a regular expression DoS attack on the server.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6682&quot;&gt;CVE-2023-6682&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;code&gt;Anonymizer&lt;&#x2F;code&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-on-google-chat-integration&quot;&gt;Redos on Google Chat Integration&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.11 prior to 16.11.2. A problem with the processing logic for Google Chat Messages integration may lead to a regular expression DoS attack on the server.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6688&quot;&gt;CVE-2023-6688&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;code&gt;Anonymizer&lt;&#x2F;code&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-attack-via-pin-menu&quot;&gt;Denial of Service Attack via Pin Menu&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.11 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. The pins endpoint is susceptible to DoS through a crafted request.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2454&quot;&gt;CVE-2024-2454&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ac7n0w&quot;&gt;ac7n0w&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dos-by-filtering-tags-and-branches-via-the-api&quot;&gt;DoS by filtering tags and branches via the API&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.4 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2 where abusing the API to filter branch and tags could lead to Denial of Service.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4539&quot;&gt;CVE-2024-4539&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported internally by a GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;vyaklushin&quot;&gt;Vasilii Iakliushin&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mr-approval-via-csrf-in-saml-sso&quot;&gt;MR approval via CSRF in SAML SSO&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions from 16.7 before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. An attacker could force a user with an active SAML session to approve an MR via CSRF.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4597&quot;&gt;CVE-2024-4597&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported internally by a GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;joernchen&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;banned-user-from-groups-can-read-issues-updates-via-the-api&quot;&gt;Banned user from groups can read issues updates via the api&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.2 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible to disclose updates to issues to a banned group member using the API.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1539&quot;&gt;CVE-2024-1539&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;require-confirmation-before-linking-jwt-identity&quot;&gt;Require confirmation before linking JWT identity&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.6 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2 in which cross-site request forgery may have been possible on GitLab instances configured to use JWT as an OmniAuth provider.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1211&quot;&gt;CVE-2024-1211&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sim4n6&quot;&gt;sim4n6&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;view-confidential-issues-title-and-description-of-any-public-project-via-export&quot;&gt;View confidential issues title and description of any public project via export&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 14.0 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible to disclose via the UI the confidential issues title and description from a public project to unauthorised instance users.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3976&quot;&gt;CVE-2024-3976&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ahacker1&quot;&gt;ahacker1&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ssrf-via-github-importer&quot;&gt;SSRF via Github importer&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.6).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6195&quot;&gt;CVE-2023-6195&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;imrerad&quot;&gt;imrerad&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;16112&quot;&gt;16.11.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6888&quot;&gt;ci: Remove license scanning job (16.11)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150488&quot;&gt;Backport &#x27;Zoekt: Fix exact search mode&#x27; into 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150600&quot;&gt;Return or display Gitlab version if GITLAB_KAS_VERSION is a SHA&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151040&quot;&gt;Allow self-managed instances to require licensed seats for Duo Chat&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151533&quot;&gt;Merge branch &#x27;release-environment-notification&#x27; into &#x27;16-11-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151526&quot;&gt;Changed the email validation for only encoded chars&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151547&quot;&gt;Backport &#x27;hide archived filter in search when project selected&#x27; 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151884&quot;&gt;Cherry-pick MR 151750 into &#x27;16-11-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7571&quot;&gt;Fix reconfigure failure if Redis node has Rails Sentinel config&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16105&quot;&gt;16.10.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6887&quot;&gt;ci: Remove license scanning job (16.10)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6890&quot;&gt;Upgrade gRPC to v1.62.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150602&quot;&gt;Return or display Gitlab version if GITLAB_KAS_VERSION is a SHA&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151535&quot;&gt;Merge branch &#x27;release-environment-notification&#x27; into &#x27;16-10-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151529&quot;&gt;Changed the email validation for only encoded chars&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151904&quot;&gt;Cherry-pick MR 151750 into &#x27;16-10-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1697&quot;&gt;16.9.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6886&quot;&gt;ci: Remove license scanning job (16.9)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150605&quot;&gt;Return or display Gitlab version if GITLAB_KAS_VERSION is a SHA&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151539&quot;&gt;Merge branch &#x27;release-environment-notification&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151530&quot;&gt;Changed the email validation for only encoded chars&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;151908&quot;&gt;Cherry-pick MR 151750 into &#x27;16-9-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/04/24/patch-release-gitlab-16-11-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/04/24/patch-release-gitlab-16-11-1-released/</id>
<published>2024-04-24T00:00:00+00:00</published>
<updated>2024-04-24T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.11.1, 16.10.4, 16.9.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;accidental-breaking-changes-in-kas-configuration&quot;&gt;Accidental breaking changes in KAS configuration&lt;&#x2F;h4&gt;

&lt;p&gt;The following KAS patch releases contain breaking changes from the %17.0 revision, because they were tagged from the wrong source (master instead of stable branches):&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;v16.11.1&lt;&#x2F;li&gt;
  &lt;li&gt;v16.10.4&lt;&#x2F;li&gt;
  &lt;li&gt;v16.9.6&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;The next GitLab patch release will fix those changes. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;458462&quot;&gt;Issue 458462&lt;&#x2F;a&gt; provides more information.&lt;&#x2F;p&gt;

&lt;p&gt;As a workaround KAS can be downgraded to the last release. Working KAS versions are:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;v16.11.0&lt;&#x2F;li&gt;
  &lt;li&gt;v16.10.1&lt;&#x2F;li&gt;
  &lt;li&gt;v16.9.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-account-takeover-under-certain-conditions-when-using-bitbucket-as-an-oauth-provider&quot;&gt;GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#path-traversal-leads-to-dos-and-restricted-file-read&quot;&gt;Path Traversal leads to DoS and Restricted File Read&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthenticated-redos-in-filefinder-when-using-wildcard-filters-in-project-file-search&quot;&gt;Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#personal-access-token-scopes-not-honoured-by-graphql-subscriptions&quot;&gt;Personal Access Token scopes not honoured by GraphQL subscriptions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#domain-based-restrictions-bypass-using-a-crafted-email-address&quot;&gt;Domain based restrictions bypass using a crafted email address&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;gitlab-account-takeover-under-certain-conditions-when-using-bitbucket-as-an-oauth-provider&quot;&gt;GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 7.8 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker with their Bitbucket account credentials may be able to take over a GitLab account linked to another user&#x27;s Bitbucket account, if Bitbucket is used as an OAuth 2.0 provider on GitLab.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4024&quot;&gt;CVE-2024-4024&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team members &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;SamWord&quot;&gt;Sam Word&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;rodrigo.tomonari&quot;&gt;Rodrigo Tomonari&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;On 2024-04-24, GitLab changed the way Bitbucket authentication works with GitLab. To continue using Bitbucket Authentication, please sign in to GitLab with your Bitbucket account credentials, before 2024-05-16.&lt;&#x2F;p&gt;

&lt;p&gt;If you do not sign into GitLab using your Bitbucket account until after 2024-05-16, you will need to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;#sign-in-services&quot;&gt;re-link your Bitbucket account&lt;&#x2F;a&gt; to your GitLab account manually. For some users, signing in to GitLab using their Bitbucket account may not work after this fix is applied. If this happens to you, your Bitbucket and GitLab accounts have different email addresses. To resolve this, you must log in to your GitLab account with your GitLab username and password and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;#sign-in-services&quot;&gt;re-link your Bitbucket account&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;path-traversal-leads-to-dos-and-restricted-file-read&quot;&gt;Path Traversal leads to DoS and Restricted File Read&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions of GitLab CE&#x2F;EE  16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 8.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2434&quot;&gt;CVE-2024-2434&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unauthenticated-redos-in-filefinder-when-using-wildcard-filters-in-project-file-search&quot;&gt;Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2829&quot;&gt;CVE-2024-2829&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;personal-access-token-scopes-not-honoured-by-graphql-subscriptions&quot;&gt;Personal Access Token scopes not honoured by GraphQL subscriptions&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.7 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1 where personal access scopes were not honored by GraphQL subscriptions.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-4006&quot;&gt;CVE-2024-4006&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was internally discovered and reported by a GitLab team member, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;DylanGriffith&quot;&gt;Dylan Griffith&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;domain-based-restrictions-bypass-using-a-crafted-email-address&quot;&gt;Domain based restrictions bypass using a crafted email address&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1347&quot;&gt;CVE-2024-1347&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;garethheyes&quot;&gt;garethheyes&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;16111&quot;&gt;16.11.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150027&quot;&gt;Backport fixing release environment pipeline triggering rule to 16.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7556&quot;&gt;Fix for missing branch_build_package_download_url&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7559&quot;&gt;Fix missing arguments when PostgreSQL upgrade times out&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;16104&quot;&gt;16.10.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6825&quot;&gt;go.mod: Update &lt;code&gt;golang.org&#x2F;x&#x2F;net&lt;&#x2F;code&gt; dependency&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;149253&quot;&gt;Update vulnerability_reads scanner in the ingestion pipeline&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;149810&quot;&gt;Fix migration error when updating from GitLab 16.x to 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150029&quot;&gt;Backport fixing release environment pipeline triggering rule to 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1696&quot;&gt;16.9.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;150030&quot;&gt;Backport fixing release environment pipeline triggering rule to 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.11 released with GitLab Duo Chat general availability</title>
<release>16.11</release>
<link href='https://about.gitlab.com/releases/2024/04/18/gitlab-16-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/04/18/gitlab-16-11-released/</id>
<published>2024-04-18T00:00:00+00:00</published>
<updated>2024-04-18T00:00:00+00:00</updated>
<author>
<name>Loryn Bortins</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.11 with &lt;a href=&quot;#gitlab-duo-chat-now-generally-available&quot;&gt;GitLab Duo Chat general availability&lt;&#x2F;a&gt;, &lt;a href=&quot;#understand-your-users-better-with-product-analytics&quot;&gt;Product Analytics general availability&lt;&#x2F;a&gt;, &lt;a href=&quot;#security-policy-scopes&quot;&gt;Security policy scopes&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 40+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 190+ contributions you provided to GitLab 16.11!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 17.0 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_11&#x2F;16_11-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.10.3, 16.9.5, 16.8.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/04/15/gitlab-16-10-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/04/15/gitlab-16-10-3-released/</id>
<published>2024-04-15T00:00:00+00:00</published>
<updated>2024-04-15T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.10.3, 16.9.5, 16.8.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;16103&quot;&gt;16.10.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7538&quot;&gt;Fix patroni no longer working with update to ydiff 1.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1695&quot;&gt;16.9.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6811&quot;&gt;Update Go packages to address vulnerabilities in 16-9-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6807&quot;&gt;Make Gitaly no downtime upgrades work again in 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7537&quot;&gt;Fix patroni no longer working with update to ydiff 1.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1687&quot;&gt;16.8.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7536&quot;&gt;Fix patroni no longer working with update to ydiff 1.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.10.2, 16.9.4, 16.8.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/04/10/patch-release-gitlab-16-10-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/04/10/patch-release-gitlab-16-10-2-released/</id>
<published>2024-04-10T00:00:00+00:00</published>
<updated>2024-04-10T00:00:00+00:00</updated>
<author>
<name>Greg Alfaro</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.10.2, 16.9.4, 16.8.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;engineering&#x2F;releases&#x2F;&quot;&gt;releases handbook&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of GitLab release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For security fixes, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fixes&quot;&gt;Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;table-of-security-fixes&quot;&gt;Table of security fixes&lt;&#x2F;h3&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-injected-in-diff-viewer&quot;&gt;Stored XSS injected in diff viewer&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-via-autocomplete-results&quot;&gt;Stored XSS via autocomplete results&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-on-integrations-chat-messages&quot;&gt;Redos on Integrations Chat Messages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-during-parse-junit-test-report&quot;&gt;Redos During Parse Junit Test Report&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;stored-xss-injected-in-diff-viewer&quot;&gt;Stored XSS injected in diff viewer&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. A payload may lead to a stored XSS while using the diff viewer, allowing attackers to perform arbitrary actions on behalf of victims.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-3092&quot;&gt;CVE-2024-3092&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;stored-xss-via-autocomplete-results&quot;&gt;Stored XSS via autocomplete results&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.7 to 16.8.6 all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. Using the autocomplete for issues references feature a crafted payload may lead to a stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2279&quot;&gt;CVE-2024-2279&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-on-integrations-chat-messages&quot;&gt;Redos on Integrations Chat Messages&lt;&#x2F;h3&gt;

&lt;p&gt;A denial of service vulnerability was identified in GitLab CE&#x2F;EE, versions 16.7.7 prior to 16.8.6, 16.9 prior to 16.9.4 and 16.10 prior to 16.10.2 which allows an attacker to spike the GitLab instance resources usage resulting in service degradation via chat integration feature.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6489&quot;&gt;CVE-2023-6489&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;code&gt;Anonymizer&lt;&#x2F;code&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-during-parse-junit-test-report&quot;&gt;Redos During Parse Junit Test Report&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions before 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. It was possible for an attacker to cause a  denial of service using malicious crafted content in a junit test report file.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6678&quot;&gt;CVE-2023-6678&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;code&gt;Anonymizer&lt;&#x2F;code&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;16102&quot;&gt;16.10.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147975&quot;&gt;Quarantine flaky atomic processing ResetSkippedJobsService specs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148103&quot;&gt;Fix include_optional_metrics_in_service_ping during migration to 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148227&quot;&gt;Use alpine:latest instead of alpine:edge in CI images [16.10]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147937&quot;&gt;[16.10] Backport Delete callback should use namespace_id&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148417&quot;&gt;[16.10] Backport handle null owner when indexing projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147942&quot;&gt;Backport Zoekt: Retry indexing if too many requests to 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148687&quot;&gt;Backport https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148596&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148663&quot;&gt;Fix URL validator for mirror services when using localhost&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148571&quot;&gt;Backport !148105 into 16.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7503&quot;&gt;Cherry-pick &#x27;fix-omnibus-gitconfig-deprecation&#x27; into &#x27;16-10-stable&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1694&quot;&gt;16.9.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147985&quot;&gt;Quarantine flaky atomic processing ResetSkippedJobsService specs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148229&quot;&gt;Use alpine:latest instead of alpine:edge in CI images [16.9]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1686&quot;&gt;16.8.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147986&quot;&gt;Quarantine flaky atomic processing ResetSkippedJobsService specs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;148231&quot;&gt;Use alpine:latest instead of alpine:edge in CI images [16.8]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-patch-notifications&quot;&gt;Receive Patch Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive patch blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;patch release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.10.1, 16.9.3, 16.8.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/03/27/security-release-gitlab-16-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/03/27/security-release-gitlab-16-10-1-released/</id>
<published>2024-03-27T00:00:00+00:00</published>
<updated>2024-03-27T00:00:00+00:00</updated>
<author>
<name>Kevin Morrison</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.10.1, 16.9.3, 16.8.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-injected-in-wiki-page-via-banzai-pipeline&quot;&gt;Stored-XSS injected in Wiki page via Banzai pipeline&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-using-crafted-emojis&quot;&gt;DOS using crafted emojis&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;stored-xss-injected-in-wiki-page-via-banzai-pipeline&quot;&gt;Stored-XSS injected in Wiki page via Banzai pipeline&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 16.8.5, all versions starting from 16.9 before 16.9.3, all versions starting from 16.10 before 16.10.1. A wiki page with a crafted payload may lead to a Stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6371&quot;&gt;CVE-2023-6371&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dos-using-crafted-emojis&quot;&gt;DOS using crafted emojis&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 16.8.5, all versions starting from 16.9 before 16.9.3, all versions starting from 16.10 before 16.10.1. It was possible for an attacker to cause a denial of service using malicious crafted description parameter for labels.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-2818&quot;&gt;CVE-2024-2818&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Quintin Crist of Trend Micro for reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;bump-postgresql-to-1314-1411&quot;&gt;Bump PostgreSQL to 13.14, 14.11&lt;&#x2F;h3&gt;

&lt;p&gt;The PostgreSQL project released an update so we are updating to versions 13.14 and 14.11.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;16101&quot;&gt;16.10.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1767&quot;&gt;CI: bump CI_TOOLS_VERSIONS to 5.8.0 (Backport 16.10)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6778&quot;&gt;Backport protobuf and pgx upgrades [16.10]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147552&quot;&gt;Fix new project group templates pagination (16-10-stable-ee)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147704&quot;&gt;Update redis-client to v0.21.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1693&quot;&gt;16.9.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1768&quot;&gt;CI: bump CI_TOOLS_VERSIONS to 5.8.0 (Backport 16.9)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6780&quot;&gt;Backport protobuf and pgx upgrades [16.9]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146777&quot;&gt;Fix detect-tests CI job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146820&quot;&gt;Collect the artifacts from the same namespace&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;147554&quot;&gt;Fix new project group templates pagination (16-9-stable-ee)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7471&quot;&gt;Backport: RSpec changes for .com handling nightly packages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1685&quot;&gt;16.8.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1769&quot;&gt;CI: bump CI_TOOLS_VERSIONS to 5.8.0 (Backport 16.8)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146774&quot;&gt;Fix detect-tests CI job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7472&quot;&gt;Backport: RSpec changes for .com handling nightly packages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7479&quot;&gt;Backport c2a94ae8 for creating stable tag for 16-8-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;were-combining-patch-and-security-releases&quot;&gt;We’re combining patch and security releases&lt;&#x2F;h2&gt;

&lt;p&gt;This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2024&#x2F;03&#x2F;26&#x2F;were-combining-patch-and-security-releases&#x2F;&quot;&gt;read the blog post here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.10 released with semantic versioning in the CI&#x2F;CD catalog</title>
<release>16.10</release>
<link href='https://about.gitlab.com/releases/2024/03/21/gitlab-16-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/03/21/gitlab-16-10-released/</id>
<published>2024-03-21T00:00:00+00:00</published>
<updated>2024-03-21T00:00:00+00:00</updated>
<author>
<name>Torsten Linz</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.10 with &lt;a href=&quot;#semantic-versioning-in-the-cicd-catalog&quot;&gt;semantic versioning coming to the CI&#x2F;CD catalog&lt;&#x2F;a&gt;, &lt;a href=&quot;#wiki-templates&quot;&gt;wiki templates&lt;&#x2F;a&gt;, &lt;a href=&quot;#offload-ci-traffic-to-geo-secondaries&quot;&gt;the possibility to offload CI traffic to geo secondaries&lt;&#x2F;a&gt;, &lt;a href=&quot;#new-clickhouse-integration-for-high-performance-devops-analytics&quot;&gt;new ClickHouse integration for high-performance DevOps analytics&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 90+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 170+ contributions you provided to GitLab 16.10!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.11 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_10&#x2F;16_10-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.9.2, 16.8.4, 16.7.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/03/06/security-release-gitlab-16-9-2-released/</id>
<published>2024-03-06T00:00:00+00:00</published>
<updated>2024-03-06T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>
&lt;p&gt;Today we are releasing versions 16.9.2, 16.8.4, 16.7.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-codeowners-approval-allowing-to-steal-protected-variables&quot;&gt;Bypassing CODEOWNERS approval allowing to steal protected variables&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-with-manage-group-access-tokens-can-rotate-and-see-group-access-token-with-owner-permissions&quot;&gt;Guest with manage group access tokens can rotate and see group access token with owner permissions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;bypassing-codeowners-approval-allowing-to-steal-protected-variables&quot;&gt;Bypassing CODEOWNERS approval allowing to steal protected variables&lt;&#x2F;h3&gt;

&lt;p&gt;An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload in an old feature branch to perform malicious actions.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-0199&quot;&gt;CVE-2024-0199&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ali_shehab&quot;&gt;ali_shehab&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;guest-with-manage-group-access-tokens-can-rotate-and-see-group-access-token-with-owner-permissions&quot;&gt;Guest with manage group access tokens can rotate and see group access token with owner permissions&lt;&#x2F;h3&gt;

&lt;p&gt;A privilege escalation vulnerability was discovered in GitLab affecting versions 16.8 prior to 16.8.4 and 16.9 prior to 16.9.2. It was possible for a user with custom role of &lt;code&gt;manage_group_access_tokens&lt;&#x2F;code&gt; to rotate group access tokens with owner privileges.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1299&quot;&gt;CVE-2024-1299&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upgrade-kubectl-to-the-latest-stable-version&quot;&gt;Upgrade Kubectl to the latest stable version&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;code&gt;kubectl&lt;&#x2F;code&gt; has been updated to version 1.29.2.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-updates-february-14-2024&quot;&gt;Mattermost Security Updates February 14, 2024&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost has been updated to version 9.5, which contains several patches and security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1692&quot;&gt;16.9.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146113&quot;&gt;Merge branch &#x27;hm-rescue-stale-element-error-in-base&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146033&quot;&gt;Fix broken master&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146202&quot;&gt;Use fixed date for failing specs [16.9]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146031&quot;&gt;Backport &#x27;pb-fix-broken-master-elastic&#x27; into 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;145946&quot;&gt;Backport Fix Search::Zoekt.index? logic to 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146036&quot;&gt;Backport &#x27;Don&#x27;t escape search term in modal twice&#x27; into 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146315&quot;&gt;Backport &#x27;add-praefect-to-release-environment-template&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146035&quot;&gt;Backport &#x27;Shows branch name in non-blob…scopes&#x27;  into 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146181&quot;&gt;Backport: Geo - Fix container repositories checksum mismatch errors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146074&quot;&gt;Backport 145801 (Fix CI linter error when repository is empty) to 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7444&quot;&gt;Merge branch &#x27;remove-pi-os-12-release&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;145036&quot;&gt;Backport to 16.9: Fix Geo: Personal snippets not syncing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1684&quot;&gt;16.8.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;145037&quot;&gt;Backport to 16.8: Fix Geo: Personal snippets not syncing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;145451&quot;&gt;Backport to 16.8: Fix pg_dump failing with multiple PG read-replicas&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146233&quot;&gt;Update tests for broken 16.8&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146316&quot;&gt;Backport &#x27;add-praefect-to-release-environment-template&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146183&quot;&gt;Backport: Geo - Fix container repositories checksum mismatch errors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146073&quot;&gt;Backport 145801 (Fix CI linter error when repository is empty) to 16.8&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1677&quot;&gt;16.7.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;145569&quot;&gt;Backport to 16.7: Fix pg_dump failing with multiple PG read-replicas&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;146318&quot;&gt;Merge branch &#x27;add-praefect-to-release-environment-template&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update GitLab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.9.1, 16.8.3, 16.7.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/02/21/security-release-gitlab-16-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/02/21/security-release-gitlab-16-9-1-released/</id>
<published>2024-02-21T00:00:00+00:00</published>
<updated>2024-02-21T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.9.1, 16.8.3, 16.7.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-users-profile-page&quot;&gt;Stored-XSS in user&#x27;s profile page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-with-admin_group_members-permission-can-invite-other-groups-to-gain-owner-access&quot;&gt;User with &quot;admin_group_members&quot; permission can invite other groups to gain owner access&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-issue-in-the-codeowners-reference-extractor&quot;&gt;ReDoS issue in the Codeowners reference extractor&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ldap-user-can-reset-password-using-secondary-email-and-login-using-direct-authentication&quot;&gt;LDAP user can reset password using secondary email and login using direct authentication&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-group-ip-restriction-settings-to-access-environment-details-of-projects-through-environmentsoperations-dashboard&quot;&gt;Bypassing group ip restriction settings to access environment details of projects through Environments&#x2F;Operations Dashboard&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#users-with-the-guest-role-can-change-custom-dashboard-projects-settings-for-projects-in-the-victim-group&quot;&gt;Users with the &lt;code&gt;Guest&lt;&#x2F;code&gt; role can change &lt;code&gt;Custom dashboard projects&lt;&#x2F;code&gt; settings for projects in the victim group&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-member-with-sub-maintainer-role-can-change-title-of-shared-private-deploy-keys&quot;&gt;Group member with sub-maintainer role can change title of shared private deploy keys&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-approvals-of-codeowners&quot;&gt;Bypassing approvals of CODEOWNERS&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;stored-xss-in-users-profile-page&quot;&gt;Stored-XSS in user&#x27;s profile page&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting version 16.9 only. A crafted payload added to the user profile page could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1451&quot;&gt;CVE-2024-1451&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;user-with-admin_group_members-permission-can-invite-other-groups-to-gain-owner-access&quot;&gt;User with &quot;admin_group_members&quot; permission can invite other groups to gain owner access&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. When a user is assigned a custom role with admin_group_member permission, they may be able to make a group, other members or themselves Owners of that group, which may lead to privilege escalation. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:L&lt;&#x2F;code&gt;, 6.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6477&quot;&gt;CVE-2023-6477&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-issue-in-the-codeowners-reference-extractor&quot;&gt;ReDoS issue in the Codeowners reference extractor&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 11.3 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted content in the CODEOWNERS file.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6736&quot;&gt;CVE-2023-6736&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ldap-user-can-reset-password-using-secondary-email-and-login-using-direct-authentication&quot;&gt;LDAP user can reset password using secondary email and login using direct authentication&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.1 before 16.7.2, all versions starting from 16.8 before 16.8.2, all versions starting from 16.9 before 16.9.2. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1525&quot;&gt;CVE-2024-1525&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by a GitLab team member, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;dblessing&quot;&gt;Drew Blessing&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;bypassing-group-ip-restriction-settings-to-access-environment-details-of-projects-through-environmentsoperations-dashboard&quot;&gt;Bypassing group ip restriction settings to access environment details of projects through Environments&#x2F;Operations Dashboard&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.0 to 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. This vulnerability allows for bypassing the &#x27;group ip restriction&#x27; settings to access environment details of projects. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4895&quot;&gt;CVE-2023-4895&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;albatraoz&quot;&gt;albatraoz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;users-with-the-guest-role-can-change-custom-dashboard-projects-settings-for-projects-in-the-victim-group&quot;&gt;Users with the &lt;code&gt;Guest&lt;&#x2F;code&gt; role can change &lt;code&gt;Custom dashboard projects&lt;&#x2F;code&gt; settings for projects in the victim group&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the &lt;code&gt;Guest&lt;&#x2F;code&gt; role can change &lt;code&gt;Custom dashboard projects&lt;&#x2F;code&gt; settings contrary to permissions. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-0861&quot;&gt;CVE-2024-0861&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;them4les_l1r&quot;&gt;them4les_l1r&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;group-member-with-sub-maintainer-role-can-change-title-of-shared-private-deploy-keys&quot;&gt;Group member with sub-maintainer role can change title of shared private deploy keys&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. It was possible for group members with sub-maintainer role to change the title of privately accessible deploy keys associated with projects in the group.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3509&quot;&gt;CVE-2023-3509&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;bypassing-approvals-of-codeowners&quot;&gt;Bypassing approvals of CODEOWNERS&lt;&#x2F;h3&gt;

&lt;p&gt;An authorization bypass vulnerability was discovered in GitLab affecting versions 15.1 prior to 16.7.6, 16.8 prior to 16.8.3, and 16.9 prior to 16.9.1. A developer could bypass CODEOWNERS approvals by creating a merge conflict. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-0410&quot;&gt;CVE-2024-0410&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ali_shehab&quot;&gt;ali_shehab&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;441094&quot;&gt;Invalidate markdown cache to clear up stored XSS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1691&quot;&gt;16.9.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144758&quot;&gt;Merge branch &#x27;ac-fix-16-9-0-changelog&#x27; into &#x27;master&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144759&quot;&gt;[Backport] Revert &#x27;437616_fix_changelog_tag_detection&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144956&quot;&gt;Backport Web IDE upgrade into 16.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144995&quot;&gt;Fix deny_all_requests_except_allowed of AddressableUrlValidator&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144952&quot;&gt;Introduce back ci_pipeline_variables routing table FF&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1683&quot;&gt;16.8.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6674&quot;&gt;Backport &#x27;jc&#x2F;fix-add-tree-entry&#x27; into 16-8-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144119&quot;&gt;Allow creation of group-level custom-roles on self-managed instances&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144217&quot;&gt;Backport &#x27;Fix stable cache for quick actions&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144355&quot;&gt;Fix X.509 commit signing for OpenSSL 3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144349&quot;&gt;Fix urlblocker validate calls with more options&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1676&quot;&gt;16.7.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6675&quot;&gt;Backport jc&#x2F;fix-add-tree-entry into 16-7-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;144357&quot;&gt;Fix X.509 commit signing for OpenSSL 3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.9 released with wider Beta access for Duo Chat</title>
<release>16.9</release>
<link href='https://about.gitlab.com/releases/2024/02/15/gitlab-16-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/02/15/gitlab-16-9-released/</id>
<published>2024-02-15T00:00:00+00:00</published>
<updated>2024-02-15T00:00:00+00:00</updated>
<author>
<name>Tim Rizzi</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.9 with &lt;a href=&quot;#gitlab-duo-chat-beta-now-available-in-premium&quot;&gt;GitLab Duo Chat&lt;&#x2F;a&gt; now available for Premium SaaS and self-managed customers, the ability to &lt;a href=&quot;#request-changes-on-merge-requests&quot;&gt;request changes in a merge request&lt;&#x2F;a&gt; without blocking the merge, &lt;a href=&quot;#improvements-to-the-cicd-variables-user-interface&quot;&gt;usability improvements to the CI&#x2F;CD variables page&lt;&#x2F;a&gt;, &lt;a href=&quot;#expanded-options-for-auto-canceling-pipelines&quot;&gt;more options for auto-canceling pipelines&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 80+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 200+ contributions you provided to GitLab 16.9!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.10 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_9&#x2F;16_9-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.8.2, 16.7.5, 16.6.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/02/07/security-release-gitlab-16-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/02/07/security-release-gitlab-16-8-2-released/</id>
<published>2024-02-07T00:00:00+00:00</published>
<updated>2024-02-07T00:00:00+00:00</updated>
<author>
<name>Ottilia Westerlund</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.8.2, 16.7.5, 16.6.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#restrict-group-access-token-creation-for-custom-roles&quot;&gt;Restrict group access token creation for custom roles&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-maintainers-can-bypass-groups-scan-result-policy-block_branch_modification-setting&quot;&gt;Project maintainers can bypass group&#x27;s scan result policy &lt;code&gt;block_branch_modification&lt;&#x2F;code&gt; setting&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-ci&#x2F;cd-pipeline-editor-while-verifying-pipeline-syntax&quot;&gt;ReDoS in CI&#x2F;CD Pipeline Editor while verifying Pipeline syntax&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#resource-exhaustion-using-graphql-vulnerabilitiescountbyday&quot;&gt;Resource exhaustion using GraphQL &lt;code&gt;vulnerabilitiesCountByDay&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;restrict-group-access-token-creation-for-custom-roles&quot;&gt;Restrict group access token creation for custom roles&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.8 before 
16.8.2. When a user is assigned a custom role with manage_group_access_tokens permission, 
they may be able to create group access tokens with Owner privileges, which may lead to privilege escalation. 
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). 
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1250&quot;&gt;CVE-2024-1250&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;rshambhuni&quot;&gt;Rohit Shambhuni&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-maintainers-can-bypass-groups-scan-result-policy-block_branch_modification-setting&quot;&gt;Project maintainers can bypass group&#x27;s scan result policy &lt;code&gt;block_branch_modification&lt;&#x2F;code&gt; setting&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions from 16.4 prior to 16.6.7, 16.7 prior to 16.7.5, and 16.8 prior to 16.8.2 which allows a maintainer to change the name of a protected branch that bypasses the security policy added to block MR.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 6.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6840&quot;&gt;CVE-2023-6840&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-cicd-pipeline-editor-while-verifying-pipeline-syntax&quot;&gt;ReDoS in CI&#x2F;CD Pipeline Editor while verifying Pipeline syntax.&lt;&#x2F;h3&gt;

&lt;p&gt;A denial of service vulnerability was identified in GitLab CE&#x2F;EE, affecting all versions from 15.11 prior to 16.6.7, 16.7 prior to 16.7.5 and 16.8 prior to 16.8.2 which allows an attacker to spike the GitLab instance resource usage resulting in service degradation.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6386&quot;&gt;CVE-2023-6386&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;code&gt;Anonymizer&lt;&#x2F;code&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;resource-exhaustion-using-graphql-vulnerabilitiescountbyday&quot;&gt;Resource exhaustion using GraphQL &lt;code&gt;vulnerabilitiesCountByDay&lt;&#x2F;code&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions from 13.3.0 prior to 16.6.7, 16.7 prior to 16.7.5, and 16.8 prior to 16.8.2 which allows an attacker to do a resource exhaustion using GraphQL &lt;code&gt;vulnerabilitiesCountByDay&lt;&#x2F;code&gt;.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-1066&quot;&gt;CVE-2024-1066&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;bwill&quot;&gt;Brian Williams&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-to-postgresql-1410-and-1313&quot;&gt;Update to PostgreSQL 14.10 and 13.13&lt;&#x2F;h3&gt;

&lt;p&gt;PostgreSQL has been updated.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1682&quot;&gt;16.8.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1714&quot;&gt;Gitaly: properly set PYTHON_TAG in CI, for Dockerfile (16.8)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142960&quot;&gt;Update GDK base build image and update QA GEM&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142919&quot;&gt;Revert &quot;Validate scopes for importing collaborators&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142926&quot;&gt;Backport !142896 into 16.8 stable branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143172&quot;&gt;Update dependency prometheus-client-mmap to &#x27;~&amp;gt; 1.1&#x27;, &#x27;&amp;gt;= 1.1.1&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143173&quot;&gt;Defer ConnectionPool instrumentation setup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143302&quot;&gt;Add item_to_preload method in helper and migrations to prevent N+1 query&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143316&quot;&gt;Fix bug for devfile with multiple container components&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143526&quot;&gt;Backport &quot;Fix Redis 6.0 compatibility breakage with Sidekiq 7 gem&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142906&quot;&gt;Finalize UUID backfilling before performing cleanup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7402&quot;&gt;Backport - Ensure post upgrade steps are run after geo_pg_upgrade&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1675&quot;&gt;16.7.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143174&quot;&gt;Update dependency prometheus-client-mmap to &#x27;~&amp;gt; 1.1&#x27;, &#x27;&amp;gt;= 1.1.1&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143500&quot;&gt;Backport UUID migration finalization to 16.7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1667&quot;&gt;16.6.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1708&quot;&gt;Add missing IMAGE_TAG_EXT to referenced PostgreSQL image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;143579&quot;&gt;Backport: Update GDK base build image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7388&quot;&gt;[Backport] Control runner tags for package promotion via env vars&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 16.8.1, 16.7.4, 16.6.6, 16.5.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/</id>
<published>2024-01-25T00:00:00+00:00</published>
<updated>2024-01-25T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.8.1, 16.7.4, 16.6.6, 16.5.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com and GitLab Dedicated environments are already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-file-write-while-creating-workspace&quot;&gt;Arbitrary file write while creating workspace&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-cargotoml-blob-viewer&quot;&gt;ReDoS in &lt;code&gt;Cargo.toml&lt;&#x2F;code&gt; blob viewer&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-api-put-requests-via-html-injection-in-users-name&quot;&gt;Arbitrary API PUT requests via HTML injection in user&#x27;s name&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-the-public-email-in-tags-rss-feed&quot;&gt;Disclosure of the public email in Tags RSS Feed&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#non-member-can-update-mr-assignees-of-owned-mrs&quot;&gt;Non-Member can update MR Assignees of owned MRs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;arbitrary-file-write-while-creating-workspace&quot;&gt;Arbitrary file write while creating workspace&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16.0 prior to 16.5.8, 16.6 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 which allows an authenticated user to write files to arbitrary locations on the GitLab server while creating a workspace.
This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 9.9).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-0402&quot;&gt;CVE-2024-0402&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;The fix for this security vulnerability has been backported to 16.5.8 in addition to 16.6.6, 16.7.4, and 16.8.1. GitLab 16.5.8 &lt;em&gt;only&lt;&#x2F;em&gt; includes a fix for this vulnerability and does &lt;em&gt;not&lt;&#x2F;em&gt; contain any of the other fixes or changes mentioned in this blog post.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;joernchen&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;redos-in-cargotoml-blob-viewer&quot;&gt;ReDoS in &lt;code&gt;Cargo.toml&lt;&#x2F;code&gt; blob viewer&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a &lt;code&gt;Cargo.toml&lt;&#x2F;code&gt; containing maliciously crafted input.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6159&quot;&gt;CVE-2023-6159&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;arbitrary-api-put-requests-via-html-injection-in-users-name&quot;&gt;Arbitrary API PUT requests via HTML injection in user&#x27;s name&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions after 13.7 before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Improper input sanitization of user name allows arbitrary API PUT requests.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.4).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5933&quot;&gt;CVE-2023-5933&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;disclosure-of-the-public-email-in-tags-rss-feed&quot;&gt;Disclosure of the public email in Tags RSS Feed&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5612&quot;&gt;CVE-2023-5612&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;erruqill&quot;&gt;erruqill&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;non-member-can-update-mr-assignees-of-owned-mrs&quot;&gt;Non-Member can update MR Assignees of owned MRs&lt;&#x2F;h3&gt;

&lt;p&gt;An authorization vulnerability exists in GitLab versions 14.0 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. An unauthorized attacker is able to assign arbitrary users to MRs that they created within the project .
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2024-0456&quot;&gt;CVE-2024-0456&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Taucher2003&quot;&gt;Niklas&lt;&#x2F;a&gt; for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-xmlsoftlibxml2-to--v2116&quot;&gt;Update xmlsoft&#x2F;libxml2 to &amp;gt;= v2.11.6&lt;&#x2F;h3&gt;

&lt;p&gt;The &lt;code&gt;xmlsoft&#x2F;libxml2&lt;&#x2F;code&gt; version has been upgraded to 2.12.3 to mitigate &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-45322&quot;&gt;CVE-2023-45322&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upgrade-redis-to-address-cve-2023-41056-redis-rce&quot;&gt;Upgrade redis to address CVE-2023-41056 (Redis RCE)&lt;&#x2F;h3&gt;

&lt;p&gt;Redis has been upgraded to version 7.0.15 to mitigate &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-41056&quot;&gt;CVE-2023-41056&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1681&quot;&gt;16.8.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142344&quot;&gt;Update dependency gitlab-glfm-markdown to &#x27;~&amp;gt; 0.0.11&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142307&quot;&gt;Backport Redis migration to 16.8&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142398&quot;&gt;[Backport] Optimize garbage collection process&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;142628&quot;&gt;[Backport] Bump GitLab Shell version to 14.33.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1674&quot;&gt;16.7.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141413&quot;&gt;Backport - Bring legacy verification behavior back for repositories&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7352&quot;&gt;Sync chef-gem and chef-bin (16.7)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1666&quot;&gt;16.6.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141821&quot;&gt;Backport: Move release-environments pipeline to be sourced from master&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141412&quot;&gt;Backport - Bring legacy verification behavior back for repositories&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.8 released with Google Cloud Secret Manager support and the ability to speed up your builds with the Maven dependency proxy</title>
<release>16.8</release>
<link href='https://about.gitlab.com/releases/2024/01/18/gitlab-16-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/01/18/gitlab-16-8-released/</id>
<published>2024-01-18T00:00:00+00:00</published>
<updated>2024-01-18T00:00:00+00:00</updated>
<author>
<name>Jocelyn Eillis</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.8 with &lt;a href=&quot;#google-cloud-secret-manager-support&quot;&gt;Google Cloud Secret Manager support&lt;&#x2F;a&gt;, &lt;a href=&quot;#speed-up-your-builds-with-the-maven-dependency-proxy&quot;&gt;the ability to speed up your builds with the Maven dependency proxy&lt;&#x2F;a&gt;, &lt;a href=&quot;#workspaces-are-now-generally-available&quot;&gt;general availability of Workspaces&lt;&#x2F;a&gt;, &lt;a href=&quot;#new-organization-level-devops-view-with-dora-based-industry-benchmarks&quot;&gt;
new organization-level DevOps view with DORA-based industry benchmarks&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 25+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 207 contributions you provided to GitLab 16.8!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.9 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_8&#x2F;16_8-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.7.3 16.6.5 16.5.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/01/12/gitlab-16-7-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/01/12/gitlab-16-7-3-released/</id>
<published>2024-01-12T00:00:00+00:00</published>
<updated>2024-01-12T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions &lt;code&gt;16.7.3&lt;&#x2F;code&gt; &lt;code&gt;16.6.5&lt;&#x2F;code&gt; &lt;code&gt;16.5.7&lt;&#x2F;code&gt; for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a single issue with a database migration.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1673&quot;&gt;16.7.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141704&quot;&gt;Make chat_names table migration idempotent&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1665&quot;&gt;16.6.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141705&quot;&gt;Make chat_names table migration idempotent&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1657&quot;&gt;16.5.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141706&quot;&gt;Make chat_names table migration idempotent&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version fixes an &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;8371&quot;&gt;issue with an existing migration that prevented upgrades from completing&lt;&#x2F;a&gt;. It does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 16.7.2, 16.6.4, 16.5.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/</id>
<published>2024-01-11T00:00:00+00:00</published>
<updated>2024-01-11T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.7.2, 16.6.4, 16.5.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases fixes for security vulnerabilities in security releases.
For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;. If you have not upgraded yet, be aware that there is &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2024&#x2F;01&#x2F;12&#x2F;gitlab-16-7-3-released&#x2F;&quot;&gt;a newer patch&lt;&#x2F;a&gt; that includes additional fixes for recently discovered DB migration issue. Please upgrade to 16.7.3, 16.6.5, 16.5.7, or newer to prevent the migration issue.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#account-takeover-via-password-reset-without-user-interactions&quot;&gt;Account Takeover via password reset without user interactions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypass-codeowners-approval-removal&quot;&gt;Bypass CODEOWNERS approval removal&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#attacker-can-abuse-slackmattermost-integrations-to-execute-slash-commands-as-another-user&quot;&gt;Attacker can abuse Slack&#x2F;Mattermost integrations to execute slash commands as another user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#workspaces-able-to-be-created-under-different-root-namespace&quot;&gt;Workspaces able to be created under different root namespace&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#commit-signature-validation-ignores-headers-after-signature&quot;&gt;Commit signature validation ignores headers after signature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;account-takeover-via-password-reset-without-user-interactions&quot;&gt;Account Takeover via Password Reset without user interactions&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
This is a Critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 10.0).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-7028&quot;&gt;CVE-2023-7028&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This security fix has been backported to GitLab versions and 16.1.6, 16.2.9, 16.3.7, and 16.4.5 in addition to 16.5.6, 16.6.4, and 16.7.2.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;asterion04&quot;&gt;asterion04&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;faq&quot;&gt;FAQ&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;strong&gt;What should I do if I believe my GitLab instance is compromised?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;In addition to following your incident response plan&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Apply the Critical Security Release to your GitLab instance&lt;&#x2F;li&gt;
  &lt;li&gt;Enable &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;two_factor_authentication.html&quot;&gt;Two-Factor Authentication&lt;&#x2F;a&gt; (2FA) for all GitLab accounts&lt;&#x2F;li&gt;
  &lt;li&gt;Rotate all secrets stored in GitLab:
    &lt;ol&gt;
      &lt;li&gt;All credentials, including GitLab account passwords&lt;&#x2F;li&gt;
      &lt;li&gt;API tokens&lt;&#x2F;li&gt;
      &lt;li&gt;Any certificates&lt;&#x2F;li&gt;
      &lt;li&gt;Any other secrets&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;Follow steps in our incident response guide, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;responding_to_security_incidents.html#suspected-compromised-user-account&quot;&gt;here&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;&lt;strong&gt;Who is impacted by this?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;GitLab self-managed instances using the following affected versions:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;16.1 to 16.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;16.2 to 16.2.8&lt;&#x2F;li&gt;
  &lt;li&gt;16.3 to 16.3.6&lt;&#x2F;li&gt;
  &lt;li&gt;16.4 to 16.4.4&lt;&#x2F;li&gt;
  &lt;li&gt;16.5 to 16.5.5&lt;&#x2F;li&gt;
  &lt;li&gt;16.6 to 16.6.3&lt;&#x2F;li&gt;
  &lt;li&gt;16.7 to 16.7.1&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Within these versions, all authentication mechanisms are impacted.
Additionally, users who have two-factor authentication enabled are vulnerable to password reset but not account takeover as their second authentication factor is required to login.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;What actions should I take?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Upgrade self-managed instances to a &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;patched version&lt;&#x2F;a&gt; following our upgrade path. Do not skip upgrade stops as this could create instability.
    &lt;ul&gt;
      &lt;li&gt;Note: 16.3.x is a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#required-upgrade-stops&quot;&gt;required upgrade stop&lt;&#x2F;a&gt; in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrade-paths&quot;&gt;GitLab upgrade path&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;Enable &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;two_factor_authentication.html&quot;&gt;Two-Factor Authentication&lt;&#x2F;a&gt; (2FA) for all GitLab accounts, especially for users with elevated privileges (e.g. administrator accounts).&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;strong&gt;Has the vulnerability been resolved?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was resolved with this security release.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Were any accounts actually compromised due to this vulnerability?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We have not detected any abuse of this vulnerability on platforms managed by GitLab, including GitLab.com and GitLab Dedicated instances. Self-managed customers can review their logs to check for possible attempts to exploit this vulnerability:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Check &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;logs&#x2F;#production_jsonlog&quot;&gt;gitlab-rails&#x2F;production_json.log&lt;&#x2F;a&gt; for HTTP requests to the &lt;code&gt;&#x2F;users&#x2F;password&lt;&#x2F;code&gt; path with params.value.email consisting of a JSON array with &lt;em&gt;multiple&lt;&#x2F;em&gt; email addresses.&lt;&#x2F;li&gt;
  &lt;li&gt;Check &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;logs&#x2F;#audit_jsonlog&quot;&gt;gitlab-rails&#x2F;audit_json.log&lt;&#x2F;a&gt; for entries with &lt;code&gt;meta.caller_id&lt;&#x2F;code&gt; of &lt;code&gt;PasswordsController#create&lt;&#x2F;code&gt; and &lt;code&gt;target_details&lt;&#x2F;code&gt; consisting of a JSON array with &lt;em&gt;multiple&lt;&#x2F;em&gt; email addresses.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;strong&gt;When was the vulnerability introduced?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The vulnerability was introduced in 16.1.0 on May 1, 2023.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;How was the vulnerability discovered?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The vulnerability was responsibly reported through our Bug Bounty program.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;What security measures do you have in place to prevent such vulnerabilities?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;We have added multiple tests that validate the password reset logic as a whole, in particular handling of email provided, the email generation, and content to prevent similar vulnerabilities.&lt;&#x2F;li&gt;
  &lt;li&gt;Security reviews are a required part of the MR checklist that developers must complete.&lt;&#x2F;li&gt;
  &lt;li&gt;We have a code review process that requires multiple approvals for changes.&lt;&#x2F;li&gt;
  &lt;li&gt;We have started the &lt;a href=&quot;https:&#x2F;&#x2F;handbook.gitlab.com&#x2F;handbook&#x2F;security&#x2F;root-cause-analysis&#x2F;&quot;&gt;Root Cause Analysis process&lt;&#x2F;a&gt; in order to determine a comprehensive list of follow-up actions, including ways to prevent vulnerabilities like this one.&lt;&#x2F;li&gt;
  &lt;li&gt;We have a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;account&#x2F;two_factor_authentication.html&quot;&gt;two-factor authentication feature&lt;&#x2F;a&gt; that prevents such a vulnerability if enabled. It is currently enabled for all GitLab Team Members.&lt;&#x2F;li&gt;
  &lt;li&gt;We have added additional developer documentation in the code base to ensure implementation and security considerations are available to engineers working in this area in the future.&lt;&#x2F;li&gt;
  &lt;li&gt;Revised the implementation logic to not support the submission of multiple email addresses for reset links.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;strong&gt;How did this happen?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;A change was made in 16.1.0 to allow users to reset their password through a secondary email address. The vulnerability is a result of a bug in the email verification process. The bug has been fixed with this patch, and as mentioned above, we have implemented a number of preventive security measures to protect customers.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Does this affect me if I use an Identity Provider, like Okta or Azure AD?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Users without SSO enforcement are vulnerable. If your configuration allows a username and password to be used in addition to SSO options, then you are impacted. Disabling all password authentication options via &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;sign_in_restrictions.html#password-authentication-enabled&quot;&gt;Sign-in restrictions settings&lt;&#x2F;a&gt; will mitigate the vulnerability for Self-Managed customers that have an external identity provider configured, as this will disable the ability to perform password reset.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Am I affected by this vulnerability if I have 2FA enforced?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;An attacker will not be able to takeover your account if you have 2FA enabled. They may still be able to reset your password but will not be able to access your second factor authentication method. If you are suddenly redirected to login, or see a reset email triggered, please reset your password.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Does this vulnerability affect GitLab Runner?&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;No, this vulnerability does not affect GitLab Runner. This vulnerability affected the GitLab Rails codebase for impacted versions of GitLab itself. GitLab Runner has a separate code base that is unaffected.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;bypass-codeowners-approval-removal&quot;&gt;Bypass CODEOWNERS approval removal&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.3 before 16.5.5, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2. The required CODEOWNERS approval could be bypassed by adding changes to a previously approved merge request.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.6).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4812&quot;&gt;CVE-2023-4812&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ali_shehab&quot;&gt;ali_shehab&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;attacker-can-abuse-slackmattermost-integrations-to-execute-slash-commands-as-another-user&quot;&gt;Attacker can abuse Slack&#x2F;Mattermost integrations to execute slash commands as another user&lt;&#x2F;h3&gt;

&lt;p&gt;Incorrect authorization checks in GitLab CE&#x2F;EE from all versions starting from 8.13 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2, allows a user to abuse Slack&#x2F;Mattermost integrations to execute slash commands as another user.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5356&quot;&gt;CVE-2023-5356&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workspaces-able-to-be-created-under-different-root-namespace&quot;&gt;Workspaces able to be created under different root namespace&lt;&#x2F;h3&gt;

&lt;p&gt;An improper access control vulnerability exists in GitLab Workspaces affecting all versions prior to 16.5.6, 16.6 prior to 16.6.4 and 16.7 prior to 16.7.2. This condition allows an attacker to create a workspace in one group that is associated with an agent from another group.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.6).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6955&quot;&gt;CVE-2023-6955&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;j.seto&quot;&gt;@j.seto&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;commit-signature-validation-ignores-headers-after-signature&quot;&gt;Commit signature validation ignores headers after signature&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 12.2 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which an attacker could potentially modify the metadata of signed commits.
This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2030&quot;&gt;CVE-2023-2030&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;lotsofloops&quot;&gt;lotsofloops&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1672&quot;&gt;16.7.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1688&quot;&gt;Backport 16.7: Clean mocked tags from assets&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;140347&quot;&gt;Backport: Solving database cross joins on HookData::ProjectBuilder&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;140621&quot;&gt;Fix order-dependent Sidekiq config spec failures&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;140772&quot;&gt;Harden Internal Events CLI specs against flakiness&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;140892&quot;&gt;Enable Apollo Boards by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;140934&quot;&gt;Backport &quot;Add missing ci_sources_pipelines indexes for self-host&quot; 16.7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7338&quot;&gt;Temporarily pin Faraday related gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1664&quot;&gt;16.6.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1675&quot;&gt;Merge branch &#x27;ci-clean-mocked-tags&#x27; into &#x27;16-6-stable&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1689&quot;&gt;Backport 16.6 : Clean mocked tags from assets&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;139540&quot;&gt;Backport-Search::IndexRepairService using Repository index for projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141018&quot;&gt;Backport !140718 into 16.6 stable branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7337&quot;&gt;Temporarily pin Faraday related gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1656&quot;&gt;16.5.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1678&quot;&gt;CI: clean mocked tags from assets, don&#x27;t pollute artifacts (backport to 16.5)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1690&quot;&gt;Backport 16.5 : Clean mocked tags from assets&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6583&quot;&gt;Backport 16.5: Fix chatty loopWriter logs when log level config is empty&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;141027&quot;&gt;Bump allure-report and backport clickhouse version fix to 16.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7336&quot;&gt;Temporarily pin Faraday related gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.7 released with general availability of GitLab Duo Code Suggestions and CI&#x2F;CD Catalog in Beta</title>
<release>16.7</release>
<link href='https://about.gitlab.com/releases/2023/12/21/gitlab-16-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/12/21/gitlab-16-7-released/</id>
<published>2023-12-21T00:00:00+00:00</published>
<updated>2023-12-21T00:00:00+00:00</updated>
<author>
<name>Jocelyn Eillis</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.7 with &lt;a href=&quot;#gitlab-duo-code-suggestions-is-generally-available&quot;&gt;general availability of GitLab Duo Code Suggestions&lt;&#x2F;a&gt;, &lt;a href=&quot;#cicd-catalog-beta-release&quot;&gt;CI&#x2F;CD Catalog in Beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#new-drill-down-view-from-insights-report-charts&quot;&gt;new drill-down view from Insights report charts&lt;&#x2F;a&gt;, &lt;a href=&quot;#sast-results-in-mr-changes-view&quot;&gt;SAST findings in MR changes view&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 30+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 186 contributions you provided to GitLab 16.7!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.8 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_7&#x2F;16_7-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.6.2, 16.5.4, 16.4.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/12/13/security-release-gitlab-16-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/12/13/security-release-gitlab-16-6-2-released/</id>
<published>2023-12-13T00:00:00+00:00</published>
<updated>2023-12-13T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.6.2, 16.5.4, and 16.4.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#smartcard-authentication-allows-impersonation-of-arbitrary-user-using-user&#x27;s-public-certificate&quot;&gt;Smartcard authentication allows impersonation of arbitrary user using user&#x27;s public certificate&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#when-subgroup-is-allowed-to-merge-or-push-to-protected-branches,-subgroup-members-with-the-developer-role-may-gain-the-ability-to-push-or-merge&quot;&gt;When subgroup is allowed to merge or push to protected branches, subgroup members with the Developer role may gain the ability to push or merge&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#the-gitlab-web-interface-does-not-ensure-the-integrity-of-information-when-downloading-the-source-code-from-installation-packages-or-tags&quot;&gt;The GitLab web interface does not ensure the integrity of information when downloading the source code from installation packages or tags.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-maintainer-can-escalate-to-project-owner-using-project-access-token-rotate-api&quot;&gt;Project maintainer can escalate to Project owner using project access token rotate API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#omission-of-double-encoding-in-file-names-facilitates-the-creation-of-repositories-with-malicious-content&quot;&gt;Omission of Double Encoding in File Names Facilitates the Creation of Repositories with Malicious Content.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unvalidated-timespent-value-leads-to-unable-to-load-issues-on-issue-board&quot;&gt;Unvalidated timeSpent value leads to unable to load issues on Issue board&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#developer-can-bypass-predefined-variables-via-rest-api&quot;&gt;Developer can bypass predefined variables via REST API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#auditor-users-can-create-merge-requests-on-projects-they-dont-have-access-to&quot;&gt;Auditor users can create merge requests on projects they don&#x27;t have access to&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;smartcard-authentication-allows-impersonation-of-arbitrary-user-using-users-public-certificate&quot;&gt;Smartcard authentication allows impersonation of arbitrary user using user&#x27;s public certificate&lt;&#x2F;h3&gt;

&lt;p&gt;An improper certificate validation issue in Smartcard authentication in GitLab EE affecting all versions from 11.6 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows an attacker to authenticate as another user given their public key if they use Smartcard authentication. Smartcard authentication is an experimental feature and has to be manually enabled by an administrator. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6680&quot;&gt;CVE-2023-6680&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Lucas Serrano from PEReN (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;LSerranoPEReN&quot;&gt;@LSerranoPEReN&lt;&#x2F;a&gt;) for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;when-subgroup-is-allowed-to-merge-or-push-to-protected-branches-subgroup-members-with-the-developer-role-may-gain-the-ability-to-push-or-merge&quot;&gt;When subgroup is allowed to merge or push to protected branches, subgroup members with the Developer role may gain the ability to push or merge&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab EE Premium and Ultimate affecting versions 16.4.3, 16.5.3, and 16.6.1. In projects using subgroups to define who can push and&#x2F;or merge to protected branches, there may have been instances in which subgroup members with the Developer role were able to push or merge to protected branches. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6564&quot;&gt;CVE-2023-6564&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by a GitLab team member.&lt;&#x2F;p&gt;

&lt;p&gt;The following script can help you identify projects that may be subject to a vulnerable configuration. This script can be used to create a CSV file listing projects that have a group set as &quot;Allowed to merge&quot; or &quot;Allowed to push and merge&quot; along with the web_url and project_id for the project and the group_name&#x2F;group_id for the group. Note that this is not an indication that unauthorized changes were made to protected branches, but rather an indication that these projects were subject to this vulnerable configuration. For impacted projects, customers will need to check merge requests that were merged on their self-managed GitLab instances running 16.4.3, 16.5.3, or 16.6.1 prior to updating to 16.4.4, 16.5.4, or 16.6.2 or on GitLab.com prior to 2023-12-04 18:10 UTC.&lt;&#x2F;p&gt;

&lt;details&gt;&lt;summary&gt;Click to expand the script&lt;&#x2F;summary&gt;

```sh
## install `glab` (if not already installed)
# https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;cli#installation
## install `jq` (if not already installed)
# https:&#x2F;&#x2F;jqlang.github.io&#x2F;jq&#x2F;download&#x2F;

# authenticate with `glab` as Admin (self-managed) or group owner (SaaS)
glab auth login

## get `project_id` and `web_url` for all projects at the instance level (self-managed) or group level (SaaS), save it as `project-list.csv`
# self-managed - instance level (use Admin PAT for authentication)
glab api --hostname &quot;self-managed-gitlab.example.com&quot; --paginate projects 2&amp;gt;&amp;gt; error.log | jq -c &#x27;.[]&#x27; | jq -rc &#x27;[.id, .web_url] | @csv&#x27; | tee -a project-list.csv
# SaaS - group level (use group owner PAT for authentication)
glab api --paginate &quot;groups&#x2F;$GROUP_ID&#x2F;projects&quot; 2&amp;gt;&amp;gt; error.log | jq -c &#x27;.[]&#x27; | jq -rc &#x27;[.id, .web_url] | @csv&#x27; | tee -a project-list.csv 

## add headers to protected_branch_report.csv file
echo &quot;project_id, web_url, group_name_push_access, group_id_push_access, group_name_merge_access, group_id_merge_access&quot; &amp;gt; protected_branch_report.csv

## loop through each project to check for protected branches that have a group with push or merge access
while IFS=&#x27;,&#x27; read -r PROJECT_ID WEB_URL; do
  glab api &quot;projects&#x2F;$PROJECT_ID&#x2F;protected_branches&quot; 2&amp;gt;&amp;gt; error.log \
  | jq -c &#x27;.[]&#x27; \
  | jq &#x27;select((any(.push_access_levels[]; .group_id != null and .access_level == 40)) or (any(.merge_access_levels[]; .group_id != null and .access_level == 40)))&#x27; 2&amp;gt;&amp;gt; error.log \
  | jq -c &quot;{project_id: $PROJECT_ID, web_url: $WEB_URL, group_id_push_access: .push_access_levels.[].group_id, group_name_push_access: .push_access_levels.[].access_level_description, group_id_merge_access: .merge_access_levels.[].group_id, group_name_merge_access: .merge_access_levels.[].access_level_description}&quot; 2&amp;gt;&amp;gt; error.log \
  | jq &#x27;select((.group_id_push_access != null or .group_id_merge_access != null) and (.group_name_push_access != &quot;Maintainers&quot; or .group_name_merge_access != &quot;Maintainers&quot;))&#x27; 2&amp;gt;&amp;gt; error.log \
  | jq -rc &#x27;[.project_id, .web_url, .group_name_push_access, .group_id_push_access, .group_name_merge_access, .group_id_merge_access] | @csv&#x27; \
  | tee -a protected_branch_report.csv  
done &amp;lt; project-list.csv
```

GitLab has conducted limited testing to validate this script. As such this script is provided AS-IS and GitLab makes no warranties of any kind. GITLAB HEREBY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT.

&lt;&#x2F;details&gt;

&lt;h3 id=&quot;the-gitlab-web-interface-does-not-ensure-the-integrity-of-information-when-downloading-the-source-code-from-installation-packages-or-tags&quot;&gt;The GitLab web interface does not ensure the integrity of information when downloading the source code from installation packages or tags.&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when source code or installation packages are pulled from a specific tag.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6051&quot;&gt;CVE-2023-6051&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-maintainer-can-escalate-to-project-owner-using-project-access-token-rotate-api&quot;&gt;Project maintainer can escalate to Project owner using project access token rotate API&lt;&#x2F;h3&gt;

&lt;p&gt;A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.9).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3907&quot;&gt;CVE-2023-3907&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;omission-of-double-encoding-in-file-names-facilitates-the-creation-of-repositories-with-malicious-content&quot;&gt;Omission of Double Encoding in File Names Facilitates the Creation of Repositories with Malicious Content.&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.8).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5512&quot;&gt;CVE-2023-5512&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unvalidated-timespent-value-leads-to-unable-to-load-issues-on-issue-board&quot;&gt;Unvalidated timeSpent value leads to unable to load issues on Issue board&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible to overflow the time spent on an issue that altered the details shown in the issue boards.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3904&quot;&gt;CVE-2023-3904&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;toukakirishima&quot;&gt;toukakirishima&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;developer-can-bypass-predefined-variables-via-rest-api&quot;&gt;Developer can bypass predefined variables via REST API&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5061&quot;&gt;CVE-2023-5061&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ali_shehab&quot;&gt;ali_shehab&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;auditor-users-can-create-merge-requests-on-projects-they-dont-have-access-to&quot;&gt;Auditor users can create merge requests on projects they don&#x27;t have access to&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they&#x27;re not a member of. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3511&quot;&gt;CVE-2023-3511&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1662&quot;&gt;16.6.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1649&quot;&gt;[Backport 16.6] Fix redis-namspace dependency version for UBI mailroom&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1658&quot;&gt;Fix backup id parsing from backup URLs (16.6 Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138449&quot;&gt;Package Registry: Truncate Pypi metadata description field&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138535&quot;&gt;Fix adding confidential child tasks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138797&quot;&gt;Backport Hide obsolete migration warning into 16.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138911&quot;&gt;[16.6 Backport] Fix Admin Mode bug in DeactivateDormantUsersWorker&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138929&quot;&gt;Backport Fix cluster reindexing service preflight check to 16.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138804&quot;&gt;Backport Sanitize string provided to to_tsvector&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138602&quot;&gt;Backport &quot;Update migration to work for any fk name&quot; to 16.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;139051&quot;&gt;Fix Environment destroy job is retried endlessly (16.6 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138431&quot;&gt;Allow users to authenticate via OAuth with password-based providers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7275&quot;&gt;Do not scan entire &#x2F;var&#x2F;opt&#x2F;gitlab for stale pids (16.6 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1654&quot;&gt;16.5.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1641&quot;&gt;gitlab-rails: support skipping post-migrations in db checks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1650&quot;&gt;[Backport 16.5] Fix redis-namspace dependency version for UBI mailroom&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137712&quot;&gt;Backport - Truncate verification failure message to 255&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138912&quot;&gt;[16.5 Backport] Fix Admin Mode bug in DeactivateDormantUsersWorker&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1644&quot;&gt;16.4.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1651&quot;&gt;[Backport 16.4] Fix redis-namspace dependency version for UBI mailroom&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138913&quot;&gt;[16.4 Backport] Fix Admin Mode bug in DeactivateDormantUsersWorker&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.6.1, 16.5.3, 16.4.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/11/30/security-release-gitlab-16-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/11/30/security-release-gitlab-16-6-1-released/</id>
<published>2023-11-30T00:00:00+00:00</published>
<updated>2023-11-30T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>
&lt;p&gt;Today we are releasing versions 16.6.1, 16.5.3, 16.4.3 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-and-redos-in-markdown-via-banzai-pipeline-of-jira&quot;&gt;XSS and ReDoS in Markdown via Banzai pipeline of Jira&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#members-with-admin_group_member-custom-permission-can-add-members-with-higher-role&quot;&gt;Members with admin_group_member custom permission can add members with higher role&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#release-description-visible-in-public-projects-despite-release-set-as-project-members-only-through-atom-response&quot;&gt;Release Description visible in public projects despite release set as project members only through atom response&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#manipulate-the-repository-content-in-the-ui-cve-2023-3401-bypass&quot;&gt;Manipulate the repository content in the UI (CVE-2023-3401 bypass)&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#external-user-can-abuse-policy-bot-to-gain-access-to-internal-projects&quot;&gt;External user can abuse policy bot to gain access to internal projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#developers-can-update-pipeline-schedules-to-use-protected-branches-even-if-they-dont-have-permission-to-merge&quot;&gt;Developers can update pipeline schedules to use protected branches even if they don&#x27;t have permission to merge&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#users-can-install-composer-packages-from-public-projects-even-when-package-registry-is-turned-off&quot;&gt;Users can install Composer packages from public projects even when &lt;code&gt;Package registry&lt;&#x2F;code&gt; is turned off&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#client-side-dos-via-mermaid-flowchart&quot;&gt;Client-side DOS via Mermaid Flowchart&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches&quot;&gt;Unauthorized member can gain &lt;code&gt;Allowed to push and merge&lt;&#x2F;code&gt; access and affect integrity of protected branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-users-can-react-emojis-on-confidential-work-items-which-they-cant-see-in-a-project&quot;&gt;Guest users can react (emojis) on confidential work items which they cant see in a project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;xss-and-redos-in-markdown-via-banzai-pipeline-of-jira&quot;&gt;XSS and ReDoS in Markdown via Banzai pipeline of Jira&lt;&#x2F;h3&gt;

&lt;p&gt;Improper neutralization of input in Jira integration configuration in GitLab CE&#x2F;EE, affecting all versions from 15.10 prior to 16.6.1, 16.5 prior to 16.5.3, and 16.4 prior to 16.4.3 allowed attacker to execute javascript in victim&#x27;s browser.&lt;&#x2F;p&gt;

&lt;p&gt;This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6033&quot;&gt;CVE-2023-6033&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;members-with-admin_group_member-custom-permission-can-add-members-with-higher-role&quot;&gt;Members with admin_group_member custom permission can add members with higher role&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.5.3, 
all versions starting from 16.6 before 16.6.1. When a user is assigned a custom role with &lt;code&gt;admin_group_member&lt;&#x2F;code&gt;` enabled, they may be able to add a member with a higher static role than themselves to the group which may lead to privilege escalation.&lt;&#x2F;p&gt;

&lt;p&gt;This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-6396&quot;&gt;CVE-2023-6396&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;jarka&quot;&gt;jarka&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;release-description-visible-in-public-projects-despite-release-set-as-project-members-only-through-atom-response&quot;&gt;Release Description visible in public projects despite release set as project members only through atom response&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 11.3 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1.
It was possible for unauthorized users to view a public projects&#x27; release descriptions via an atom endpoint when release access on the public was set to only project members&lt;&#x2F;p&gt;

&lt;p&gt;This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3949&quot;&gt;CVE-2023-3949&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;manipulate-the-repository-content-in-the-ui-cve-2023-3401-bypass&quot;&gt;Manipulate the repository content in the UI (CVE-2023-3401 bypass)&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. Under certain circumstances, a malicious actor bypass prohibited branch checks using a specially crafted branch name to manipulate repository content in the UI.&lt;&#x2F;p&gt;

&lt;p&gt;This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.8).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5226&quot;&gt;CVE-2023-5226&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;external-user-can-abuse-policy-bot-to-gain-access-to-internal-projects&quot;&gt;External user can abuse policy bot to gain access to internal projects&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the policy bot to gain access to internal projects.&lt;&#x2F;p&gt;

&lt;p&gt;This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5995&quot;&gt;CVE-2023-5995&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;client-side-dos-via-mermaid-flowchart&quot;&gt;Client-side DOS via Mermaid Flowchart&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 10.5 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted mermaid diagram input.&lt;&#x2F;p&gt;

&lt;p&gt;This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 2.6).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4912&quot;&gt;CVE-2023-4912&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;toukakirishima&quot;&gt;toukakirishima&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;developers-can-update-pipeline-schedules-to-use-protected-branches-even-if-they-dont-have-permission-to-merge&quot;&gt;Developers can update pipeline schedules to use protected branches even if they don&#x27;t have permission to merge&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 9.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a user with the Developer role to update a pipeline schedule from an unprotected branch to a protected branch.&lt;&#x2F;p&gt;

&lt;p&gt;This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4317&quot;&gt;CVE-2023-4317&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;users-can-install-composer-packages-from-public-projects-even-when-package-registry-is-turned-off&quot;&gt;Users can install Composer packages from public projects even when &lt;code&gt;Package registry&lt;&#x2F;code&gt; is turned off&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for users to access composer packages on public projects that have package registry disabled in the project settings.&lt;&#x2F;p&gt;

&lt;p&gt;This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3964&quot;&gt;CVE-2023-3964&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches&quot;&gt;Unauthorized member can gain &lt;code&gt;Allowed to push and merge&lt;&#x2F;code&gt; access and affect integrity of protected branches&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 8.13 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the &lt;code&gt;Allowed to merge&lt;&#x2F;code&gt; permission as a guest user, when granted the permission through a group.&lt;&#x2F;p&gt;

&lt;p&gt;This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4658&quot;&gt;CVE-2023-4658&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;guest-users-can-react-emojis-on-confidential-work-items-which-they-cant-see-in-a-project&quot;&gt;Guest users can react (emojis) on confidential work items which they cant see in a project&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.1 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a Guest user to add an emoji on confidential work items.&lt;&#x2F;p&gt;

&lt;p&gt;This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3443&quot;&gt;CVE-2023-3443&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-update&quot;&gt;Mattermost Security Update&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost has been updated to the latest patch release to mitigate several security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-to-pg-149-and-1312&quot;&gt;Update to PG 14.9 and 13.12&lt;&#x2F;h3&gt;

&lt;p&gt;PostgreSQL has been updated to 14.9 and 13.12 to mitigate CVE-2023-39417.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-pcre2-to-1042&quot;&gt;Update pcre2 to 10.42&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;code&gt;pcre2&lt;&#x2F;code&gt; has been updated to version 10.42 to mitigate CVE-2022-41409.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1661&quot;&gt;16.6.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1639&quot;&gt;Install Gitaly dependencies for project archiving (16.6 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137167&quot;&gt;Fix intermittent 404 errors loading GitLab Pages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136888&quot;&gt;Prefer custom sort order with search in users API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136902&quot;&gt;Backport &quot;Fix group page erroring because of nil user&quot; to 16-6-stable-ee&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137296&quot;&gt;Skip encrypted settings logic for Redis when used by Mailroom&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137687&quot;&gt;Allow &lt;code&gt;+&lt;&#x2F;code&gt; char in abuse detection for global search&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137800&quot;&gt;Backport &quot;Move unlock pipeline cron scheduler out of ee&quot; to 16.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137899&quot;&gt;Fix bug with pages_deployments files not being deleted on disk&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;137711&quot;&gt;Backport - Truncate verification failure message to 255&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;138131&quot;&gt;Backport &quot;Revert &quot;Merge branch &#x27;sc1-release-goredis&#x27; into &#x27;master&#x27;&quot;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1653&quot;&gt;16.5.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1636&quot;&gt;Backport  10871d71b171db38701bfefe15883b05c234ca6d to &lt;code&gt;16-5-stable&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136934&quot;&gt;Geo: Reduce batch size of verification state backfill&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1643&quot;&gt;16.4.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1622&quot;&gt;Backport  10871d71b171db38701bfefe15883b05c234ca6d to &lt;code&gt;16-4-stable&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6554&quot;&gt;Backport to 16.4 the fix for test failure due to &quot;not-existing.com&quot; being registered&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;135647&quot;&gt;Bump &lt;code&gt;asdf-bootstrapped-verify&lt;&#x2F;code&gt; version on 16.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;133886&quot;&gt;Fix bulk batch export of badges and uploads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136764&quot;&gt;[16.4] ci: Fix broken master by not reading GITLAB_ENV&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136433&quot;&gt;Fix assign security check permission checks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136774&quot;&gt;For 16.4: Fix Geo verification state backfill job can exceed batch size&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136937&quot;&gt;Geo: Reduce batch size of verification state backfill&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.6 released with GitLab Duo Chat available in Beta</title>
<release>16.6</release>
<link href='https://about.gitlab.com/releases/2023/11/16/gitlab-16-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/11/16/gitlab-16-6-released/</id>
<published>2023-11-16T00:00:00+00:00</published>
<updated>2023-11-16T00:00:00+00:00</updated>
<author>
<name>Matthew Macfarlane</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.6 with &lt;a href=&quot;#gitlab-duo-chat-available-in-beta&quot;&gt;GitLab Duo Chat Available in Beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#allow-users-to-enforce-mr-approvals-as-a-compliance-policy&quot;&gt;MR approvals as a compliance policy&lt;&#x2F;a&gt;, &lt;a href=&quot;#minimal-forking-only-include-the-default-branch&quot;&gt;improved forking&lt;&#x2F;a&gt;, &lt;a href=&quot;#improved-ui-for-cicd-variable-management&quot;&gt;improved UI for CI&#x2F;CD variable management&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 25+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 137 contributions you provided to GitLab 16.6!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.7 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_6&#x2F;16_6-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.5.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/11/14/gitlab-16-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/11/14/gitlab-16-5-2-released/</id>
<published>2023-11-14T00:00:00+00:00</published>
<updated>2023-11-14T00:00:00+00:00</updated>
<author>
<name>Steve Abrams</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.5.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1652&quot;&gt;16.5.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;135645&quot;&gt;Backport to 16.5: Geo: Bring back legacy project Prometheus metrics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;135195&quot;&gt;Backport artifacts page breadcrumb fixes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136065&quot;&gt;Fix broken issue rendering when initial ID is null&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136243&quot;&gt;Backport - Create group wiki repo if absent when verifying on primary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136399&quot;&gt;backport to 16.5: Fix Geo verification state backfill job can exceed batch size&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;136434&quot;&gt;Fix assign security check permission checks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7228&quot;&gt;Update postgres_exporter from 0.14.0 to 0.15.0 (16.5 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.5.1, 16.4.2, 16.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/10/31/security-release-gitlab-16-5-1-16-4-2-16-3-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/10/31/security-release-gitlab-16-5-1-16-4-2-16-3-6-released/</id>
<published>2023-10-31T00:00:00+00:00</published>
<updated>2023-10-31T00:00:00+00:00</updated>
<author>
<name>Greg Alfaro</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.5.1, 16.4.2, 16.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;.
You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.
In addition, the issues detailing each vulnerability are made public on our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt;
30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
&lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;p&gt;On 2023-10-20 11:03 UTC, GitLab internally discovered (CVE-2023-5831) that a change in the GitLab sidebar feature resulted in self-managed GitLab instances sending version-checks to version.gitlab.com each time they opened a page on their GitLab instance. This means that the hostnames and current versions of self-managed GitLab instances were being sent to version.gitlab.com any time a user of that GitLab instance opened any page, regardless of whether or not the sending of version-check was enabled. This information was only accessible to some GitLab team members and was not exposed externally, and GitLab is working to purge the erroneously collected data from our database.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-cicd-variables-using-custom-project-templates&quot;&gt;Disclosure of CI&#x2F;CD variables using Custom project templates&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;High&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-omnibus-dos-crash-via-oom-with-ci-catalogs&quot;&gt;GitLab omnibus DoS crash via OOM with CI Catalogs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#parsing--gitlab-ciyml-with-large-string-via-timeout-input-leads-to-denial-of-service&quot;&gt;Parsing  gitlab-ci.yml with large string via &lt;code&gt;timeout&lt;&#x2F;code&gt; input leads to Denial of Service&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos---blocking-fifo-files-in-tar-archives&quot;&gt;DoS - Blocking FIFO files in Tar archives&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#titles-exposed-by-service-desk-template&quot;&gt;Titles exposed by service-desk template&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#approval-on-protected-environments-can-be-bypassed&quot;&gt;Approval on protected environments can be bypassed&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#version-information-disclosure-when-super_sidebar_logged_out-feature-flag-is-enabled&quot;&gt;Version information disclosure when &lt;code&gt;super_sidebar_logged_out&lt;&#x2F;code&gt; feature flag is enabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#add-abuse-detection-for-search-syntax-filter-pipes&quot;&gt;Add abuse detection for search syntax filter pipes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h3 id=&quot;disclosure-of-cicd-variables-using-custom-project-templates&quot;&gt;Disclosure of CI&#x2F;CD variables using Custom project templates&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 11.6 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. It was possible for an unauthorised project or group member to read the CI&#x2F;CD variables using the custom project templates.
This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 8.5).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3399&quot;&gt;CVE-2023-3399&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;gitlab-omnibus-dos-crash-via-oom-with-ci-catalogs&quot;&gt;GitLab omnibus DoS crash via OOM with CI Catalogs&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.2 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A low-privileged attacker can point a CI&#x2F;CD Component to an incorrect path and cause the server to exhaust all available memory through an infinite loop and cause Denial of Service. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5825&quot;&gt;CVE-2023-5825&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;blakbat&quot;&gt;blakbat&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&quot;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;parsing--gitlab-ciyml-with-large-string-via-timeout-input-leads-to-denial-of-service&quot;&gt;Parsing  gitlab-ci.yml with large string via &lt;code&gt;timeout&lt;&#x2F;code&gt; input leads to Denial of Service&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.3 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A Regular Expression Denial of Service was possible  by adding a large string in timeout input in gitlab-ci.yml file.&quot; This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3909&quot;&gt;CVE-2023-3909&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;akadrian&quot;&gt;akadrian&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dos---blocking-fifo-files-in-tar-archives&quot;&gt;DoS - Blocking FIFO files in Tar archives&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE&#x2F;CE affecting all versions starting before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1 which allows an attackers to block Sidekiq job processor. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3246&quot;&gt;CVE-2023-3246&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;zhutyra&quot;&gt;zhutyra&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;titles-exposed-by-service-desk-template&quot;&gt;Titles exposed by service-desk template&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. Arbitrary access to the titles of an private specific references could be leaked through the service-desk custom email template. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5600&quot;&gt;CVE-2023-5600&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;approval-on-protected-environments-can-be-bypassed&quot;&gt;Approval on protected environments can be bypassed&lt;&#x2F;h3&gt;

&lt;p&gt;An authorization issue affecting GitLab EE affecting all versions from 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1, allowed a user to run jobs in protected environments, bypassing any required approvals. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4700&quot;&gt;CVE-2023-4700&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gregodfather&quot;&gt;Gregor Pirolt&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;version-information-disclosure-when-super_sidebar_logged_out-feature-flag-is-enabled&quot;&gt;Version information disclosure when &lt;code&gt;super_sidebar_logged_out&lt;&#x2F;code&gt; feature flag is enabled&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the &lt;code&gt;super_sidebar_logged_out&lt;&#x2F;code&gt; feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.7).
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5831&quot;&gt;CVE-2023-5831&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;add-abuse-detection-for-search-syntax-filter-pipes&quot;&gt;Add abuse detection for search syntax filter pipes&lt;&#x2F;h3&gt;

&lt;p&gt;An issue has been discovered in GitLab EE with Advanced Search affecting all versions from 13.9 to 16.3.6, 16.4 prior to 16.4.2 and 16.5 prior to 16.5.1 that could allow a denial of service in the Advanced Search function by chaining too many syntax operators. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release. We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-curl-to-v840&quot;&gt;Update curl to v8.4.0&lt;&#x2F;h3&gt;

&lt;p&gt;curl has been updated to v8.4.0 to mitigate &lt;a href=&quot;https:&#x2F;&#x2F;curl.se&#x2F;docs&#x2F;CVE-2023-38545.html&quot;&gt;CVE-2023-38545&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-mermaid-to-1050&quot;&gt;Update mermaid to 10.5.0&lt;&#x2F;h3&gt;

&lt;p&gt;mermaid has been updated to 10.5.0 to mitigate a security issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;patch-nginx-for-cve-2023-44487&quot;&gt;Patch NGINX for CVE-2023-44487&lt;&#x2F;h3&gt;

&lt;p&gt;NGINX has been patched to mitigate CVE-2023-44487.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1651&quot;&gt;16.5.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134835&quot;&gt;Revert better-error-messages-for-pull-mirroring&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134867&quot;&gt;Update post migration to drop column only if it exists&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;135226&quot;&gt;Downgrade vue-apollo to prevent auto-restarting subscriptions on error&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1642&quot;&gt;16.4.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1554&quot;&gt;UBI: Explicitly add webrick gem to mailroom build&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;133882&quot;&gt;Update VERSION files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;133877&quot;&gt;Update dependency prometheus-client-mmap to &#x27;&amp;gt;= 0.28.1&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;133833&quot;&gt;Backport: fix migration when commit_message_negative_regex is missing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134197&quot;&gt;Backport to 16.4: Geo: Avoid getting resources stuck in Queued&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134481&quot;&gt;Fix pipeline schedules view when owner is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134565&quot;&gt;Quarantine flaky delete_job_spec:46&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134264&quot;&gt;Create Geo event when project is created&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134328&quot;&gt;Fix bug with batched gitaly ref deletion duplicates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1636&quot;&gt;16.3.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1555&quot;&gt;UBI: Explicitly add webrick gem to mailroom build&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1499&quot;&gt;Backport 16.3: Upgrade exiftool to 12.65&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;135401&quot;&gt;Fixes the 16-3-stable branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;134196&quot;&gt;Backport to 16.3: Geo: Avoid getting resources stuck in Queued&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.5 released with compliance standards adherence reports and merge request target branch rules</title>
<release>16.5</release>
<link href='https://about.gitlab.com/releases/2023/10/22/gitlab-16-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/10/22/gitlab-16-5-released/</id>
<published>2023-10-22T00:00:00+00:00</published>
<updated>2023-10-22T00:00:00+00:00</updated>
<author>
<name>Kai Armstrong</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.5 with &lt;a href=&quot;#compliance-standards-adherence-report&quot;&gt;compliance standards adherence reports&lt;&#x2F;a&gt;, &lt;a href=&quot;#create-rules-to-set-target-branches-for-merge-requests&quot;&gt;merge request target branch rules&lt;&#x2F;a&gt;, &lt;a href=&quot;#resolve-an-issue-thread&quot;&gt;resolvable issue threads&lt;&#x2F;a&gt;, &lt;a href=&quot;#fast-forward-merge-trains-with-semi-linear-history&quot;&gt;fast-forward merge trains with semi-linear history&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 25+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 170+ contributions you provided to GitLab 16.5!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.6 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_5&#x2F;16_5-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.4.1, 16.3.5, and 16.2.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/09/28/security-release-gitlab-16-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/09/28/security-release-gitlab-16-4-1-released/</id>
<published>2023-09-28T00:00:00+00:00</published>
<updated>2023-09-28T00:00:00+00:00</updated>
<author>
<name>Félix Veillette-Potvin</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.4.1, 16.3.5, and 16.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#attacker-can-add-other-projects-policy-bot-as-member-to-their-own-project-and-use-that-bot-to-trigger-pipelines-in-victims-project&quot;&gt;Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-import-allows-impersonation-of-users-in-ci-pipelines&quot;&gt;Group import allows impersonation of users in CI pipelines&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#developers-can-bypass-code-owners-approval-by-changing-a-mrs-base-branch&quot;&gt;Developers can bypass code owners approval by changing a MR&#x27;s base branch&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#leaking-source-code-of-restricted-project-through-a-fork&quot;&gt;Leaking source code of restricted project through a fork&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#third-party-library-consul-requires-enable-script-checks-to-be-false-to-enable-patch&quot;&gt;Third party library Consul requires enable-script-checks to be False to enable patch&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#service-account-not-deleted-when-namespace-is-deleted-allowing-access-to-internal-projects&quot;&gt;Service account not deleted when namespace is deleted allowing access to internal projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#enforce-sso-settings-bypassed-for-public-projects-for-members-without-identity&quot;&gt;Enforce SSO settings bypassed for public projects for Members without identity&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#removed-project-member-can-write-to-protected-branches&quot;&gt;Removed project member can write to protected branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorised-association-of-ci-jobs-for-machine-learning-experiments&quot;&gt;Unauthorised association of CI jobs for Machine Learning experiments&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#force-pipelines-to-not-have-access-to-protected-variables-and-will-likely-fail-using-tags&quot;&gt;Force pipelines to not have access to protected variables and will likely fail using tags&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-create-a-fork-relationship-between-existing-projects&quot;&gt;Maintainer can create a fork relationship between existing projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-masked-ci-variables-via-processing-cicd-configuration-of-forks&quot;&gt;Disclosure of masked CI variables via processing CI&#x2F;CD configuration of forks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#asset-proxy-bypass-using-non-ascii-character-in-asset-uri&quot;&gt;Asset Proxy Bypass using non-ASCII character in asset URI&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches&quot;&gt;Unauthorized member can gain &lt;code&gt;Allowed to push and merge&lt;&#x2F;code&gt; access and affect integrity of protected branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#removed-developer-can-continue-editing-the-source-code-of-a-public-project&quot;&gt;Removed Developer can continue editing the source code of a public project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#a-project-reporter-can-leak-owners-sentry-instance-projects&quot;&gt;A project reporter can leak owner&#x27;s Sentry instance projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#math-rendering-in-markdown-can-escape-container-and-hijack-clicks&quot;&gt;Math rendering in markdown can escape container and hijack clicks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;attacker-can-add-other-projects-policy-bot-as-member-to-their-own-project-and-use-that-bot-to-trigger-pipelines-in-victims-project&quot;&gt;Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;982 --&gt;

&lt;p&gt;A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.2). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5207&quot;&gt;CVE-2023-5207&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-import-allows-impersonation-of-users-in-ci-pipelines&quot;&gt;Group import allows impersonation of users in CI pipelines&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;980 --&gt;

&lt;p&gt;Two issues have been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports. These are a high severity issues (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.2). They are now mitigated in the latest release and are assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5106&quot;&gt;CVE-2023-5106&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;These issues have been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joernchen&quot;&gt;Joern Schneeweisz&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;developers-can-bypass-code-owners-approval-by-changing-a-mrs-base-branch&quot;&gt;Developers can bypass code owners approval by changing a MR&#x27;s base branch&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;976 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting 15.3 prior to prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4379&quot;&gt;CVE-2023-4379&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was reported by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;leaking-source-code-of-restricted-project-through-a-fork&quot;&gt;Leaking source code of restricted project through a fork&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;939 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that an unauthorised user to fork a public project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3413&quot;&gt;CVE-2023-3413&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;third-party-library-consul-requires-enable-script-checks-to-be-false-to-enable-patch&quot;&gt;Third party library Consul requires enable-script-checks to be False to enable patch&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;99 --&gt;

&lt;p&gt;Patch in third party library Consul requires &#x27;enable-script-checks&#x27; to be set to False. This only affects GitLab-EE. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5332&quot;&gt;CVE-2023-5332&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was reported by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;service-account-not-deleted-when-namespace-is-deleted-allowing-access-to-internal-projects&quot;&gt;Service account not deleted when namespace is deleted allowing access to internal projects&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;962 --&gt;

&lt;p&gt;A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3914&quot;&gt;CVE-2023-3914&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enforce-sso-settings-bypassed-for-public-projects-for-members-without-identity&quot;&gt;Enforce SSO settings bypassed for public projects for Members without identity&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;930 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3115&quot;&gt;CVE-2023-3115&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;removed-project-member-can-write-to-protected-branches&quot;&gt;Removed project member can write to protected branches&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;972 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5198&quot;&gt;CVE-2023-5198&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorised-association-of-ci-jobs-for-machine-learning-experiments&quot;&gt;Unauthorised association of CI jobs for Machine Learning experiments&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;960 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI&#x2F;CD jobs of private projects which they are not a member of. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4532&quot;&gt;CVE-2023-4532&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ricardobrito&quot;&gt;ricardobrito&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;force-pipelines-to-not-have-access-to-protected-variables-and-will-likely-fail-using-tags&quot;&gt;Force pipelines to not have access to protected variables and will likely fail using tags&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;955 --&gt;

&lt;p&gt;Denial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3917&quot;&gt;CVE-2023-3917&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-create-a-fork-relationship-between-existing-projects&quot;&gt;Maintainer can create a fork relationship between existing projects&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;963 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3920&quot;&gt;CVE-2023-3920&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-masked-ci-variables-via-processing-cicd-configuration-of-forks&quot;&gt;Disclosure of masked CI variables via processing CI&#x2F;CD configuration of forks&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;964 --&gt;

&lt;p&gt;An information disclosure issue in GitLab CE&#x2F;EE affecting all versions from 13.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI&#x2F;CD variables by tricking a user to visit a fork with a malicious CI&#x2F;CD configuration. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0989&quot;&gt;CVE-2023-0989&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;asset-proxy-bypass-using-non-ascii-character-in-asset-uri&quot;&gt;Asset Proxy Bypass using non-ASCII character in asset URI&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;973 --&gt;

&lt;p&gt;An input validation issue in the asset proxy in GitLab EE, affecting all versions from 12.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1, allowed an authenticated attacker to craft image urls which bypass the asset proxy. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3906&quot;&gt;CVE-2023-3906&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;afewgoats&quot;&gt;afewgoats&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches&quot;&gt;Unauthorized member can gain &lt;code&gt;Allowed to push and merge&lt;&#x2F;code&gt; access and affect integrity of protected branches&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from X.Y before 16.X, all versions starting from 16.X before 16.X. It was possible for an attacker to abuse the &lt;code&gt;Allowed to merge&lt;&#x2F;code&gt; permission as a guest user, when granted the permission through a group. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4658&quot;&gt;CVE-2023-4658&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;removed-developer-can-continue-editing-the-source-code-of-a-public-project&quot;&gt;Removed Developer can continue editing the source code of a public project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;953 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge request’s source branch. . This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3979&quot;&gt;CVE-2023-3979&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;a-project-reporter-can-leak-owners-sentry-instance-projects&quot;&gt;A project reporter can leak owner&#x27;s Sentry instance projects&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;968 --&gt;

&lt;p&gt;An improper authorization issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.8 before 16.2.x8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4.0 before 16.4.1. It allows a project reporter to leak the owner&#x27;s Sentry instance projects. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2233&quot;&gt;CVE-2023-2233&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;math-rendering-in-markdown-can-escape-container-and-hijack-clicks&quot;&gt;Math rendering in markdown can escape container and hijack clicks&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;974 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3922&quot;&gt;CVE-2023-3922&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ammar2&quot;&gt;ammar2&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update-exiftool&quot;&gt;Update Exiftool&lt;&#x2F;h1&gt;
&lt;p&gt;Exiftool has been updated to version 1.12 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h1&gt;
&lt;p&gt;Mattermost has been updated to version 8.1.2 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update-auto-deploy-image&quot;&gt;Update Auto deploy image&lt;&#x2F;h1&gt;
&lt;p&gt;Auto deploy image has been updated to version 2.55.0 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1635&quot;&gt;16.3.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;132398&quot;&gt;Backport disable v1 package metadata sync&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.4 released with customizable roles and group-level dependency list</title>
<release>16.4</release>
<link href='https://about.gitlab.com/releases/2023/09/22/gitlab-16-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/09/22/gitlab-16-4-released/</id>
<published>2023-09-22T00:00:00+00:00</published>
<updated>2023-09-22T00:00:00+00:00</updated>
<author>
<name>Grant Hickman</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 16.4 with &lt;a href=&quot;#customizable-roles&quot;&gt;Customizable Roles&lt;&#x2F;a&gt;, &lt;a href=&quot;#groupsub-group-level-dependency-list&quot;&gt;Group&#x2F;sub-group level dependency list&lt;&#x2F;a&gt;, &lt;a href=&quot;#access-clusters-locally-using-your-gitlab-user-identity&quot;&gt;Access clusters locally using your GitLab user identity&lt;&#x2F;a&gt;, &lt;a href=&quot;#create-workspaces-for-private-projects&quot;&gt;Create workspaces for private projects&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 100+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To the wider GitLab community, thank you for the 137 contributions you provided to GitLab 16.4!
At GitLab, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;everyone can contribute&lt;&#x2F;a&gt; and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.5 release kickoff video.&lt;&#x2F;p&gt;

&lt;p&gt;Note that our monthly release date will change to the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2023&#x2F;09&#x2F;18&#x2F;gitlab-release-date-change&#x2F;&quot;&gt;third Thursday of every month&lt;&#x2F;a&gt; starting with our 16.6 release.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_4&#x2F;16_4-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 16.3.4 and 16.2.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/09/18/security-release-gitlab-16-3-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/09/18/security-release-gitlab-16-3-4-released/</id>
<published>2023-09-18T00:00:00+00:00</published>
<updated>2023-09-18T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.3.4 and 16.2.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;. For versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4, see the &lt;a href=&quot;#mitigations-for-impacted-versions&quot;&gt;mitigations&lt;&#x2F;a&gt; offered below.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#attacker-can-abuse-scan-execution-policies-to-run-pipelines-as-another-user&quot;&gt;Attacker can abuse scan execution policies to run pipeline as another user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;attacker-can-abuse-scan-execution-policies-to-run-pipelines-as-another-user&quot;&gt;Attacker can abuse scan execution policies to run pipelines as another user&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;975 --&gt;
&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting
from 13.12 before 16.2.7 and all
versions starting from 16.3 before 16.3.4. It was possible for an attacker to run 
pipelines as an arbitrary user via scheduled security scan policies. 
This was a bypass of &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3932&quot;&gt;CVE-2023-3932&lt;&#x2F;a&gt; showing additional impact.
This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.2). 
It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-5009&quot;&gt;CVE-2023-5009&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mitigations-for-impacted-versions&quot;&gt;Mitigations for impacted versions&lt;&#x2F;h3&gt;

&lt;p&gt;Instances running versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4 are vulnerable if both of the features below are enabled at the same time. In order to mitigate this vulnerability in situations where it&#x27;s not possible to upgrade, it is required to disable one or both features.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;import_and_export_settings.html#enable-migration-of-groups-and-projects-by-direct-transfer&quot;&gt;Direct transfers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;policies&#x2F;scan-execution-policies.html&quot;&gt;Security policies&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;strong&gt;If both features are turned on, the instance is in a vulnerable state.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;1634&quot;&gt;16.3.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131073&quot;&gt;Use new indexer, fix removing blobs from index&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131920&quot;&gt;Backport &quot;Fix Geo secondary proxying Git pulls unnecessarily&quot; to 16.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1627&quot;&gt;16.2.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131193&quot;&gt;Revert &quot;Merge branch &#x27;md-play-all-skipped-button&#x27; into &#x27;master&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.3.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/09/12/gitlab-16-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/09/12/gitlab-16-3-3-released/</id>
<published>2023-09-12T00:00:00+00:00</published>
<updated>2023-09-12T00:00:00+00:00</updated>
<author>
<name>Vladimir Glafirov</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.3.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1633&quot;&gt;16.3.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1529&quot;&gt;Pin redis-client to v0.17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6339&quot;&gt;Backport !6251 to 16-3-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130835&quot;&gt;Backport create ci_pipelines iid sequence on new projects to 16.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130576&quot;&gt;Backport 16.3  Fix cluster service reindexing params&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130823&quot;&gt;Patch UpdateCiMaxTotalYamlSizeBytesDefaultValue - stable branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131121&quot;&gt;Remove gdk base image and pin gdk sha&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131070&quot;&gt;Backport Enable sync with package metadata db by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131156&quot;&gt;Backport &quot;Prevent pipeline creation while import is running&quot; to 16.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.2.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/09/12/gitlab-16-2-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/09/12/gitlab-16-2-6-released/</id>
<published>2023-09-12T00:00:00+00:00</published>
<updated>2023-09-12T00:00:00+00:00</updated>
<author>
<name>Vladimir Glafirov</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.2.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1626&quot;&gt;16.2.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1526&quot;&gt;Pin redis-client to v0.14.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6338&quot;&gt;praefect: Handle replica paths in &#x27;track-repository&#x27; and &#x27;track-repositories&#x27; subcommands&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130836&quot;&gt;Backport create ci_pipelines iid sequence on new projects to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130834&quot;&gt;Backport &quot;Drop bridge jobs on unknown failures&quot; to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;131155&quot;&gt;Backport &quot;Prevent pipeline creation while import is running&quot; to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.3.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/09/05/gitlab-16-3-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/09/05/gitlab-16-3-2-released/</id>
<published>2023-09-05T00:00:00+00:00</published>
<updated>2023-09-05T00:00:00+00:00</updated>
<author>
<name>Vladimir Glafirov</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.3.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1632&quot;&gt;16.3.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130755&quot;&gt;Fix Code Suggestions in Web IDE on GitLab 16.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130833&quot;&gt;Backport &quot;Drop bridge jobs on unknown failures&quot; to 16.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.3.1, 16.2.5, and 16.1.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/08/31/security-release-gitlab-16-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/08/31/security-release-gitlab-16-3-1-released/</id>
<published>2023-08-31T00:00:00+00:00</published>
<updated>2023-08-31T00:00:00+00:00</updated>
<author>
<name>Félix Veillette-Potvin</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.3.1, 16.2.5 and 16.1.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#privilege-escalation-of-external-user-to-internal-access-through-group-service-account&quot;&gt;Privilege escalation of &quot;external user&quot; to internal access through group service account&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-sentry-token-by-changing-the-configured-url-fix-bypass&quot;&gt;Maintainer can leak sentry token by changing the configured URL (fix bypass)&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#google-cloud-logging-private-key-showed-in-plain-text-in-gitlab-ui-leaking-to-other-group-owners&quot;&gt;Google Cloud Logging private key showed in plain text in GitLab UI leaking to other group owners&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#information-disclosure-via-project-import-endpoint&quot;&gt;Information disclosure via project import endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#developer-can-leak-dast-scanners-site-profile-request-headers-and-auth-password&quot;&gt;Developer can leak DAST scanners &quot;Site Profile&quot; request headers and auth password&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-forking-outside-current-group&quot;&gt;Project forking outside current group&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-is-capable-of-creating-model-experiment-and-updating-existing-run&#x27;s-status-in-public-project&quot;&gt;User is capable of creating Model experiment and updating existing run&#x27;s status in public project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-bulk-import-api&quot;&gt;ReDoS in bulk import API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#pagination-for-branches-and-tags-can-be-skipped-leading-to-dos&quot;&gt;Pagination for Branches and Tags can be skipped leading to DoS&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#internal-open-redirection-due-to-improper-handling-of-characters&quot;&gt;Internal Open Redirection Due to Improper handling of  &quot;..&#x2F;&quot; characters&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#subgroup-member-with-reporter-role-can-edit-group-labels&quot;&gt;Subgroup Member With Reporter Role Can Edit Group Labels&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#banned-user-can-delete-package-registries&quot;&gt;Banned user can delete package registries&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;privilege-escalation-of-external-user-to-internal-access-through-group-service-account&quot;&gt;Privilege escalation of &quot;external user&quot; to internal access through group service account&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 16.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. If an external user is given an owner role on any group, that external user may escalate their privileges on the instance by creating a service account in that group. This service account is not classified as external and may be used to access internal projects. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3915&quot;&gt;CVE-2023-3915&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-sentry-token-by-changing-the-configured-url-fix-bypass&quot;&gt;Maintainer can leak sentry token by changing the configured URL (fix bypass)&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;950 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.8 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A malicious Maintainer can, under specific circumstances, leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This was as a result of an incomplete fix for CVE-2022-4365. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned [CVE-2023-4378](https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4378.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;70rpedo&quot;&gt;70rpedo&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;google-cloud-logging-private-key-showed-in-plain-text-in-gitlab-ui-leaking-to-other-group-owners&quot;&gt;Google Cloud Logging private key showed in plain text in GitLab UI leaking to other group owners&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;940 --&gt;

&lt;p&gt;An information disclosure issue in GitLab EE affecting all versions from 16.2 prior to 16.2.5, and 16.3 prior to 16.3.1 allowed other Group Owners to see the Public Key for a Google Cloud Logging audit event streaming destination, if configured. Owners can now only write the key, not read it. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5), and affects only GitLab EE. It is now mitigated in the latest release and is assigned [CVE-2023-3950](https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3950.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-project-import-endpoint&quot;&gt;Information disclosure via project import endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.6 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which any user can read limited information about any project&#x27;s imports. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4630&quot;&gt;CVE-2023-4630&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by a GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;rodrigo.tomonari&quot;&gt;Rodrigo Tomonari&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;developer-can-leak-dast-scanners-site-profile-request-headers-and-auth-password&quot;&gt;Developer can leak DAST scanners &quot;Site Profile&quot; request headers and auth password&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;954 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which a project member can leak credentials stored in site profile. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0), and only affects GitLab EE. It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4343&quot;&gt;CVE-2022-4343&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-forking-outside-current-group&quot;&gt;Project forking outside current group&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.3 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to fork a project outside of current group by an unauthorised user. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4638&quot;&gt;CVE-2023-4638&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-is-capable-of-creating-model-experiment-and-updating-existing-runs-status-in-public-project&quot;&gt;User is capable of creating Model experiment and updating existing run&#x27;s status in public project&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to create model experiments in public projects. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4018&quot;&gt;CVE-2023-4018&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ricardobrito&quot;&gt;ricardobrito&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-in-bulk-import-api&quot;&gt;ReDoS in bulk import API&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlahttps:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2023&#x2F;08&#x2F;01&#x2F;b&#x2F;-&#x2F;issues&#x2F;935 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.11 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. An authenticated user could trigger a denial of service when importing or cloning malicious content. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;,6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3205&quot;&gt;CVE-2023-3205&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pagination-for-branches-and-tags-can-be-skipped-leading-to-dos&quot;&gt;Pagination for Branches and Tags can be skipped leading to DoS&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.3 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which the projects API pagination can be skipped, potentially leading to DoS on certain instances. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4647&quot;&gt;CVE-2023-4647&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;vyaklushin&quot;&gt;Vasilii Iakliushin&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;internal-open-redirection-due-to-improper-handling-of---characters&quot;&gt;Internal Open Redirection Due to Improper handling of  &quot;..&#x2F;&quot; characters&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;934 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 4.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 where it was possible to create a URL that would redirect to a different project. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1279&quot;&gt;CVE-2023-1279&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;akadrian&quot;&gt;akadrian&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;subgroup-member-with-reporter-role-can-edit-group-labels&quot;&gt;Subgroup Member With Reporter Role Can Edit Group Labels&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.0 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to edit labels description by an unauthorised user. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0120&quot;&gt;CVE-2023-0120&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;drjgouveia&quot;&gt;drjgouveia&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;banned-user-can-delete-package-registries&quot;&gt;Banned user can delete package registries&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1555&quot;&gt;CVE-2023-1555&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ali_shehab&quot;&gt;ali_shehab&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-commonmarker&quot;&gt;Update commonmarker&lt;&#x2F;h2&gt;

&lt;p&gt;Commonmarker has been updated to version 0.23.10 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl&quot;&gt;Update openssl&lt;&#x2F;h2&gt;
&lt;p&gt;Openssl has been updated to version to 1.1.1u in order to mitigate security issues.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;1631&quot;&gt;16.3.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129854&quot;&gt;Remove unified URL limitation for GitLab chart (16.3 backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129910&quot;&gt;Revert migration to backfill archived in wikis&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129922&quot;&gt;Add .net to context selector to skip live envs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129882&quot;&gt;Backport &quot;Geo: Resync direct upload object stored artifacts&quot; to 16.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;130200&quot;&gt;CSP: disable LFS url when not using object storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129971&quot;&gt;Backport LicenseScanning fix for AutoDevOps&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1625&quot;&gt;16.2.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;6172&quot;&gt;Backport &quot;cgroup: using a noop manager on linux without cgroup&quot; fix to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128763&quot;&gt;Adjust Danger logic for stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129883&quot;&gt;Backport &quot;Geo: Resync direct upload object stored artifacts&quot; to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1615&quot;&gt;16.1.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128779&quot;&gt;Revert &quot;Log rails response length&quot; - 16.1 Backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128764&quot;&gt;Adjust Danger logic for stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;129884&quot;&gt;Backport &quot;Geo: Resync direct upload object stored artifacts&quot; to 16.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.3 released with new velocity metrics in the Value Streams Dashboard</title>
<release>16.3</release>
<link href='https://about.gitlab.com/releases/2023/08/22/gitlab-16-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/08/22/gitlab-16-3-released/</id>
<published>2023-08-22T00:00:00+00:00</published>
<updated>2023-08-22T00:00:00+00:00</updated>
<author>
<name>Sampath Ranasinghe</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.3 with &lt;a href=&quot;#new-velocity-metrics-in-the-value-streams-dashboard&quot;&gt;new velocity metrics in the Value Streams Dashboard&lt;&#x2F;a&gt;, &lt;a href=&quot;#more-powerful-gitlab-saas-runners-on-linux&quot;&gt;more powerful GitLab SaaS runners on Linux&lt;&#x2F;a&gt;, &lt;a href=&quot;#additional-filtering-for-scan-result-policies&quot;&gt;additional filtering for scan result policies&lt;&#x2F;a&gt;, &lt;a href=&quot;#connect-to-a-workspace-with-ssh&quot;&gt;workspace connections with SSH&lt;&#x2F;a&gt;, &lt;a href=&quot;#flux-sync-status-visualization&quot;&gt;Flux sync status visualization&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 100+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 237 contributions they provided to GitLab 16.3! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.4 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_3&#x2F;16_3-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.2.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/08/11/gitlab-16-2-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/08/11/gitlab-16-2-4-released/</id>
<published>2023-08-11T00:00:00+00:00</published>
<updated>2023-08-11T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.2.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1624&quot;&gt;16.2.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128253&quot;&gt;Backport &#x27;420347-fix-new-index-settings&#x27; to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128720&quot;&gt;Backport Fix max number of slices to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128708&quot;&gt;Put back broadcast messages to sign-in page for self-hosted&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128778&quot;&gt;Revert &quot;Remove log_response_length feature flag&quot; - 16.2 Backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128942&quot;&gt;Fix broken dependency list for invalid Container Scanning pkg mgr type&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128950&quot;&gt;Replace vscode-cdn.net with web-ide.gitlab-static.net (Backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7075&quot;&gt;Set proxy_http_version v1.0 for health monitoring endpoints&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.2.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/08/03/gitlab-16-2-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/08/03/gitlab-16-2-3-released/</id>
<published>2023-08-03T00:00:00+00:00</published>
<updated>2023-08-03T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.2.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a bug.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1623&quot;&gt;16.2.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128290&quot;&gt;Backport &quot;Fix artifacts object storage geo replication&quot; to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.1.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/08/03/gitlab-16-1-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/08/03/gitlab-16-1-4-released/</id>
<published>2023-08-03T00:00:00+00:00</published>
<updated>2023-08-03T00:00:00+00:00</updated>
<author>
<name>Steve Abrams</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 16.1.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1614&quot;&gt;16.1.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;128291&quot;&gt;Backport &quot;Fix artifacts object storage geo replication&quot; to 16.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;zero_downtime.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.2.2, 16.1.3, and 16.0.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/08/01/security-release-gitlab-16-2-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/08/01/security-release-gitlab-16-2-2-released/</id>
<published>2023-08-01T00:00:00+00:00</published>
<updated>2023-08-01T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.2.2, 16.1.3, and 16.0.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-projectreferencefilter-in-any-markdown-fields&quot;&gt;ReDoS via ProjectReferenceFilter in any Markdown fields&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-autolinkfilter-in-any-markdown-fields&quot;&gt;ReDoS via AutolinkFilter in any Markdown fields&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#an-attacker-can-run-pipeline-jobs-as-arbitrary-user&quot;&gt;An attacker can run pipeline jobs as arbitrary user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regex-dos-in-harbor-registry-search&quot;&gt;Regex DoS in Harbor Registry search&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-read-of-files-owned-by-the-git-user-via-malicious-targz-file-upload-using-gitlab-export-functionality&quot;&gt;Arbitrary read of files owned by the &quot;git&quot; user via malicious tar.gz file upload using GitLab export functionality&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-web-ide-beta-via-crafted-url&quot;&gt;Stored XSS in Web IDE Beta via crafted URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#securitypolicyprojectassign-mutation-does-not-authorize-security-policy-project-id&quot;&gt;&lt;code&gt;securityPolicyProjectAssign&lt;&#x2F;code&gt; mutation does not authorize security policy project ID&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#possible-pages-unique-domain-overwrite&quot;&gt;Possible Pages Unique Domain Overwrite&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#access-tokens-may-have-been-logged-when-a-query-was-made-to-an-endpoint&quot;&gt;Access tokens may have been logged when a query was made to an endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#reflected-xss-via-plantuml-diagram&quot;&gt;Reflected XSS via PlantUML diagram&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#the-main-branch-of-a-repository-with-a-specially-designed-name-may-allow-an-attacker-to-create-repositories-with-malicious-code&quot;&gt;The main branch of a repository with a specially designed name may allow an attacker to create repositories with malicious code&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#invalid-start_sha-value-on-merge-requests-page-may-lead-to-denial-of-service&quot;&gt;Invalid &#x27;start_sha&#x27; value on merge requests page may lead to Denial of Service&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#developers-can-create-pipeline-schedules-on-protected-branches-even-if-they-dont-have-access-to-merge&quot;&gt;Developers can create pipeline schedules on protected branches even if they don&#x27;t have access to merge&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#potential-dos-due-to-lack-of-pagination-while-loading-license-data&quot;&gt;Potential DOS due to lack of pagination while loading license data&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#leaking-emails-of-newly-created-users&quot;&gt;Leaking emails of newly created users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;redos-via-projectreferencefilter-in-any-markdown-fields&quot;&gt;ReDoS via ProjectReferenceFilter in any Markdown fields&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;910 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3994&quot;&gt;CVE-2023-3994&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-via-autolinkfilter-in-any-markdown-fields&quot;&gt;ReDoS via AutolinkFilter in any Markdown fields&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;925 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.14 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use AutolinkFilter to the preview_markdown endpoint. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3364&quot;&gt;CVE-2023-3364&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;an-attacker-can-run-pipeline-jobs-as-arbitrary-user&quot;&gt;An attacker can run pipeline jobs as arbitrary user&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;917 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.2). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3932&quot;&gt;CVE-2023-3932&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regex-dos-in-harbor-registry-search&quot;&gt;Regex DoS in Harbor Registry search&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;913 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0632&quot;&gt;CVE-2023-0632&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-read-of-files-owned-by-the-git-user-via-malicious-targz-file-upload-using-gitlab-export-functionality&quot;&gt;Arbitrary read of files owned by the &quot;git&quot; user via malicious tar.gz file upload using GitLab export functionality&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;926 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.10 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Under specific circumstances, a user importing a project &#x27;from export&#x27; could access and read unrelated files via uploading a specially crafted file. This was due to a bug in &lt;code&gt;tar&lt;&#x2F;code&gt;, fixed in &lt;a href=&quot;https:&#x2F;&#x2F;lists.gnu.org&#x2F;archive&#x2F;html&#x2F;info-gnu&#x2F;2023-07&#x2F;msg00005.html&quot;&gt;&lt;code&gt;tar-1.35&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3385&quot;&gt;CVE-2023-3385&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ubercomp&quot;&gt;ubercomp&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-web-ide-beta-via-crafted-url&quot;&gt;Stored XSS in Web IDE Beta via crafted URL&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to trigger a stored XSS vulnerability via user interaction with a crafted URL in the WebIDE beta. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2164&quot;&gt;CVE-2023-2164&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;viridian_40826d&quot;&gt;viridian_40826d&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;securitypolicyprojectassign-mutation-does-not-authorize-security-policy-project-id&quot;&gt;&lt;code&gt;securityPolicyProjectAssign&lt;&#x2F;code&gt; mutation does not authorize security policy project ID&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;929 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 14.1 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for EE-licensed users to link any security policy project by its ID to projects or groups the user has access to, potentially revealing the security projects&#x27;s configured security policies. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4002&quot;&gt;CVE-2023-4002&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;bauerdominic&quot;&gt;bauerdominic&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;possible-pages-unique-domain-overwrite&quot;&gt;Possible Pages Unique Domain Overwrite&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;920 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to takeover GitLab Pages with unique domain URLs if the random string added was known. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4008&quot;&gt;CVE-2023-4008&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;kassio&quot;&gt;kassio&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;access-tokens-may-have-been-logged-when-a-query-was-made-to-an-endpoint&quot;&gt;Access tokens may have been logged when a query was made to an endpoint&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;906 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Access tokens may have been logged when a query was made to a specific endpoint. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3993&quot;&gt;CVE-2023-3993&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;mjozenazemian&quot;&gt;mjozenazemian&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reflected-xss-via-plantuml-diagram&quot;&gt;Reflected XSS via PlantUML diagram&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;932 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.0 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A reflected XSS was possible when creating specific PlantUML diagrams that allowed the attacker to perform arbitrary actions on behalf of victims. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3500&quot;&gt;CVE-2023-3500&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ankitsingh&quot;&gt;ankitsingh&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;the-main-branch-of-a-repository-with-a-specially-designed-name-may-allow-an-attacker-to-create-repositories-with-malicious-code&quot;&gt;The main branch of a repository with a specially designed name may allow an attacker to create repositories with malicious code&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;915 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3401&quot;&gt;CVE-2023-3401&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h2 id=&quot;invalid-start_sha-value-on-merge-requests-page-may-lead-to-denial-of-service&quot;&gt;Invalid &#x27;start_sha&#x27; value on merge requests page may lead to Denial of Service&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;928 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. An invalid &#x27;start_sha&#x27; value on merge requests page may lead to Denial of Service as Changes tab would not load. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3900&quot;&gt;CVE-2023-3900&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;toukakirishima&quot;&gt;toukakirishima&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;developers-can-create-pipeline-schedules-on-protected-branches-even-if-they-dont-have-access-to-merge&quot;&gt;Developers can create pipeline schedules on protected branches even if they don&#x27;t have access to merge&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;901 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don&#x27;t have access to merge. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2022&quot;&gt;CVE-2023-2022&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-dos-due-to-lack-of-pagination-while-loading-license-data&quot;&gt;Potential DOS due to lack of pagination while loading license data&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;931 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions from 15.11 prior to 16.2.2 which allows an attacker to spike the resource consumption by loading Dependency List page, resulting in a possible DoS. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is mitigated in the latest 16.2.2 release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-4011&quot;&gt;CVE-2023-4011&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gonzoyumo&quot;&gt;gonzoyumo&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;leaking-emails-of-newly-created-users&quot;&gt;Leaking emails of newly created users&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;927 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to leak a user&#x27;s email via an error message for groups that restrict membership by email domain. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1210&quot;&gt;CVE-2023-1210&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been updated to version 7.10.4  in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-redis&quot;&gt;Update Redis&lt;&#x2F;h2&gt;

&lt;p&gt;Redis has been updated to version 6.2.13 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;1622&quot;&gt;16.2.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127238&quot; title=&quot;Merge branch &#x27;418983-fix-issue-type-update&#x27; into &#x27;master&#x27;&quot;&gt;Issue type change to incident results in 404&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127045&quot; title=&quot;Enable descendant_security_scans by default&quot;&gt;Enable &lt;code&gt;descendant_security_scans&lt;&#x2F;code&gt; by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127516&quot; title=&quot;Disable IAT verification by default&quot;&gt;Disable IAT verification by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127777&quot; title=&quot;BitBucket Server Importer - Preserve PR (MR) reviewers&quot;&gt;BitBucket Server Importer - Preserve PR (MR) reviewers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7060&quot; title=&quot;Toggle recommend_pg_upgrade to false for now&quot;&gt;Toggle &lt;code&gt;recommend_pg_upgrade&lt;&#x2F;code&gt; to false for now&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1613&quot;&gt;16.1.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;125261&quot; title=&quot;Geo: Backport design repos verification bug fix&quot;&gt;Geo: Backport design repos verification bug fix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;125316&quot; title=&quot;Geo - Backport wiki repository verification fix&quot;&gt;Geo - Backport wiki repository verification fix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;126783&quot; title=&quot;Fix FOUC when new sidebar enabled&quot;&gt;Fix FOUC when new sidebar enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127515&quot; title=&quot;[16.1] Repair the trigger for Release Environments&quot;&gt;Repair the trigger for Release Environments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127517&quot; title=&quot;Disable IAT verification by default&quot;&gt;Disable IAT verification by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127402&quot; title=&quot;Backport fix for pending direct uploads completion to 16.1&quot;&gt;Backport fix for pending direct uploads completion to 16.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127778&quot; title=&quot;BitBucket Server Importer - Preserve PR (MR) reviewers&quot;&gt;BitBucket Server Importer - Preserve PR (MR) reviewers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7050&quot; title=&quot;Fix pg-upgrade failure on Geo secondary nodes [16.1]&quot;&gt;Fix pg-upgrade failure on Geo secondary nodes [16.1]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7034&quot; title=&quot;Don&#x27;t 500 when pages tries to serve a chunked file&quot;&gt;Don&#x27;t 500 when pages tries to serve a chunked file&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1608&quot;&gt;16.0.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127518&quot; title=&quot;Disable IAT verification by default&quot;&gt;Disable IAT verification by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;7051&quot; title=&quot;Fix pg-upgrade failure on Geo secondary nodes [16.0]&quot;&gt;Fix pg-upgrade failure on Geo secondary nodes [16.0]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.13</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/07/27/gitlab-15-11-13-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/07/27/gitlab-15-11-13-released/</id>
<published>2023-07-27T00:00:00+00:00</published>
<updated>2023-07-27T00:00:00+00:00</updated>
<author>
<name>Steve Abrams</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.11.13 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;151113&quot;&gt;15.11.13&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127520&quot;&gt;Disable IAT verification by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/07/25/gitlab-16-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/07/25/gitlab-16-2-1-released/</id>
<published>2023-07-25T00:00:00+00:00</published>
<updated>2023-07-25T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.2.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1621&quot;&gt;16.2.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127401&quot;&gt;Backport fix for pending direct uploads completion to 16.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;127313&quot;&gt;Fix crash when LDAP CA file set outside tls_options&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.2 released with all new rich text editor experience</title>
<release>16.2</release>
<link href='https://about.gitlab.com/releases/2023/07/22/gitlab-16-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/07/22/gitlab-16-2-released/</id>
<published>2023-07-22T00:00:00+00:00</published>
<updated>2023-07-22T00:00:00+00:00</updated>
<author>
<name>Tatyana Golubeva</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.2 with &lt;a href=&quot;#all-new-rich-text-editor-experience&quot;&gt;all new rich text editor experience&lt;&#x2F;a&gt;, &lt;a href=&quot;#command-palette&quot;&gt;command palette&lt;&#x2F;a&gt;, &lt;a href=&quot;#support-for-keyless-signing-with-cosign&quot;&gt;support for keyless signing with Cosign&lt;&#x2F;a&gt;, &lt;a href=&quot;#new-customization-layer-for-the-value-streams-dashboard&quot;&gt;new customization layer for the Value Streams Dashboard&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 110+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 208 contributions they provided to GitLab 16.2! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.3 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_2&#x2F;16_2-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/07/17/gitlab-15-11-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/07/17/gitlab-15-11-12-released/</id>
<published>2023-07-17T00:00:00+00:00</published>
<updated>2023-07-17T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.11.12 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6984&quot;&gt;Fix pg-upgrade failure on Geo secondary nodes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.1.2, 16.0.7, and 15.11.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/07/05/security-release-gitlab-16-1-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/07/05/security-release-gitlab-16-1-2-released/</id>
<published>2023-07-05T00:00:00+00:00</published>
<updated>2023-07-05T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.1.2, 16.0.7, and 15.11.11 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab Enterprise Edition installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all GitLab EE installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#a-user-can-change-the-name-and-path-of-some-public-gitlab-groups&quot;&gt;A user can change the name and path of some public GitLab groups&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;a-user-can-change-the-name-and-path-of-some-public-gitlab-groups&quot;&gt;A user can change the name and path of some public GitLab groups&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;912 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 8.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3484&quot;&gt;CVE-2023-3484&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;zeb0x01&quot;&gt;zeb0x01&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;1612&quot;&gt;16.1.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;124818&quot; title=&quot;Fix environments tab is empty after upgrading to 16.1&quot;&gt;Fix environments tab is empty after upgrading to 16.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;125074&quot; title=&quot;Fix Bitbucket Cloud Importer: 16.1 backport&quot;&gt;Fix Bitbucket Cloud Importer: 16.1 backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;125111&quot; title=&quot;Fix GitHub Importer: 16.1 Backport&quot;&gt;Fix GitHub Importer: 16.1 Backport&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;125116&quot; title=&quot;Fix overlapping titles in wiki sidebar navigation&quot;&gt;Fix overlapping titles in wiki sidebar navigation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;124613&quot; title=&quot;Reset webpack path for Mermaid iFrames&quot;&gt;Reset webpack path for Mermaid iFrames&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.1.1, 16.0.6, and 15.11.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/29/security-release-gitlab-16-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/29/security-release-gitlab-16-1-1-released/</id>
<published>2023-06-29T00:00:00+00:00</published>
<updated>2023-06-29T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.1.1, 16.0.6, and 15.11.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-epicreferencefilter-in-any-markdown-fields&quot;&gt;ReDoS via EpicReferenceFilter in any Markdown fields&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#new-commits-to-private-projects-visible-in-forks-created-while-project-was-public&quot;&gt;New commits to private projects visible in forks created while project was public&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#code-owners-approvals-are-not-removed-allowing-merge-into-protected-branches&quot;&gt;Code Owners approvals are not removed allowing merge into protected branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-masked-webhook-secrets-by-manipulating-url-masking&quot;&gt;Maintainer can leak masked webhook secrets by manipulating URL masking&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#information-disclosure-of-project-import-errors&quot;&gt;Information disclosure of project import errors&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#sensitive-information-disclosure-via-value-stream-analytics-controller&quot;&gt;Sensitive information disclosure via value stream analytics controller&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-code-owners-branch-protection-rule-in-gitlab&quot;&gt;Bypassing Code Owners branch protection rule in GitLab&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-injection-in-email-address&quot;&gt;HTML injection in email address&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#webhook-token-leaked-in-sidekiq-logs-if-log-format-is-default&quot;&gt;Webhook token leaked in Sidekiq logs if log format is &#x27;default&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#private-email-address-of-service-desk-issue-creator-disclosed-via-issues-api&quot;&gt;Private email address of service desk issue creator disclosed via issues API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;redos-via-epicreferencefilter-in-any-markdown-fields&quot;&gt;ReDoS via EpicReferenceFilter in any Markdown fields&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;902 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3424&quot;&gt;CVE-2023-3424&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-commits-to-private-projects-visible-in-forks-created-while-project-was-public&quot;&gt;New commits to private projects visible in forks created while project was public&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;905 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.10 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. It may be possible for users to view new commits to private projects in a fork created while the project was public. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2190&quot;&gt;CVE-2023-2190&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;code-owners-approvals-are-not-removed-allowing-merge-into-protected-branches&quot;&gt;Code Owners approvals are not removed allowing merge into protected branches&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;907 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to merge arbitrary code into protected branches due to a CODEOWNERS approval bug. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3444&quot;&gt;CVE-2023-3444&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;glan1k&quot;&gt;glan1k&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-masked-webhook-secrets-by-manipulating-url-masking&quot;&gt;Maintainer can leak masked webhook secrets by manipulating URL masking&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;908 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1. A maintainer could modify a webhook URL to leak masked webhook secrets by manipulating other masked portions. This addresses an incomplete fix for CVE-2023-0838. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2620&quot;&gt;CVE-2023-2620&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-of-project-import-errors&quot;&gt;Information disclosure of project import errors&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;903 --&gt;

&lt;p&gt;An information disclosure issue in GitLab CE&#x2F;EE affecting all versions from 16.0 prior to 16.0.6, and version 16.1.0 allows unauthenticated actors to access the import error information if a project was imported from GitHub. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3362&quot;&gt;CVE-2023-3362&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;rodrigo.tomonari&quot;&gt;Rodrigo Tomonari&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sensitive-information-disclosure-via-value-stream-analytics-controller&quot;&gt;Sensitive information disclosure via value stream analytics controller&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;898 --&gt;

&lt;p&gt;A sensitive information leak issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows access to titles of private issues and merge requests. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3102&quot;&gt;CVE-2023-3102&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypassing-code-owners-branch-protection-rule-in-gitlab&quot;&gt;Bypassing Code Owners branch protection rule in GitLab&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;894 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.7 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. This allowed a developer to remove the CODEOWNERS rules and merge to a protected branch. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2576&quot;&gt;CVE-2023-2576&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;inspector-ambitious&quot;&gt;inspector-ambitious&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;html-injection-in-email-address&quot;&gt;HTML injection in email address&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;900 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2200&quot;&gt;CVE-2023-2200&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;webhook-token-leaked-in-sidekiq-logs-if-log-format-is-default&quot;&gt;Webhook token leaked in Sidekiq logs if log format is &#x27;default&#x27;&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;904 --&gt;

&lt;p&gt;An information disclosure issue in Gitlab CE&#x2F;EE affecting all versions from 13.6 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1, resulted in the Sidekiq log including webhook tokens when the log format was set to &lt;code&gt;default&lt;&#x2F;code&gt;. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:L&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-3363&quot;&gt;CVE-2023-3363&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported by Martin Vaisset from MyMoneyBank.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-email-address-of-service-desk-issue-creator-disclosed-via-issues-api&quot;&gt;Private email address of service desk issue creator disclosed via issues API&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;897 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.7 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to leak the email address of a user who created a service desk issue. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1936&quot;&gt;CVE-2023-1936&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ricardobrito&quot;&gt;ricardobrito&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;
&lt;p&gt;Mattermost has been updated to version 7.10.2 in GitLab 16.0.6 and version 7.9.4 in GitLab 15.11.10 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-xmlsoftlibxml2-to-version-2104&quot;&gt;Update xmlsoft&#x2F;libxml2 to version 2.10.4&lt;&#x2F;h2&gt;
&lt;p&gt;xmlsoft&#x2F;libxml2 has been updated to version 2.10.4 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.1 released with all new navigation</title>
<release>16.1</release>
<link href='https://about.gitlab.com/releases/2023/06/22/gitlab-16-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/22/gitlab-16-1-released/</id>
<published>2023-06-22T00:00:00+00:00</published>
<updated>2023-06-22T00:00:00+00:00</updated>
<author>
<name>Chris Balane</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 16.1 with &lt;a href=&quot;#all-new-navigation-experience&quot;&gt;all new navigation&lt;&#x2F;a&gt;, &lt;a href=&quot;#gitlab-dedicated-is-now-generally-available&quot;&gt;GitLab Dedicated General Availability&lt;&#x2F;a&gt;, &lt;a href=&quot;#visualize-kubernetes-resources-in-gitlab&quot;&gt;Kubernetes resource visualization&lt;&#x2F;a&gt;, &lt;a href=&quot;#authenticate-with-service-accounts&quot;&gt;Authentication with Service Accounts&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 100+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 189 contributions they provided to GitLab 16.1! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.2 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_1&#x2F;16_1-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/16/gitlab-16-0-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/16/gitlab-16-0-5-released/</id>
<published>2023-06-16T00:00:00+00:00</published>
<updated>2023-06-16T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.0.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1605&quot;&gt;16.0.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122335&quot;&gt;Update gitlab-elasticsearch-indexer version&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122995&quot;&gt;Add Metrics Dashboard menu&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;123155&quot;&gt;Fix HllRedisCounter overwriting know events aggregation with symbol instead of string (backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122859&quot;&gt;Slowly iterate MigrateSharedVulnerabilityIdentifiers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;123699&quot;&gt;Do not run bulk cron indexer when cluster is unhealthy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;123524&quot;&gt;Use root_ref to index commits&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/15/gitlab-15-11-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/15/gitlab-15-11-9-released/</id>
<published>2023-06-15T00:00:00+00:00</published>
<updated>2023-06-15T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.11.9 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15119&quot;&gt;15.11.9&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122856&quot;&gt;Slowly iterate MigrateSharedVulnerabilityIdentifiers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.0.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/08/gitlab-16-0-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/08/gitlab-16-0-4-released/</id>
<published>2023-06-08T00:00:00+00:00</published>
<updated>2023-06-08T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.0.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1604&quot;&gt;16.0.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122797&quot;&gt;Fix LDAP tls_options not working&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 16.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/07/gitlab-16-0-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/07/gitlab-16-0-3-released/</id>
<published>2023-06-07T00:00:00+00:00</published>
<updated>2023-06-07T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 16.0.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1603&quot;&gt;16.0.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122395&quot;&gt;Fix serialization of pull_requests in Bitbucket Server Import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122539&quot;&gt;Fix memory leak in CI config includes entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122466&quot;&gt;Fix MR approval rules sync when disabling scan result policy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122349&quot;&gt;LFS: Serve pre-signed URLs in &lt;code&gt;&#x2F;lfs&#x2F;objects&#x2F;batch&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/07/gitlab-15-11-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/07/gitlab-15-11-8-released/</id>
<published>2023-06-07T00:00:00+00:00</published>
<updated>2023-06-07T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.11.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15118&quot;&gt;15.11.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122396&quot;&gt;Fix serialization of pull requests in BitbucketServer Import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122697&quot;&gt;Update stable branch with security&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122348&quot;&gt;LFS: Serve pre-signed URLs in &lt;code&gt;&#x2F;lfs&#x2F;objects&#x2F;batch&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122540&quot;&gt;Fix memory leak in CI config includes entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 16.0.2, 15.11.7, and 15.10.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/06/05/security-release-gitlab-16-0-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/06/05/security-release-gitlab-16-0-2-released/</id>
<published>2023-06-05T00:00:00+00:00</published>
<updated>2023-06-05T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 16.0.2, 15.11.7, and 15.10.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-with-csp-bypass-in-merge-requests&quot;&gt;Stored-XSS with CSP-bypass in Merge requests&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-frontmatterfilter-in-any-markdown-fields&quot;&gt;ReDoS via FrontMatterFilter in any Markdown fields&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-inlinedifffilter-in-any-markdown-fields&quot;&gt;ReDoS via InlineDiffFilter in any Markdown fields&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-via-dollarmathpostfilter-in-markdown-fields&quot;&gt;ReDoS via DollarMathPostFilter in Markdown fields&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-via-malicious-test-report-artifacts&quot;&gt;DoS via malicious test report artifacts&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#restricted-ip-addresses-can-clone-repositories-of-public-projects&quot;&gt;Restricted IP addresses can clone repositories of public projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#reflected-xss-in-report-abuse-functionality&quot;&gt;Reflected XSS in Report Abuse Functionality&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#privilege-escalation-from-maintainer-to-owner-by-importing-members-from-a-project&quot;&gt;Privilege escalation from maintainer to owner by importing members from a project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-tags-protection-in-gitlab&quot;&gt;Bypassing tags protection in GitLab&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-using-multiple-labels-with-arbitrarily-large-descriptions&quot;&gt;Denial of Service using multiple labels with arbitrarily large descriptions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ability-to-use-an-unverified-email-for-public-and-commit-emails&quot;&gt;Ability to use an unverified email for public and commit emails&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirection-through-http-response-splitting&quot;&gt;Open Redirection Through HTTP Response Splitting&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-issue-notes-to-an-unauthorized-user-when-exporting-a-project&quot;&gt;Disclosure of issue notes to an unauthorized user when exporting a project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ambiguous-branch-name-exploitation&quot;&gt;Ambiguous branch name exploitation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stored-xss-with-csp-bypass-in-merge-requests&quot;&gt;Stored-XSS with CSP-bypass in Merge requests&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;893 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A specially crafted merge request could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2442&quot;&gt;CVE-2023-2442&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-via-frontmatterfilter-in-any-markdown-fields&quot;&gt;ReDoS via FrontMatterFilter in any Markdown fields&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;888 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2199&quot;&gt;CVE-2023-2199&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-via-inlinedifffilter-in-any-markdown-fields&quot;&gt;ReDoS via InlineDiffFilter in any Markdown fields&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;887 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2198&quot;&gt;CVE-2023-2198&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-via-dollarmathpostfilter-in-markdown-fields&quot;&gt;ReDoS via DollarMathPostFilter in Markdown fields&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;881 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A DollarMathPostFilter Regular Expression Denial of Service in was possible by sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2132&quot;&gt;CVE-2023-2132&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dos-via-malicious-test-report-artifacts&quot;&gt;DoS via malicious test report artifacts&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;850 --&gt;

&lt;p&gt;A denial of service issue was discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.2.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2 which allows an attacker to cause high resource consumption using malicious test report artifacts. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0121&quot;&gt;CVE-2023-0121&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;luryus&quot;&gt;luryus&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;restricted-ip-addresses-can-clone-repositories-of-public-projects&quot;&gt;Restricted IP addresses can clone repositories of public projects&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;889 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2589&quot;&gt;CVE-2023-2589&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ali_shehab&quot;&gt;ali_shehab&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reflected-xss-in-report-abuse-functionality&quot;&gt;Reflected XSS in Report Abuse Functionality&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;875 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.8 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A reflected XSS was possible when creating new abuse reports which allows attackers to perform arbitrary actions on behalf of victims. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2015&quot;&gt;CVE-2023-2015&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;akadrian&quot;&gt;akadrian&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-from-maintainer-to-owner-by-importing-members-from-a-project&quot;&gt;Privilege escalation from maintainer to owner by importing members from a project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;892 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 14.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A malicious maintainer in a project can escalate other users to Owners in that project if they import members from another project that those other users are Owners of. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2485&quot;&gt;CVE-2023-2485&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypassing-tags-protection-in-gitlab&quot;&gt;Bypassing tags protection in GitLab&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;890 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker was able to spoof protected tags, which could potentially lead a victim to download malicious code. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2001&quot;&gt;CVE-2023-2001&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;inspector-ambitious&quot;&gt;inspector-ambitious&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-using-multiple-labels-with-arbitrarily-large-descriptions&quot;&gt;Denial of Service using multiple labels with arbitrarily large descriptions&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;880 --&gt;

&lt;p&gt;A lack of length validation in GitLab CE&#x2F;EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0921&quot;&gt;CVE-2023-0921&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ability-to-use-an-unverified-email-for-public-and-commit-emails&quot;&gt;Ability to use an unverified email for public and commit emails&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;867 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1204&quot;&gt;CVE-2023-1204&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;theluci&quot;&gt;theluci&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirection-through-http-response-splitting&quot;&gt;Open Redirection Through HTTP Response Splitting&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;885 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. Open redirection was possible via HTTP response splitting in the NPM package API. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0508&quot;&gt;CVE-2023-0508&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;akadrian&quot;&gt;akadrian&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-issue-notes-to-an-unauthorized-user-when-exporting-a-project&quot;&gt;Disclosure of issue notes to an unauthorized user when exporting a project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;854 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1825&quot;&gt;CVE-2023-1825&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ambiguous-branch-name-exploitation&quot;&gt;Ambiguous branch name exploitation&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;886 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 1.2 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2013&quot;&gt;CVE-2023-2013&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;inspector-ambitious&quot;&gt;inspector-ambitious&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been updated to version 7.9.3 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ncurses&quot;&gt;Update Ncurses&lt;&#x2F;h2&gt;

&lt;p&gt;Ncurses has been updated to version 6.4-20230225 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-postgresql&quot;&gt;Update PostgreSQL&lt;&#x2F;h2&gt;

&lt;p&gt;PostgreSQL has been updated to versions 12.14 and 13.11 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;1602&quot;&gt;16.0.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121518&quot;&gt;Update the upgrade path for 15.11 and 16.x&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121470&quot;&gt;Introduce parallelised BitBucket Server Importer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121872&quot;&gt;Fix Sidekiq crash when gitlab.yml contains UTF-8 characters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121745&quot;&gt;Revert &quot;Remove legacy project routes&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121843&quot;&gt;Merge branch &#x27;344594-fix-migration&#x27; into &#x27;16-0-stable-ee&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121606&quot;&gt;Do not run notify-package-and-test-failure on sec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121894&quot;&gt;Add task to fix migrations for 15.11 upgrades (16.0 Stable)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;122345&quot;&gt;Do not requeue the indexing worker if failures occur&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6918&quot;&gt;Stop supporting and using deprecated Gitaly configuration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;15117&quot;&gt;15.11.7&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;5868&quot;&gt;Backport &#x27;Remove uncessary fields from pack-objects cache key computation&#x27; to 15.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121608&quot;&gt;Do not run notify-package-and-test-failure on sec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121895&quot;&gt;Add task to fix migrations for 15.11 upgrades (15.11 Stable)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;15108&quot;&gt;15.10.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1397&quot;&gt;Update redis-namespace dependency in MailRoom&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1406&quot;&gt;Skip weak dependencies during install on UBI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1404&quot;&gt;Fix restore with azcopy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120163&quot;&gt;Backport &#x27;fix-container-replication&#x27; into 15.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121305&quot;&gt;Convert some regex to use Gitlab::UntrustedRegexp&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121609&quot;&gt;Do not run notify-package-and-test-failure on sec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6887&quot;&gt;Add SMTP timeout configuration options&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6877&quot;&gt;Validate that SMTP settings do not enable both TLS and STARTTLS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/24/gitlab-15-11-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/24/gitlab-15-11-6-released/</id>
<published>2023-05-24T00:00:00+00:00</published>
<updated>2023-05-24T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.11.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15116&quot;&gt;15.11.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121332&quot;&gt;Introduce parallelised BitBucket Server Importer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1405&quot;&gt;[15-11 backport] Skip weak dependencies during install on UBI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1403&quot;&gt;Backport 15.11 | Fix restore with azcopy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 16.0.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/23/critical-security-release-gitlab-16-0-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/23/critical-security-release-gitlab-16-0-1-released/</id>
<published>2023-05-23T00:00:00+00:00</published>
<updated>2023-05-23T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 16.0.1 for GitLab Community Edition (CE) and Enterprise Edition (EE). It is only required for installations running 16.0.0. Earlier versions are not affected.&lt;&#x2F;p&gt;

&lt;p&gt;This version contains important security fixes, and we strongly recommend that GitLab installations running 16.0.0 be upgraded immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-file-read-via-uploads-path-traversal&quot;&gt;Arbitrary file read via uploads path traversal&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;arbitrary-file-read-via-uploads-path-traversal&quot;&gt;Arbitrary file read via uploads path traversal&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;891 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read 
arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 10.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2825&quot;&gt;CVE-2023-2825&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pwnie&quot;&gt;pwnie&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 16.0 released with Value Streams Dashboards and improvements to AI-powered Code Suggestions</title>
<release>16.0</release>
<link href='https://about.gitlab.com/releases/2023/05/22/gitlab-16-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/22/gitlab-16-0-released/</id>
<published>2023-05-22T00:00:00+00:00</published>
<updated>2023-05-22T00:00:00+00:00</updated>
<author>
<name>Kai Armstrong</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 16.0 with &lt;a href=&quot;#value-streams-dashboard-is-now-generally-available&quot;&gt;Value Streams Dashboards now generally available&lt;&#x2F;a&gt;, &lt;a href=&quot;#remote-development-workspaces-available-in-beta-for-public-projects&quot;&gt;Remote development workspaces&lt;&#x2F;a&gt;,
&lt;a href=&quot;#upsizing-gitlab-saas-runners-on-linux&quot;&gt;more powerful GitLab SaaS runners&lt;&#x2F;a&gt;, &lt;a href=&quot;#comment-templates&quot;&gt;comment templates&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve also made improvements to our &lt;a href=&quot;#code-suggestions-improvements&quot;&gt;AI-powered Code Suggestions&lt;&#x2F;a&gt;. This is just one of many &lt;a href=&quot;&#x2F;solutions&#x2F;ai&#x2F;&quot;&gt;AI-assisted features&lt;&#x2F;a&gt; we are iterating on to help you build more secure software, faster. Check out our ongoing &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2023&#x2F;04&#x2F;24&#x2F;ai-ml-in-devsecops-series&#x2F;&quot;&gt;AI&#x2F;ML in DevSecOps Blog Series&lt;&#x2F;a&gt; to stay up-to-date between GitLab release announcements.&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 55+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 304 contributions they provided to GitLab 16.0! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.1 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;16_0&#x2F;16_0-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/19/gitlab-15-11-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/19/gitlab-15-11-5-released/</id>
<published>2023-05-19T00:00:00+00:00</published>
<updated>2023-05-19T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;-&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.11.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15115&quot;&gt;15.11.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120809&quot;&gt;[15.11] Fix no_proxy not working when DNS rebinding protection enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120290&quot;&gt;Remove epic date fields authorization&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120966&quot;&gt;Update by_parent filter in EpicsFinder&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120965&quot;&gt;Fix Roadmap frontend glitches and timeline bar placement&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;121104&quot;&gt;Makes roadmap current day indicator &amp;amp; timeline locale aware&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.11.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/17/gitlab-15-11-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/17/gitlab-15-11-4-released/</id>
<published>2023-05-17T00:00:00+00:00</published>
<updated>2023-05-17T00:00:00+00:00</updated>
<author>
<name>Steve Abrams</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.11.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15114&quot;&gt;15.11.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1396&quot;&gt;[15.11] Update redis-namespace dependency in MailRoom&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120306&quot;&gt;Do not autofocus the description field&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120131&quot;&gt;Adapt MR widget to support fail-closed approval rules&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120159&quot;&gt;Fix group blobs search permission when migration is not complete&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120683&quot;&gt;Use correct migration finalisation method&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6888&quot;&gt;[15.11] Add SMTP timeout configuration options&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6876&quot;&gt;[15.11] Validate that SMTP settings do not enable both TLS and STARTTLS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Publishing of the AWS Marketplace listing for GitLab Enterprise Edition Premium version 15.11.4 was delayed, but is now available.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Coordinated Security Release: 15.11.3, 15.10.7, 15.9.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/10/security-release-gitlab-15-11-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/10/security-release-gitlab-15-11-3-released/</id>
<published>2023-05-10T00:00:00+00:00</published>
<updated>2023-05-10T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.11.3, 15.10.7, 15.9.8 for GitLab Community Edition (CE) and Enterprise Edition (EE). This is a coordinated security release, aligning with a disclosure date provided by Git.&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are three types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), ad-hoc security releases for critical vulnerabilities, as well as coordinated security releases. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#smuggling-code-changes-via-merge-requests-with-refs-replace&quot;&gt;Smuggling code changes via merge requests with refs&#x2F;replace&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;smuggling-code-changes-via-merge-requests-with-refsreplace&quot;&gt;Smuggling code changes via merge requests with refs&#x2F;replace&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitaly&#x2F;-&#x2F;issues&#x2F;11 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 15.9.8, 15.10.0 before 15.10.7, and 15.11.0 before 15.11.3. A malicious developer could use a git feature called refs&#x2F;replace to smuggle content into a merge request which would not be visible during review in the UI. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.3 Medium). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2181&quot;&gt;CVE-2023-2181&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;inspector-ambitious&quot;&gt;inspector-ambitious&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non-security patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;p&gt;Into 15.11.3:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119164&quot;&gt;Restrict bigint cleanup migrations to GitLab.com only&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119520&quot;&gt;Revert migration squash that breaks 15.11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119742&quot;&gt;[15.11] ci: Fix omnibus trigger target branch for MR targeting stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119456&quot;&gt;Fix custom template import permission&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119374&quot;&gt;[15.11] Fix for the rebase merge request state being shown incorrectly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119299&quot;&gt;Back with UNSTRUCTURED_RAILS_LOG environment variable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;120028&quot;&gt;Fix issue description keeping autosave after save&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Into 15.10.7:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119744&quot;&gt;[15.10] ci: Fix omnibus trigger target branch for MR targeting stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119452&quot;&gt;Fix custom template import permission&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119376&quot;&gt;[15.10] Fix for the rebase merge request state being shown incorrectly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Into 15.9.8:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119746&quot;&gt;[15.9] ci: Fix omnibus trigger target branch for MR targeting stable branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;119377&quot;&gt;[15.9] Fix for the rebase merge request state being shown incorrectly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.11.2, 15.10.6, and 15.9.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/05/critical-security-release-gitlab-15-11-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/05/critical-security-release-gitlab-15-11-2-released/</id>
<published>2023-05-05T00:00:00+00:00</published>
<updated>2023-05-05T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.11.2, 15.10.6, and 15.9.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#malicious-runner-attachment-via-graphql&quot;&gt;Malicious Runner Attachment via GraphQL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;malicious-runner-attachment-via-graphql&quot;&gt;Malicious Runner Attachment via GraphQL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;884 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, any GitLab user account on the instance may use a GraphQL endpoint to attach a malicious runner to any project on the instance. This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 9.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2478&quot;&gt;CVE-2023-2478&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;15106&quot;&gt;15.10.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;118703&quot;&gt;Backport IP enforcement FF to 15.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6824&quot;&gt;Bundle libarchive in the package&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.11.1, 15.10.5, and 15.9.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/05/02/security-release-gitlab-15-11-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/05/02/security-release-gitlab-15-11-1-released/</id>
<published>2023-05-02T00:00:00+00:00</published>
<updated>2023-05-02T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.11.1, 15.10.5, and 15.9.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#privilege-escalation-for-external-users-when-oidc-is-enabled-under-certain-conditions&quot;&gt;Privilege escalation for external users when OIDC is enabled under certain conditions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#account-takeover-through-open-redirect-for-group-saml-accounts&quot;&gt;Account takeover through open redirect for Group SAML accounts&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#users-on-banned-ip-addresses-can-still-commit-to-projects&quot;&gt;Users on banned IP addresses can still commit to projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-with-developer-role-group-can-modify-protected-branches-setting-on-imported-project-and-leak-group-cicd-variables&quot;&gt;User with developer role (group) can modify Protected branches setting on imported project and leak group CI&#x2F;CD variables&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#the-gitlab-web-interface-does-not-guarantee-file-integrity-when-downloading-source-code-or-installation-packages-from-a-tag-or-from-a-release&quot;&gt;The GitLab web interface does not guarantee file integrity when downloading source code or installation packages from a tag or from a release.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#banned-group-member-continues-to-have-access-to-the-public-projects-of-a-public-group-with-the-access-level-as-same-as-before-the-ban&quot;&gt;Banned group member continues to have access to the public projects of a public group with the access level as same as before the ban.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#the-main-branch-of-a-repository-with-a-specially-designed-name-allows-an-attacker-to-create-repositories-with-malicious-code&quot;&gt;The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-and-content-injection-and-iframe-injection-when-viewing-raw-files-under-specific-circumstances&quot;&gt;XSS and content injection and iframe injection when viewing raw files under specific circumstances&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#authenticated-users-can-find-other-users-by-their-private-email&quot;&gt;Authenticated users can find other users by their private email&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;privilege-escalation-for-external-users-when-oidc-is-enabled-under-certain-conditions&quot;&gt;Privilege escalation for external users when OIDC is enabled under certain conditions&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;871 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions when OpenID Connect is enabled on an instance, it may allow users who are marked as &#x27;external&#x27; to become &#x27;regular&#x27; users thus leading to privilege escalation for those users. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2182&quot;&gt;CVE-2023-2182&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported to us by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;account-takeover-through-open-redirect-for-group-saml-accounts&quot;&gt;Account takeover through open redirect for Group SAML accounts&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;876 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn&#x27;t enabled by default. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1965&quot;&gt;CVE-2023-1965&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you are seeing an unexpected redirect after sign in through SAML, ensure the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#additional-configuration-for-saml-apps-on-your-idp&quot;&gt;&lt;code&gt;RelayState&lt;&#x2F;code&gt; setting&lt;&#x2F;a&gt; on the identity provider side is set to a valid URL.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bull&quot;&gt;bull&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-on-banned-ip-addresses-can-still-commit-to-projects&quot;&gt;Users on banned IP addresses can still commit to projects&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to commit to projects even from a restricted IP address. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1621&quot;&gt;CVE-2023-1621&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-with-developer-role-group-can-modify-protected-branches-setting-on-imported-project-and-leak-group-cicd-variables&quot;&gt;User with developer role (group) can modify Protected branches setting on imported project and leak group CI&#x2F;CD variables&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. A user with the role of developer could use the import project feature to leak CI&#x2F;CD variables. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-2069&quot;&gt;CVE-2023-2069&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;js_noob&quot;&gt;js_noob&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;p&gt;Fix for this issue was to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;387891&quot;&gt;restrict imports to users with Maintainer and above role&lt;&#x2F;a&gt;. That however affected usage of &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;index.html#create-a-project-from-a-custom-template&quot;&gt;custom project templates, on group and instance levels&lt;&#x2F;a&gt; as well, and Developers are no longer able to create projects from custom templates. We are working on the fix, that will allow users with Developer role to create projects from templates again, and will release a patch with this fix to GitLab versions 15.11.1, 15.10.5.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;the-gitlab-web-interface-does-not-guarantee-file-integrity-when-downloading-source-code-or-installation-packages-from-a-tag-or-from-a-release&quot;&gt;The GitLab web interface does not guarantee file integrity when downloading source code or installation packages from a tag or from a release.&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;877 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 8.6 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. File integrity may be compromised when source code or installation packages are pulled from a tag or from a release containing a ref to another commit. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1178&quot;&gt;CVE-2023-1178&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;banned-group-member-continues-to-have-access-to-the-public-projects-of-a-public-group-with-the-access-level-as-same-as-before-the-ban&quot;&gt;Banned group member continues to have access to the public projects of a public group with the access level as same as before the ban.&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;868 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to have access to the public projects of a public group even after being banned from the public group by the owner. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0805&quot;&gt;CVE-2023-0805&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;albatraoz&quot;&gt;albatraoz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;the-main-branch-of-a-repository-with-a-specially-designed-name-allows-an-attacker-to-create-repositories-with-malicious-code&quot;&gt;The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code.&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;873 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. The main branch of a repository with a specially crafted name allows an attacker to create repositories with malicious code, victims who clone or download these repositories will execute arbitrary code on their systems. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0756&quot;&gt;CVE-2023-0756&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-and-content-injection-and-iframe-injection-when-viewing-raw-files-under-specific-circumstances&quot;&gt;XSS and content injection and iframe injection when viewing raw files under specific circumstances&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;869 --&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in &quot;raw&quot; mode, it can be made to render as HTML if viewed under specific circumstances. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1836&quot;&gt;CVE-2023-1836&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;authenticated-users-can-find-other-users-by-their-private-email&quot;&gt;Authenticated users can find other users by their private email&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;878 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions, an attacker may be able to map a private email of a GitLab user to their GitLab account on an instance. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4376&quot;&gt;CVE-2022-4376&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been updated to versions 7.9.1 and 7.9.2 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;patch-openssl&quot;&gt;Patch OpenSSL&lt;&#x2F;h2&gt;

&lt;p&gt;A patch has been applied to mitigate CVE-2023-0464 in GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;patch-grafana&quot;&gt;Patch Grafana&lt;&#x2F;h2&gt;

&lt;p&gt;A patch has been applied to mitigate CVE-2023-1410 in GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;15111&quot;&gt;15.11.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;118637&quot;&gt;15.11: Fix Web IDE Beta icons not loading in Safari&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;118956&quot;&gt;Move approved filter behind &lt;code&gt;mr_approved_filter&lt;&#x2F;code&gt; feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;118849&quot;&gt;Fix search cron worker when indexing is disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;15105&quot;&gt;15.10.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;118219&quot;&gt;Use proxied_site for geo proxied clone urls&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.11 released with Code Suggestions</title>
<release>15.11</release>
<link href='https://about.gitlab.com/releases/2023/04/22/gitlab-15-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/04/22/gitlab-15-11-released/</id>
<published>2023-04-22T00:00:00+00:00</published>
<updated>2023-04-22T00:00:00+00:00</updated>
<author>
<name>Melissa Ushakov</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.11 with &lt;a href=&quot;#code-suggestions-for-ultimate--premium-users&quot;&gt;Code Suggestions&lt;&#x2F;a&gt;, &lt;a href=&quot;#manage-project-compliance-frameworks-report-at-group-level&quot;&gt;project compliance frameworks report management at the group level&lt;&#x2F;a&gt;, &lt;a href=&quot;#rerun-downstream-pipeline-trigger-jobs&quot;&gt;re-running downstream pipeline trigger jobs&lt;&#x2F;a&gt;, &lt;a href=&quot;#vulnerability-dismissal-reasons&quot;&gt;vulnerability dismissal reasons&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 110+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 180 contributions they provided to GitLab 15.11! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 16.0 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_11&#x2F;15_11-cover-image-sm.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.10.4, 15.9.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/04/21/gitlab-15-10-4-15-9-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/04/21/gitlab-15-10-4-15-9-5-released/</id>
<published>2023-04-21T00:00:00+00:00</published>
<updated>2023-04-21T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.10.4, 15.9.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15104&quot;&gt;15.10.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117559&quot;&gt;[15.10] Patch mail gem to handle TLS settings properly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117676&quot;&gt;Use primary ssh_url_to_repo for geo proxied ssh clone url&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1595&quot;&gt;15.9.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117281&quot;&gt;[15.9] Fix automatically-retried jobs stuck in pending state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6795&quot;&gt;[15.9 Backport] Fix suggested_reviewers runs when rails is disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.7.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/04/20/gitlab-15-7-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/04/20/gitlab-15-7-9-released/</id>
<published>2023-04-20T00:00:00+00:00</published>
<updated>2023-04-20T00:00:00+00:00</updated>
<author>
<name>Vladimir Glafirov</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.7.9 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;12&#x2F;22&#x2F;gitlab-15-7-released&#x2F;&quot;&gt;this month&#x27;s 15.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117284&quot;&gt;Fix automatically-retried jobs stuck in pending state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.8.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/04/19/gitlab-15-8-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/04/19/gitlab-15-8-6-released/</id>
<published>2023-04-19T00:00:00+00:00</published>
<updated>2023-04-19T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.8.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2023&#x2F;01&#x2F;22&#x2F;gitlab-15-8-released&#x2F;&quot;&gt;this month&#x27;s 15.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117283&quot;&gt;[15.8] Fix automatically-retried jobs stuck in pending state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.10.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/04/14/gitlab-15-10-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/04/14/gitlab-15-10-3-released/</id>
<published>2023-04-14T00:00:00+00:00</published>
<updated>2023-04-14T00:00:00+00:00</updated>
<author>
<name>Vladimir Glafirov</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.10.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15103&quot;&gt;15.10.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;116851&quot;&gt;Change the order of vulnerability creation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;116824&quot;&gt;Resolve ambiguous references for archive metadata (backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;116952&quot;&gt;Verify deploy keys settings for protected tags (backport)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117276&quot;&gt;Backport Broadcast messages fix for firefox dates and relative root url&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;117280&quot;&gt;[15.10] Fix automatically-retried jobs stuck in pending state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6794&quot;&gt;[15.10 Backport] Fix suggested_reviewers runs when rails is disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.10.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/04/05/gitlab-15-10-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/04/05/gitlab-15-10-2-released/</id>
<published>2023-04-05T00:00:00+00:00</published>
<updated>2023-04-05T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 15.10.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;15102&quot;&gt;15.10.2&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;116173&quot;&gt;Update mail gem to v2.8.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;115820&quot;&gt;Add sync_name check to Gitlab::Auth::Ldap::Access&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;116455&quot;&gt;Backport Admin role fix to 15.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;115480&quot;&gt;Fix openapi viewer for relative url instances&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;116604&quot;&gt;Migrate RedisHLL keys to default slot&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.10.1, 15.9.4, and 15.8.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/03/30/security-release-gitlab-15-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/03/30/security-release-gitlab-15-10-1-released/</id>
<published>2023-03-30T00:00:00+00:00</published>
<updated>2023-03-30T00:00:00+00:00</updated>
<author>
<name>Greg Alfaro</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.10.1, 15.9.4, and 15.8.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#cross-site-scripting-in-maximum-page-reached-page&quot;&gt;Cross-site scripting in &quot;Maximum page reached&quot; page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#private-project-guests-can-read-new-changes-using-a-fork&quot;&gt;Private project guests can read new changes using a fork&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#mirror-repository-error-reveals-password-in-settings-ui&quot;&gt;Mirror repository error reveals password in Settings UI&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-and-high-resource-consumption-of-prometheus-server-through-abuse-of-prometheus-integration-proxy-endpoint&quot;&gt;DOS and high resource consumption of Prometheus server through abuse of Prometheus integration proxy endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthenticated-users-can-view-environment-names-from-public-projects-limited-to-project-members-only&quot;&gt;Unauthenticated users can view Environment names from public projects limited to project members only&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#copying-information-to-the-clipboard-could-lead-to-the-execution-of-unexpected-commands&quot;&gt;Copying information to the clipboard could lead to the execution of unexpected commands&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-masked-webhook-secrets-by-adding-a-new-parameter-to-the-webhook-url&quot;&gt;Maintainer can leak masked webhook secrets by adding a new parameter to the webhook URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-html-injection-possible-when-soft_email_confirmation-feature-flag-is-enabled-in-the-latest-release&quot;&gt;Arbitrary HTML injection possible when :soft_email_confirmation feature flag is enabled in the latest release&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#framing-of-arbitrary-content-leading-to-open-redirects-on-any-page-allowing-user-controlled-markdown&quot;&gt;Framing of arbitrary content (leading to open redirects) on any page allowing user controlled markdown&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#mr-for-security-reports-are-available-to-everyone&quot;&gt;MR for security reports are available to everyone&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#api-timeout-when-searching-for-group-issues&quot;&gt;API timeout when searching for group issues&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorised-user-can-add-child-epics-linked-to-victims-epic-in-an-unrelated-group&quot;&gt;Unauthorised user can add child epics linked to victim&#x27;s epic in an unrelated group&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-search-allows-to-leak-internal-notes&quot;&gt;GitLab search allows to leak internal notes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ambiguous-branch-name-exploitation-in-gitlab&quot;&gt;Ambiguous branch name exploitation in GitLab&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-permissions-checks-for-moving-an-issue&quot;&gt;Improper permissions checks for moving an issue&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#private-project-branches-names-can-be-leaked-through-a-fork&quot;&gt;Private project branches names can be leaked through a fork&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;cross-site-scripting-in-maximum-page-reached-page&quot;&gt;Cross-site scripting in &quot;Maximum page reached&quot; page&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;849 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10  before 15.10.1. A specially crafted payload could lead to a reflected XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims on self-hosted instances running without strict CSP. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.1)). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3513&quot;&gt;CVE-2022-3513&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryotak&quot;&gt;ryotak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-guests-can-read-new-changes-using-a-fork&quot;&gt;Private project guests can read new changes using a fork&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;838 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10  before 15.10.1. It was possible that a project member demoted to a user role could read project updates by doing a diff with a pre-existing fork. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0485&quot;&gt;CVE-2023-0485&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mirror-repository-error-reveals-password-in-settings-ui&quot;&gt;Mirror repository error reveals password in Settings UI&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;834 --&gt;

&lt;p&gt;An information disclosure vulnerability has been discovered in GitLab EE&#x2F;CE affecting all versions starting from 11.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all  versions starting from 15.10  before 15.10.1 will allow an admin to leak password from repository mirror configuration. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1098&quot;&gt;CVE-2023-1098&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;tennox_&quot;&gt;tennox_&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dos-and-high-resource-consumption-of-prometheus-server-through-abuse-of-prometheus-integration-proxy-endpoint&quot;&gt;DOS and high resource consumption of Prometheus server through abuse of Prometheus integration proxy endpoint&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;861 --&gt;

&lt;p&gt;A denial of service condition exists in the Prometheus server bundled with GitLab affecting all versions from 11.10 to 15.8.5, 15.9 to 15.9.4 and 15.10 to 15.10.1. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1733&quot;&gt;CVE-2023-1733&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-users-can-view-environment-names-from-public-projects-limited-to-project-members-only&quot;&gt;Unauthenticated users can view Environment names from public projects limited to project members only&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;837 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.6 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10  before 15.10.1, allowing reading of environment names supposed to be restricted to project members only. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0319&quot;&gt;CVE-2023-0319&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;copying-information-to-the-clipboard-could-lead-to-the-execution-of-unexpected-commands&quot;&gt;Copying information to the clipboard could lead to the execution of unexpected commands&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;858 --&gt;

&lt;p&gt;An issue was identified in GitLab CE&#x2F;EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters are copied from clipboard, allowing unexpected commands to be executed on the victim machine. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1708&quot;&gt;CVE-2023-1708&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-masked-webhook-secrets-by-adding-a-new-parameter-to-the-webhook-url&quot;&gt;Maintainer can leak masked webhook secrets by adding a new parameter to the webhook URL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;856 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting versions starting from 15.1 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. A maintainer could modify a webhook URL to leak masked webhook secrets by adding a new parameter to the url. This addresses an incomplete fix for CVE-2022-4342. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0838&quot;&gt;CVE-2023-0838&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xn3va&quot;&gt;0xn3va&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-html-injection-possible-when-soft_email_confirmation-feature-flag-is-enabled-in-the-latest-release&quot;&gt;Arbitrary HTML injection possible when :soft_email_confirmation feature flag is enabled in the latest release&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;840 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.6 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. On certain instances, a stored XSS was possible via a malicious email address, which only affected the admins when they tried to impersonate the account with the malicious payload. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0523&quot;&gt;CVE-2023-0523&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;framing-of-arbitrary-content-leading-to-open-redirects-on-any-page-allowing-user-controlled-markdown&quot;&gt;Framing of arbitrary content (leading to open redirects) on any page allowing user controlled markdown&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from all versions starting from 15.7 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10  before 15.10.1. It was possible to iframe arbitrary origins in the browser via specially crafted markdown on any page. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:L&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0155&quot;&gt;CVE-2023-0155&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mr-for-security-reports-are-available-to-everyone&quot;&gt;MR for security reports are available to everyone&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;845 --&gt;

&lt;p&gt;Improper authorization in GitLab EE affecting all versions from 12.3.0 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1 allows an unauthorized access to security reports in merge requests. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1167&quot;&gt;CVE-2023-1167&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by GitLab team member &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;minac&quot;&gt;@minac&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-timeout-when-searching-for-group-issues&quot;&gt;API timeout when searching for group issues&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;851 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. A search timeout could be triggered if a specific HTML payload was used in the issue description. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1787&quot;&gt;CVE-2023-1787&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by a GitLab team member.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorised-user-can-add-child-epics-linked-to-victims-epic-in-an-unrelated-group&quot;&gt;Unauthorised user can add child epics linked to victim&#x27;s epic in an unrelated group&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;857 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10  before 15.10.1. It was possible for an unauthorised user to add child epics linked to a victim&#x27;s epic in an unrelated group. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1417&quot;&gt;CVE-2023-1417&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-search-allows-to-leak-internal-notes&quot;&gt;GitLab search allows to leak internal notes&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;852 --&gt;

&lt;p&gt;A sensitive information disclosure vulnerability in GitLab affecting all versions from 15.0 prior to 15.8.5, 15.9 prior to 15.9.4 and 15.10 prior to 15.10.1 allows an attacker to view the count of internal notes for a given issue. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1710&quot;&gt;CVE-2023-1710&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ambiguous-branch-name-exploitation-in-gitlab&quot;&gt;Ambiguous branch name exploitation in GitLab&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;846 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 8.1 to 15.8.5, and from 15.9 to 15.9.4, and from 15.10 to 15.10.1. It was possible to add a branch with an ambiguous name that could be used to social engineer users. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0450&quot;&gt;CVE-2023-0450&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;inspector-ambitious&quot;&gt;inspector-ambitious&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-permissions-checks-for-moving-an-issue&quot;&gt;Improper permissions checks for moving an issue&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;835 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions from 15.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. Due to improper permissions checks it was possible for an unauthorised user to remove an issue from an epic. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1071&quot;&gt;CVE-2023-1071&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-branches-names-can-be-leaked-through-a-fork&quot;&gt;Private project branches names can be leaked through a fork&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;826 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 11.10 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10  before 15.10.1. It was possible to disclose the branch names when an attacker has a fork of a project that was switched to private. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3375&quot;&gt;CVE-2022-3375&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;84 --&gt;

&lt;p&gt;Mattermost has been updated to versions 7.7.3 and 7.8.2 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-curl&quot;&gt;Update curl&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;82 --&gt;

&lt;p&gt;Curl has been updated to version 8.0.1 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-redis&quot;&gt;Update redis&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;83 --&gt;

&lt;p&gt;Redis has been updated to version 6.2.11 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl&quot;&gt;Update OpenSSL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;81 --&gt;

&lt;p&gt;OpenSSL has been updated to version &#x27;OpenSSL_1_1_1t&#x27; in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non Security Patches&lt;&#x2F;h2&gt;
&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;into-15101&quot;&gt;Into 15.10.1&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1347&quot;&gt;Cherry pick &quot;Use the ubi packaged libedit-devel&quot; to 15-10-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;115465&quot;&gt;Don&#x27;t autofocus comment field with content editor&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;115579&quot;&gt;Sync security policy rule schedules that may have been deleted by bug&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;115668&quot;&gt;Fix issue dashboard returning issues from archived projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;into-1594&quot;&gt;Into 15.9.4&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;114287&quot;&gt;Resolve &quot;Duplicate todo is created for already mentioned user&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.10 released with improved SAST finding resolution</title>
<release>15.10</release>
<link href='https://about.gitlab.com/releases/2023/03/22/gitlab-15-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/03/22/gitlab-15-10-released/</id>
<published>2023-03-22T00:00:00+00:00</published>
<updated>2023-03-22T00:00:00+00:00</updated>
<author>
<name>Christina Lohr</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.10 with the ability to &lt;a href=&quot;#automatically-resolve-sast-findings-when-rules-are-disabled&quot;&gt;automatically resolve SAST findings when rules are disabled&lt;&#x2F;a&gt;, &lt;a href=&quot;#see-all-branch-related-settings-together&quot;&gt;a new view to see all branch-related settings together&lt;&#x2F;a&gt;, &lt;a href=&quot;#create-and-switch-branches-in-the-web-ide-beta&quot;&gt;the ability to create and switch branches in the Web IDE Beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#compliance-frameworks-report&quot;&gt;compliance frameworks reports&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 115+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 170+ contributions they provided to GitLab 15.10! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.11 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_10&#x2F;15-10-cover-image-sm.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.9.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/03/09/gitlab-15-9-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/03/09/gitlab-15-9-3-released/</id>
<published>2023-03-09T00:00:00+00:00</published>
<updated>2023-03-09T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 15.9.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2023&#x2F;02&#x2F;22&#x2F;gitlab-15-9-released&#x2F;&quot;&gt;this month&#x27;s 15.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112259&quot;&gt;Removing markdown checklist task feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112649&quot;&gt;Add group merge checks settings document&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113032&quot;&gt;Fix object deletion not working with Azure Blob Storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113079&quot;&gt;Note that Kerberos headers are needed to build GitLab shell now&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113152&quot;&gt;Fix BackfillUserDetailsFields migration finalization&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113253&quot;&gt;Guard against dropped columns when finalizing user details migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113320&quot;&gt;Enable Geo::RepositoryRegistrySyncWorker on Geo secondary site&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113628&quot;&gt;Docs for marking a batched BG migration finished&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;113797&quot;&gt;Fix foreign_key_exists? migration helper&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.9.2, 15.8.4, and 15.7.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/03/02/security-release-gitlab-15-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/03/02/security-release-gitlab-15-9-2-released/</id>
<published>2023-03-02T00:00:00+00:00</published>
<updated>2023-03-02T00:00:00+00:00</updated>
<author>
<name>Greg Myers</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.9.2, 15.8.4, and 15.7.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;?sort=created_date&amp;amp;state=closed&amp;amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;amp;confidential=no&amp;amp;first_page_size=100&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-via-kroki-diagram&quot;&gt;Stored XSS via Kroki diagram&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#prometheus-integration-google-iap-details-are-not-hidden-may-leak-account-details-from-instancegroupproject-settings&quot;&gt;Prometheus integration Google IAP details are not hidden, may leak account details from instance&#x2F;group&#x2F;project settings&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-validation-of-sso-and-scim-tokens-while-managing-groups&quot;&gt;Improper validation of SSO and SCIM tokens while managing groups&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-datadog-api-key-by-changing-datadog-site&quot;&gt;Maintainer can leak Datadog API key by changing Datadog site&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#clipboard-based-xss-in-the-title-field-of-work-items&quot;&gt;Clipboard based XSS in the title field of work items&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-user-right-checks-for-personal-snippets&quot;&gt;Improper user right checks for personal snippets&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#release-description-visible-in-public-projects-despite-release-set-as-project-members-only&quot;&gt;Release Description visible in public projects despite release set as project members only&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-integration-settings-sensitive-information-exposed-to-project-maintainers&quot;&gt;Group integration settings sensitive information exposed to project maintainers&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improve-pagination-limits-for-commits&quot;&gt;Improve pagination limits for commits&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-open-redirect-vulnerability&quot;&gt;Gitlab Open Redirect Vulnerability&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-may-become-an-owner-of-a-project&quot;&gt;Maintainer may become an Owner of a project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stored-xss-via-kroki-diagram&quot;&gt;Stored XSS via Kroki diagram&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;833 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0050&quot;&gt;CVE-2023-0050&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prometheus-integration-google-iap-details-are-not-hidden-may-leak-account-details-from-instancegroupproject-settings&quot;&gt;Prometheus integration Google IAP details are not hidden, may leak account details from instance&#x2F;group&#x2F;project settings&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;844 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.3 before 15.7.8, versions of 15.8 before 15.8.4, and version 15.9 before 15.9.2. Google IAP details in Prometheus integration were not hidden, could be leaked from instance, group, or project settings to other users. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4289&quot;&gt;CVE-2022-4289&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-validation-of-sso-and-scim-tokens-while-managing-groups&quot;&gt;Improper validation of SSO and SCIM tokens while managing groups&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;819 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it&#x27;s possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4331&quot;&gt;CVE-2022-4331&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-datadog-api-key-by-changing-datadog-site&quot;&gt;Maintainer can leak Datadog API key by changing Datadog site&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;843 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible for a project maintainer to extract a Datadog integration API key by modifying the site. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0483&quot;&gt;CVE-2023-0483&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;akadrian&quot;&gt;akadrian&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;clipboard-based-xss-in-the-title-field-of-work-items&quot;&gt;Clipboard based XSS in the title field of work items&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;836 --&gt;

&lt;p&gt;A issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 15.3 prior to 15.7.8, version 15.8 prior to 15.8.4, and version 15.9 prior to 15.9.2  A cross-site scripting vulnerability was found in the title field of work items that allowed attackers to perform arbitrary actions on behalf of victims at client side. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4007&quot;&gt;CVE-2022-4007&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryotak&quot;&gt;ryotak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-user-right-checks-for-personal-snippets&quot;&gt;Improper user right checks for personal snippets&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;816 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.5 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. Due to improper permissions checks an unauthorised user was able to read, add or edit a users private snippet. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3758&quot;&gt;CVE-2022-3758&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;release-description-visible-in-public-projects-despite-release-set-as-project-members-only&quot;&gt;Release Description visible in public projects despite release set as project members only&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;832 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.5 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. Non-project members could retrieve release descriptions via the API, even if the release visibility is restricted to project members only in the project settings. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0223&quot;&gt;CVE-2023-0223&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-integration-settings-sensitive-information-exposed-to-project-maintainers&quot;&gt;Group integration settings sensitive information exposed to project maintainers&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;842 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. This vulnerability could allow a user to unmask the Discord Webhook URL through viewing the raw API response. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4462&quot;&gt;CVE-2022-4462&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improve-pagination-limits-for-commits&quot;&gt;Improve pagination limits for commits&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;839 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 9.0 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible to trigger a resource depletion attack due to improper filtering for number of requests to read commits details. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1072&quot;&gt;CVE-2023-1072&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;nico28&quot;&gt;Nico Jones&lt;&#x2F;a&gt; for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-open-redirect-vulnerability&quot;&gt;Gitlab Open Redirect Vulnerability&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;836 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 10.0 to 15.7.8, 15.8 prior to 15.8.4 and 15.9 prior to 15.9.2. A crafted URL could be used to redirect users to arbitrary sites. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3381&quot;&gt;CVE-2022-3381&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;burpheart&quot;&gt;burpheart&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-may-become-an-owner-of-a-project&quot;&gt;Maintainer may become an Owner of a project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;841 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-1084&quot;&gt;CVE-2023-1084&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shubham_sohi,&quot;&gt;@shubham_sohi&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-libksba&quot;&gt;Update &lt;code&gt;libksba&lt;&#x2F;code&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;code&gt;libksba&lt;&#x2F;code&gt; and &lt;code&gt;libksba_project&lt;&#x2F;code&gt; have been updated to version 1.6.3 to mitigate potential security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-gnupg&quot;&gt;Update &lt;code&gt;gnupg&lt;&#x2F;code&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;code&gt;gnupg&lt;&#x2F;code&gt; has been updated to 2.2.41 to mitigate potential security issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.9.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/02/24/gitlab-15-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/02/24/gitlab-15-9-1-released/</id>
<published>2023-02-24T00:00:00+00:00</published>
<updated>2023-02-24T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.9.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2023&#x2F;02&#x2F;22&#x2F;gitlab-15-9-released&#x2F;&quot;&gt;this month&#x27;s 15.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;110945&quot;&gt;Resolve &quot;Deprecate legacy praefect config structure in Omnibus&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112110&quot;&gt;Fix dependency check in license approval policies&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112389&quot;&gt;Fix LDAP config &lt;code&gt;sync_name&lt;&#x2F;code&gt; problem&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112488&quot;&gt;Document rate limit for Direct transfer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112555&quot;&gt;Missaligned ref-selector dropdown button on search page status bar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112595&quot;&gt;Fix Broadcast messages not showing in admin console&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;112781&quot;&gt;Bump omniauth_openid_connect to v0.6.1&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.9 released with new guest roles for viewing private repositories and license approval policies</title>
<release>15.9</release>
<link href='https://about.gitlab.com/releases/2023/02/22/gitlab-15-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/02/22/gitlab-15-9-released/</id>
<published>2023-02-22T00:00:00+00:00</published>
<updated>2023-02-22T00:00:00+00:00</updated>
<author>
<name>Christen Dybenko</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.9 with &lt;a href=&quot;#users-with-the-guest-role-can-view-private-repositories&quot;&gt;guest roles viewing private repositories&lt;&#x2F;a&gt;, &lt;a href=&quot;#manage-license-approval-policies&quot;&gt;license approval policies&lt;&#x2F;a&gt; and &lt;a href=&quot;#new-license-compliance-scanner&quot;&gt;license compliance scanner&lt;&#x2F;a&gt;, &lt;a href=&quot;#notifications-now-available-in-the-gitlab-for-slack-app&quot;&gt;notifications in the GitLab for Slack app&lt;&#x2F;a&gt;,  &lt;a href=&quot;#code-suggestions-available-in-closed-beta&quot;&gt;code suggestions in closed beta&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 105+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 410+ contributions they provided to GitLab 15.9! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.10 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_9&#x2F;15_9-cover-image-sm.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.8.2, 15.7.7 and 15.6.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/02/14/critical-security-release-gitlab-15-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/02/14/critical-security-release-gitlab-15-8-2-released/</id>
<published>2023-02-14T00:00:00+00:00</published>
<updated>2023-02-14T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.8.2, 15.7.7, and 15.6.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com and GitLab Dedicated are already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#security-issues-in-git&quot;&gt;Security issues in Git&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;security-issues-in-git&quot;&gt;Security issues in Git&lt;&#x2F;h2&gt;

&lt;p&gt;This release addresses the security issues &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2023-23946&quot;&gt;CVE-2023-23946&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2023-22490&quot;&gt;CVE-2023-22490&lt;&#x2F;a&gt; in &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;&quot;&gt;Git&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;These vulnerabilities affect all previous versions of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;The details of these vulnerabilities are as follows:&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2023-23946&quot;&gt;CVE-2023-23946&lt;&#x2F;h3&gt;

&lt;p&gt;A user can feed a specially crafted input to &lt;code&gt;git apply&lt;&#x2F;code&gt; to overwrite a path outside the working tree.&lt;&#x2F;p&gt;

&lt;p&gt;This can be used to execute arbitrary commands in GitLab installations within GitLab&#x27;s Gitaly environment.&lt;&#x2F;p&gt;

&lt;p&gt;Credit for finding CVE-2023-23946 goes to Joern Schneeweisz of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2023-22490&quot;&gt;CVE-2023-22490&lt;&#x2F;h3&gt;

&lt;p&gt;Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR&#x2F;objects directory contains symbolic links (c.f., CVE-2022-39253), the objects  directory itself may still be a symbolic link.&lt;&#x2F;p&gt;

&lt;p&gt;These two may be combined to include arbitrary files based on known paths on the victim&#x27;s filesystem within the malicious repository&#x27;s working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.&lt;&#x2F;p&gt;

&lt;p&gt;Credit for finding CVE-2023-22490 goes to yvvdwf.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-python&quot;&gt;Update Python&lt;&#x2F;h2&gt;

&lt;p&gt;Python has been updated to version 3.9.16 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all GitLab Omnibus versions from 14.1 to 15.6.7, all 15.7 versions before 15.7.7, and all 15.8 versions before 15.8.2.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non-security patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;p&gt;Into 15.8.2:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;110651&quot;&gt;Fix false positives for approved by insufficient users violation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;111527&quot;&gt;gitaly: Remove readiness check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Into 15.7.7:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;111585&quot;&gt;GitLab Version Check - Add feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;111527&quot;&gt;gitaly: Remove readiness check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.8.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/02/14/gitlab-15-8-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/02/14/gitlab-15-8-3-released/</id>
<published>2023-02-14T00:00:00+00:00</published>
<updated>2023-02-14T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.8.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2023&#x2F;01&#x2F;22&#x2F;gitlab-15-8-released&#x2F;&quot;&gt;this month&#x27;s 15.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;108838&quot;&gt;Deprecate backup upload using Openstack Swift and Rackspace APIs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;108849&quot;&gt;Note about Openstack and Rackspace API removal&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109161&quot;&gt;Updating nav and top level&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109297&quot;&gt;Update feature flag status of GitHub gists feature&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109386&quot;&gt;What&#x27;s New post for 15.8&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109636&quot;&gt;Add version note to email feature&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109882&quot;&gt;Revert changes on wiki replication&#x2F;verification legacy code&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109945&quot;&gt;Handle client disconnects better in workhorse&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;110886&quot;&gt;Attempt reading schema file instead of a file named &lt;code&gt;#{report_version}&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;110934&quot;&gt;Upgrade Alert - Add proper API support&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.8.1, 15.7.6, and 15.6.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/01/31/security-release-gitlab-15-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/01/31/security-release-gitlab-15-8-1-released/</id>
<published>2023-01-31T00:00:00+00:00</published>
<updated>2023-01-31T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.8.1, 15.7.6, and 15.6.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-arbitrarily-large-issue-descriptions&quot;&gt;Denial of Service via arbitrarily large Issue descriptions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#csrf-via-file-upload-allows-an-attacker-to-take-over-a-repository&quot;&gt;CSRF via file upload allows an attacker to take over a repository.&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#sidekiq-background-job-dos-by-uploading-malicious-ci-job-artifact-zips&quot;&gt;Sidekiq background job DoS by uploading malicious CI job artifact zips&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#sidekiq-background-job-dos-by-uploading-a-malicious-helm-package&quot;&gt;Sidekiq background job DoS by uploading a malicious Helm package&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;denial-of-service-via-arbitrarily-large-issue-descriptions&quot;&gt;Denial of Service via arbitrarily large Issue descriptions&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;817 --&gt;

&lt;p&gt;A lack of length validation in GitLab CE&#x2F;EE affecting all versions from 12.4 before 15.6.7, 15.7 before 15.7.6, and 15.8 before 15.8.1 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3411&quot;&gt;CVE-2022-3411&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;csrf-via-file-upload-allows-an-attacker-to-take-over-a-repository&quot;&gt;CSRF via file upload allows an attacker to take over a repository.&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;820 --&gt;

&lt;p&gt;A Cross Site Request Forgery issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.6.7, all versions starting from 15.7 before 15.7.6, and all versions starting from 15.8 before 15.8.1. An attacker could take over a project if an Owner or Maintainer uploads a file to a malicious project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4138&quot;&gt;CVE-2022-4138&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sidekiq-background-job-dos-by-uploading-malicious-ci-job-artifact-zips&quot;&gt;Sidekiq background job DoS by uploading malicious CI job artifact zips&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;810 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 14.3 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. An attacker may upload a crafted CI job artifact zip file in a project that uses dynamic child pipelines and make a sidekiq job allocate a lot of memory. In GitLab instances where Sidekiq is memory-limited, this may cause Denial of Service. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3759&quot;&gt;CVE-2022-3759&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;luryus&quot;&gt;luryus&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sidekiq-background-job-dos-by-uploading-a-malicious-helm-package&quot;&gt;Sidekiq background job DoS by uploading a malicious Helm package&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;818 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 14.0 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. It was possible to trigger a DoS attack by uploading a malicious Helm chart. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0518&quot;&gt;CVE-2023-0518&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;luryus&quot;&gt;luryus&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;79 --&gt;

&lt;p&gt;Mattermost has been updated to versions 7.5.2, 7.4.1, and 7.1.5 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 15.6 and 15.7 of GitLab Omnibus. GitLab 15.8 already included Mattermost 7.5.2.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-patches&quot;&gt;Non-security patches&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also includes the following non-security patches.&lt;&#x2F;p&gt;

&lt;p&gt;Into 15.6.7:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1233&quot;&gt;Ensure Workhorse is built with FIPS for CNG&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1252&quot;&gt;Grab gitlab-logger archives from the new project location&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6575&quot;&gt;Ensure Workhorse is built in FIPS mode for Omnibus&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;106592&quot;&gt;Doc: FIPS, update omnibus language&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;106986&quot;&gt;Only refresh indexes that exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109098&quot;&gt;Clear DuplicateJobs cookies from post-deployment migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1273&quot;&gt;Upgrade GitLab logger to v2.3.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Into 15.7.6:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109690&quot;&gt;Geo - Remove parameter validation for registry notification request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Into 15.8.1:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6644&quot;&gt;Fix command in print-release-contents job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109991&quot;&gt;Fix resource_parent in FOSS instances&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;109690&quot;&gt;Geo - Remove parameter validation for registry notification request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.8 released with external status checks and self-managed SCIM</title>
<release>15.8</release>
<link href='https://about.gitlab.com/releases/2023/01/22/gitlab-15-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/01/22/gitlab-15-8-released/</id>
<published>2023-01-22T00:00:00+00:00</published>
<updated>2023-01-22T00:00:00+00:00</updated>
<author>
<name>Hannah Sutor</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.8 with &lt;a href=&quot;#block-merges-unless-external-status-checks-pass&quot;&gt;block merges unless external status checks pass&lt;&#x2F;a&gt;, &lt;a href=&quot;#scim-support-for-self-managed-gitlab&quot;&gt;SCIM support for self-managed GitLab&lt;&#x2F;a&gt;, &lt;a href=&quot;#view-estimated-queuing-time-for-runners-in-the-admin-area&quot;&gt;view estimated queuing for runners in the admin area&lt;&#x2F;a&gt;, &lt;a href=&quot;#migrating-gitlab-projects-by-direct-transfer-beta&quot;&gt;migrate GitLab projects by direct transfer beta&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 35+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 85+ contributions they provided to GitLab 15.8! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.9 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_8&#x2F;15_8-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.7.5, 15.6.6, and 15.5.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/01/17/critical-security-release-gitlab-15-7-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/01/17/critical-security-release-gitlab-15-7-5-released/</id>
<published>2023-01-17T00:00:00+00:00</published>
<updated>2023-01-17T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.7.5, 15.6.6, and 15.5.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com and GitLab Dedicated are already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;UPDATE (2023-01-20): In addition, we have released GitLab Runner versions 15.8.0, 15.7.3, 15.6.3, and 15.5.2. These images contain updates to the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;configuration&#x2F;advanced-configuration.html#helper-image&quot;&gt;Docker helper images&lt;&#x2F;a&gt; to address the Git vulnerabilities.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#critical-security-issues-in-git&quot;&gt;Critical security issues in Git&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;critical-security-issues-in-git&quot;&gt;Critical security issues in Git&lt;&#x2F;h2&gt;

&lt;p&gt;This release addresses the security issues &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2022-41903&quot;&gt;CVE-2022-41903&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2022-23521&quot;&gt;CVE-2022-23521&lt;&#x2F;a&gt; in &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;&quot;&gt;Git&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;These vulnerabilities affect all previous versions of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;The details of these vulnerabilities are as follows:&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2022-41903&quot;&gt;CVE-2022-41903&lt;&#x2F;h3&gt;

&lt;p&gt;The &lt;code&gt;git-log&lt;&#x2F;code&gt; command has the ability to display commits using an arbitrary format with its &lt;code&gt;--format&lt;&#x2F;code&gt; specifiers. This functionality is also exposed to &lt;code&gt;git-archive&lt;&#x2F;code&gt; via the &lt;code&gt;export-subst&lt;&#x2F;code&gt; gitattribute.&lt;&#x2F;p&gt;

&lt;p&gt;When processing the padding operators (e.g., &lt;code&gt;%&amp;lt;(&lt;&#x2F;code&gt;, &lt;code&gt;%&amp;lt;|(&lt;&#x2F;code&gt;, &lt;code&gt;%&amp;gt;(&lt;&#x2F;code&gt;, &lt;code&gt;%&amp;gt;&amp;gt;(&lt;&#x2F;code&gt;, or &lt;code&gt;%&amp;gt;&amp;lt;( )&lt;&#x2F;code&gt;, an integer overflow can occur in &lt;code&gt;pretty.c::format_and_pad_commit()&lt;&#x2F;code&gt; where a &lt;code&gt;size_t&lt;&#x2F;code&gt; is improperly stored as an &lt;code&gt;int&lt;&#x2F;code&gt;, and then added as an offset to a subsequent &lt;code&gt;memcpy()&lt;&#x2F;code&gt; call.&lt;&#x2F;p&gt;

&lt;p&gt;This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., &lt;code&gt;git log --format=...&lt;&#x2F;code&gt;). It may also be triggered indirectly through &lt;code&gt;git-archive&lt;&#x2F;code&gt; via the &lt;code&gt;export-subst&lt;&#x2F;code&gt; mechanism, which expands format specifiers inside of files within the repository during a git archive.&lt;&#x2F;p&gt;

&lt;p&gt;This integer overflow can result in arbitrary heap writes, which may result in remote code execution.&lt;&#x2F;p&gt;

&lt;p&gt;Credit for finding CVE-2022-41903 goes to Joern Schneeweisz of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2022-23521&quot;&gt;CVE-2022-23521&lt;&#x2F;h3&gt;

&lt;p&gt;gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a &lt;code&gt;.gitattributes&lt;&#x2F;code&gt; file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern.&lt;&#x2F;p&gt;

&lt;p&gt;When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge.&lt;&#x2F;p&gt;

&lt;p&gt;These overflows can be triggered via a crafted &lt;code&gt;.gitattributes&lt;&#x2F;code&gt; file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both.&lt;&#x2F;p&gt;

&lt;p&gt;This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution.&lt;&#x2F;p&gt;

&lt;p&gt;Credit for finding CVE-2022-23521 goes to Markus Vervier and Eric Sesterhenn of X41 D-Sec.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Note: GitLab releases have skipped 15.7.4, 15.6.5, and 15.5.8. There are no patches with these version numbers.&lt;&#x2F;p&gt;

&lt;p&gt;To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.
These security releases update Git on the helper images, which are used
by the Docker and Kubernetes executors. If you are using a shell
executor, you will need to update Git on your operating system.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.7.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/01/11/gitlab-15-7-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/01/11/gitlab-15-7-3-released/</id>
<published>2023-01-11T00:00:00+00:00</published>
<updated>2023-01-11T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>
&lt;p&gt;Today we are releasing version 15.7.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;12&#x2F;22&#x2F;gitlab-15-7-released&#x2F;&quot;&gt;this month&#x27;s 15.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107440&quot;&gt;Update GitHub for cancelling GitHub project import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107842&quot;&gt;Geo: Container Repository push events don&#x27;t work&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;108112&quot;&gt;Enforce memory-watchdog by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;108153&quot;&gt;Reset Container Repository Sync status on secondary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;108393&quot;&gt;Ensure Elasticsearch index is clean before wildcard test&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.7.2, 15.6.4, and 15.5.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/01/09/security-release-gitlab-15-7-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/01/09/security-release-gitlab-15-7-2-released/</id>
<published>2023-01-09T00:00:00+00:00</published>
<updated>2023-01-09T00:00:00+00:00</updated>
<author>
<name>Kevin Morrison</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.7.2, 15.6.4, and 15.5.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#race-condition-on-gitlabcom-enables-verified-email-forgery--third-party-account-hijacking&quot;&gt;Race condition on gitlab.com enables verified email forgery &amp;amp; third-party account hijacking&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dos-and-high-resource-consumption-of-prometheus-server-through-abuse-of-grafana-integration-proxy-endpoint&quot;&gt;DOS and high resource consumption of Prometheus server through abuse of Grafana integration proxy endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-sentry-token-by-changing-the-configured-url&quot;&gt;Maintainer can leak sentry token by changing the configured URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-masked-webhook-secrets-by-changing-target-url-of-the-webhook&quot;&gt;Maintainer can leak masked webhook secrets by changing target URL of the webhook&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#cross-site-scripting-in-wiki-changes-page-affecting-self-hosted-instances-running-without-strict-csp&quot;&gt;Cross-site scripting in wiki changes page affecting self-hosted instances running without strict CSP&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-access-tokens-continue-to-work-after-owner-loses-ability-to-revoke-them&quot;&gt;Group access tokens continue to work after owner loses ability to revoke them&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#users-avatar-disclosure-by-user-id-in-private-gitlab-instances&quot;&gt;Users&#x27; avatar disclosure by user ID in private GitLab instances&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-protocol-redirection-in-gitlab-pages&quot;&gt;Arbitrary Protocol Redirection in GitLab Pages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-due-to-device-detector-parsing-user-agents&quot;&gt;ReDoS due to device-detector parsing user agents&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regex-dos-in-the-submodule-url-parser&quot;&gt;Regex DOS in the Submodule Url Parser&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;race-condition-on-gitlabcom-enables-verified-email-forgery--third-party-account-hijacking&quot;&gt;Race condition on gitlab.com enables verified email forgery &amp;amp; third-party account hijacking&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;804 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A race condition can lead to verified email forgery and takeover of third-party accounts when using GitLab as an OAuth provider. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4037&quot;&gt;CVE-2022-4037&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to an anonymous researcher for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dos-and-high-resource-consumption-of-prometheus-server-through-abuse-of-grafana-integration-proxy-endpoint&quot;&gt;DOS and high resource consumption of Prometheus server through abuse of Grafana integration proxy endpoint&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;805 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A crafted Prometheus Server query can cause high resource consumption and may lead to Denial of Service. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3613&quot;&gt;CVE-2022-3613&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-sentry-token-by-changing-the-configured-url&quot;&gt;Maintainer can leak sentry token by changing the configured URL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;813 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4365&quot;&gt;CVE-2022-4365&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-masked-webhook-secrets-by-changing-target-url-of-the-webhook&quot;&gt;Maintainer can leak masked webhook secrets by changing target URL of the webhook&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;814 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.1 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. A malicious Maintainer can leak masked webhook secrets by changing target URL of the webhook. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4342&quot;&gt;CVE-2022-4342&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-wiki-changes-page-affecting-self-hosted-instances-running-without-strict-csp&quot;&gt;Cross-site scripting in wiki changes page affecting self-hosted instances running without strict CSP&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;803 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.4 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. Due to the improper filtering of query parameters in the wiki changes page, an attacker can execute arbitrary JavaScript on the self-hosted instances running without strict CSP. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3573&quot;&gt;CVE-2022-3573&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryotak&quot;&gt;ryotak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-access-tokens-continue-to-work-after-owner-loses-ability-to-revoke-them&quot;&gt;Group access tokens continue to work after owner loses ability to revoke them&lt;&#x2F;h2&gt;

&lt;p&gt;Incorrect Authorization check affecting all versions of GitLab EE from 13.11 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2 allows group access tokens to continue working even after the group owner loses the ability to revoke them. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4167&quot;&gt;CVE-2022-4167&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported to us by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-avatar-disclosure-by-user-id-in-private-gitlab-instances&quot;&gt;Users&#x27; avatar disclosure by user ID in private GitLab instances&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;801 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.0 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. GitLab allows unauthenticated users to download user avatars using the victim&#x27;s user ID, on private instances that restrict public level visibility. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3870&quot;&gt;CVE-2022-3870&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;nocasis&quot;&gt;nocasis&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-protocol-redirection-in-gitlab-pages&quot;&gt;Arbitrary Protocol Redirection in GitLab Pages&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;811 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.4 prior to 15.5.7, 15.6 prior to 15.6.4, and 15.7 prior to 15.7.2. GitLab Pages allows redirection to arbitrary protocols. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2023-0042&quot;&gt;CVE-2023-0042&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by a GitLab team member, Joern Schneeweisz.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regex-dos-due-to-device-detector-parsing-user-agents&quot;&gt;Regex DoS due to device-detector parsing user agents&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;815 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.8 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in how the application parses user agents. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4131&quot;&gt;CVE-2022-4131&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;afewgoats&quot;&gt;afewgoats&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regex-dos-in-the-submodule-url-parser&quot;&gt;Regex DoS in the Submodule Url Parser&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 6.6 before 15.5.7, all versions starting from 15.6 before 15.6.4, all versions starting from 15.7 before 15.7.2. An attacker may cause Denial of Service on a GitLab instance by exploiting a regex issue in the submodule URL parser. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3514&quot;&gt;CVE-2022-3514&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mokusou&quot;&gt;mokusou&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been updated to version 7.3.1 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus 15.4 and 15.5.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-python&quot;&gt;Update Python&lt;&#x2F;h2&gt;

&lt;p&gt;Python has been updated to version 3.8.16 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus 15.5, 15.6 and 15.7.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-logrotate&quot;&gt;Update Logrotate&lt;&#x2F;h2&gt;

&lt;p&gt;Logrotate has been updated to version 3.20.1 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus 15.5, 15.6 and 15.7.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-redis&quot;&gt;Update Redis&lt;&#x2F;h2&gt;

&lt;p&gt;Redis has been updated to version 6.2.8 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.7.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2023/01/05/gitlab-15-7-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2023/01/05/gitlab-15-7-1-released/</id>
<published>2023-01-05T00:00:00+00:00</published>
<updated>2023-01-05T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.7.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;12&#x2F;22&#x2F;gitlab-15-7-released&#x2F;&quot;&gt;this month&#x27;s 15.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107505&quot;&gt;Fix flaky CI builds count metric test&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107641&quot;&gt;Update dependency proxy details in Geo data types table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107689&quot;&gt;Remove vulnerability state migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107706&quot;&gt;Workaround a segfault due to array GC bug&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;107773&quot;&gt;Relax FIPS constraints on PyPi packages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6589&quot;&gt;Update curl to 7.87.0&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.7 released introducing the GitLab CLI and with browser-based DAST GA</title>
<release>15.7</release>
<link href='https://about.gitlab.com/releases/2022/12/22/gitlab-15-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/12/22/gitlab-15-7-released/</id>
<published>2022-12-22T00:00:00+00:00</published>
<updated>2022-12-22T00:00:00+00:00</updated>
<author>
<name>Dilan Orrino</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;We are excited to announce the release of GitLab 15.7, which introduces the new &lt;a href=&quot;#introducing-the-gitlab-cli&quot;&gt;GitLab CLI&lt;&#x2F;a&gt;, &lt;a href=&quot;#browser-based-dast-general-availability&quot;&gt;general availability of browser-based DAST&lt;&#x2F;a&gt;, &lt;a href=&quot;#support-gitops-deployments-from-outside-the-default-branch&quot;&gt;support for GitOps deployments from outside the default branch&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 70+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 190+ contributions they provided to GitLab 15.7! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.8 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_7&#x2F;15_7-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.6.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/12/16/gitlab-15-6-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/12/16/gitlab-15-6-3-released/</id>
<published>2022-12-16T00:00:00+00:00</published>
<updated>2022-12-16T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.6.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;11&#x2F;22&#x2F;gitlab-15-6-released&#x2F;&quot;&gt;this month&#x27;s 15.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;2895&quot;&gt;Add &lt;code&gt;global.image.tagSuffix&lt;&#x2F;code&gt; as a helm values option&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;5189&quot;&gt;Makefile: Upgrade Git to v2.35.4.gl1 and v2.37.4.gl1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.5.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/12/08/gitlab-15-5-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/12/08/gitlab-15-5-6-released/</id>
<published>2022-12-08T00:00:00+00:00</published>
<updated>2022-12-08T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.5.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;&quot;&gt;last month&#x27;s 15.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6512&quot;&gt;Gitaly: Fix migration of gitconfig with subsections&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6480&quot;&gt;Conditionally enable FIPS auto-detection&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6492&quot;&gt;Remove resource_group usage for package releases&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1185&quot;&gt;Bump Container Registry to v3.60.1-gitlab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1178&quot;&gt;Fix flaky PostgreSQL builds&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105854&quot;&gt;Revert refactor #98971&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;103643&quot;&gt;Revert Sidekiq default routing rules&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.6.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/12/02/gitlab-15-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/12/02/gitlab-15-6-2-released/</id>
<published>2022-12-02T00:00:00+00:00</published>
<updated>2022-12-02T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.6.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;11&#x2F;22&#x2F;gitlab-15-6-released&#x2F;&quot;&gt;this month&#x27;s 15.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104189&quot;&gt;Add docs for work item description&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104259&quot;&gt;Fix deleting protected branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104261&quot;&gt;Fix release number for internal notes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104351&quot;&gt;Doc: Remove stray comma in &#x2F;link example&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104503&quot;&gt;Potential fix for flaky spec in resolve discussions spec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104566&quot;&gt;Update GitLab Migration doc about projects migration on .com&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;104747&quot;&gt;Fix memory limit for RssMemoryLimit monitor&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105072&quot;&gt;feat: This updates labkit to version 0.29.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105220&quot;&gt;Hide marketing-related entries&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105288&quot;&gt;Finalize group member namespace id migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105360&quot;&gt;Revert refactor #98971&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105375&quot;&gt;Conditionally disable fastupdate on GIN indexes (issues, merge_requests)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105600&quot;&gt;Consolidate database cleaner code for migrations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;105889&quot;&gt;Potential fix for flaky user_edit_profile_spec.rb&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6512&quot;&gt;gitaly: Fix migration of gitconfig with subsections&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.6.1, 15.5.5 and 15.4.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/11/30/security-release-gitlab-15-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/11/30/security-release-gitlab-15-6-1-released/</id>
<published>2022-11-30T00:00:00+00:00</published>
<updated>2022-11-30T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.6.1, 15.5.5 and 15.4.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dast-api-scanner-exposes-authorization-headers-in-vulnerabilities&quot;&gt;DAST API scanner exposes Authorization headers in vulnerabilities&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-ip-allow-list-not-fully-respected-by-the-package-registry&quot;&gt;Group IP allow-list not fully respected by the Package Registry&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#deploy-keys-and-tokens-may-bypass-external-authorization-service-if-it-is-enabled&quot;&gt;Deploy keys and tokens may bypass External Authorization service if it is enabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-content-injection-in-readme-file&quot;&gt;HTML content injection in README file&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#repository-import-still-allows-to-import-40-hexadecimal-branches&quot;&gt;Repository import still allows to import 40 hexadecimal branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#webhook-secret-tokens-leaked-in-webhook-logs&quot;&gt;Webhook secret tokens leaked in webhook logs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-webhook-secret-token-by-changing-the-webhook-url&quot;&gt;Maintainer can leak webhook secret token by changing the webhook URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#cross-site-scripting-in-jira-integration-affecting-self-hosted-instances-without-strict-csp&quot;&gt;Cross-site scripting in Jira Integration affecting self-hosted instances without strict CSP&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#release-names-visible-in-public-projects-despite-release-set-as-project-members-only&quot;&gt;Release names visible in public projects despite release set as project members only&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#sidekiq-background-job-dos-by-uploading-malicious-nuget-packages&quot;&gt;Sidekiq background job DoS by uploading malicious NuGet packages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#email-id-leaked-through-webhook-payloads&quot;&gt;Email ID leaked through Webhook payloads&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#blind-ssrf-in-repository-mirroring-using-dns-rebinding&quot;&gt;Blind SSRF in repository mirroring using DNS rebinding&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#SSRF%20in%20Web%20Terminal%20advertise_address&quot;&gt;SSRF in Web Terminal advertise_address&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;dast-api-scanner-exposes-authorization-headers-in-vulnerabilities&quot;&gt;DAST API scanner exposes Authorization headers in vulnerabilities&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;383083 --&gt;

&lt;p&gt;A sensitive information leak issue has been discovered in all versions of DAST API scanner from 1.6.50 prior to 2.0.102, exposing the Authorization header in the vulnerability report. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release of DAST API scanner and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4206&quot;&gt;CVE-2022-4206&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-ip-allow-list-not-fully-respected-by-the-package-registry&quot;&gt;Group IP allow-list not fully respected by the Package Registry&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;782 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. GitLab was not performing correct authentication with some Package Registries when IP address restrictions were configured, allowing an attacker already in possession of a valid Deploy Token to misuse it from any location. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3820&quot;&gt;CVE-2022-3820&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deploy-keys-and-tokens-may-bypass-external-authorization-service-if-it-is-enabled&quot;&gt;Deploy keys and tokens may bypass External Authorization service if it is enabled&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;773 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.9 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. A group owner may be able to bypass External Authorization check, if it is enabled, to access git repositories and package registries by using Deploy tokens or Deploy keys. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3740&quot;&gt;CVE-2022-3740&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-import-still-allows-to-import-40-hexadecimal-branches&quot;&gt;Repository import still allows to import 40 hexadecimal branches&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab EE&#x2F;CE before 15.6.1, 15.5.5 and 15.4.6 using a branch with a hexadecimal name could override an existing hash. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:L&lt;&#x2F;code&gt;, 6.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4205&quot;&gt;CVE-2022-4205&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;html-content-injection-in-readme-file&quot;&gt;HTML content injection in README file&lt;&#x2F;h2&gt;
&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 15.6 before 15.6.1. It was possible to create a malicious README page due to improper neutralisation of user supplied input. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4092&quot;&gt;CVE-2022-4092&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;webhook-secret-tokens-leaked-in-webhook-logs&quot;&gt;Webhook secret tokens leaked in webhook logs&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;797 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to unmask webhook secret tokens by reviewing the logs after testing webhooks. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3902&quot;&gt;CVE-2022-3902&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-webhook-secret-token-by-changing-the-webhook-url&quot;&gt;Maintainer can leak webhook secret token by changing the webhook URL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;795 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 9.3 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible for a project maintainer to leak a webhook secret token by changing the webhook URL to an endpoint that allows them to capture request headers. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4054&quot;&gt;CVE-2022-4054&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-jira-integration-affecting-self-hosted-instances-without-strict-csp&quot;&gt;Cross-site scripting in Jira Integration affecting self-hosted instances without strict CSP&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;799 --&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 13.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the Jira Connect integration which could lead to a reflected XSS that allowed attackers to perform arbitrary actions on behalf of victims. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3572&quot;&gt;CVE-2022-3572&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryotak&quot;&gt;ryotak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;release-names-visible-in-public-projects-despite-release-set-as-project-members-only&quot;&gt;Release names visible in public projects despite release set as project members only&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;794 --&gt;

&lt;p&gt;An improper access control issue in GitLab CE&#x2F;EE affecting all versions from 11.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allowed an unauthorized user to see release names even when releases were set to be restricted to project members only. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3482&quot;&gt;CVE-2022-3482&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;email-id-leaked-through-webhook-payloads&quot;&gt;Email ID leaked through Webhook payloads&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;790 --&gt;

&lt;p&gt;An info leak issue was identified in all versions of GitLab EE from 13.7 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which exposes user email id through webhook payload. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4255&quot;&gt;CVE-2022-4255&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sidekiq-background-job-dos-by-uploading-malicious-nuget-packages&quot;&gt;Sidekiq background job DoS by uploading malicious NuGet packages&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;793 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.4.6, all versions starting from 15.5 before 15.5.5, all versions starting from 15.6 before 15.6.1. It was possible to trigger a DoS attack by uploading a malicious NuGet package. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3478&quot;&gt;CVE-2022-3478&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;luryus&quot;&gt;luryus&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blind-ssrf-in-repository-mirroring-using-dns-rebinding&quot;&gt;Blind SSRF in repository mirroring using DNS rebinding&lt;&#x2F;h2&gt;

&lt;p&gt;A blind SSRF vulnerability was identified in all versions of GitLab EE prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 which allows an attacker to connect to a local host. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4335&quot;&gt;CVE-2022-4335&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-web-terminal-advertise_address&quot;&gt;SSRF in Web Terminal advertise_address&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;785 --&gt;

&lt;p&gt;A blind SSRF in GitLab CE&#x2F;EE affecting all from 11.3 prior to 15.4.6, 15.5 prior to 15.5.5, and 15.6 prior to 15.6.1 allows an attacker to connect to local addresses when configuring a malicious GitLab Runner. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-4201&quot;&gt;CVE-2022-4201&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-xmlsoftlibxml2&quot;&gt;Update xmlsoft&#x2F;libxml2&lt;&#x2F;h2&gt;

&lt;p&gt;xmlsoft&#x2F;libxml2 has been updated to version 2.10.3 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus from 13.6.6.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-haxxcurl&quot;&gt;Update haxx&#x2F;curl&lt;&#x2F;h2&gt;

&lt;p&gt;haxx&#x2F;curl has been updated to version 7.86.0 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus 15.4 and 15.6.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ruby&quot;&gt;Update ruby&lt;&#x2F;h2&gt;

&lt;p&gt;ruby has been updated to version 2.7.6 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus and GitLab Chart.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ncurses&quot;&gt;Update ncurses&lt;&#x2F;h2&gt;

&lt;p&gt;ncurses has been updated to version 6.3-20220416 to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-zlib&quot;&gt;Update zlib&lt;&#x2F;h2&gt;

&lt;p&gt;zlib has been updated to version 1.2.13 to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus prior to 15.7.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rsync&quot;&gt;Update rsync&lt;&#x2F;h2&gt;

&lt;p&gt;rsync has been updated to version 3.2.6 to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus 15.3, 15.4, and 15.5.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-postgresql&quot;&gt;Update PostgreSQL&lt;&#x2F;h2&gt;

&lt;p&gt;PostgreSQL has been updated to versions 12.12 and 13.8 to mitigate security issues. By default Omnibus &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;database.html#automatic-restart-when-the-postgresql-version-changes&quot;&gt;automatically restarts PostgreSQL&lt;&#x2F;a&gt; after the update. However, if automatic restart is disabled manual restarts would be required.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus 15.3, 15.4, and 15.5.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;backport-fix-for-gitaly-ntp-request-issue&quot;&gt;Backport fix for Gitaly NTP request issue&lt;&#x2F;h2&gt;

&lt;p&gt;A non-security issue in Gitaly is being backported to this release. Customers that rely on public NTP services such as &lt;code&gt;pool.ntp.org&lt;&#x2F;code&gt; are at risk of receiving rate limited responses due to increased NTP request volume. Every readiness check results in each Praefect node making a request to the configured NTP service. Failed NTP responses result in failed readiness check. If a NTP service is not specified &lt;code&gt;pool.ntp.org&lt;&#x2F;code&gt; is used as the default. Deployments that rely on healthy readiness checks can experience outages. Issue Link: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;383440&quot;&gt;Gitaly 15.4.3 spams NTP requests&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;backport-fix-for-watchdog-rssmemorylimit-monitor&quot;&gt;Backport fix for Watchdog RssMemoryLimit monitor&lt;&#x2F;h2&gt;

&lt;p&gt;A non-security issue in Puma is being backported to this release. This affects self-managed instances that uses PumaWorkerKiller. PumaWorkerKiller is disabled by default on Gitlab.com and self-managed instances using helm charts. This means that gitlab.com is not affected. It is enabled by default for omnibus installations and installations from source. Issue Link: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;383440&quot;&gt;Convert memory_limit to bytes for RssMemoryLimit&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.
To update DAST API scanner, self-managed customers that are using our built-in DAST CI template after 15.0 can get the latest release from registry.gitlab.com. If using the always pull policy the update will occur automatically. GitLab.com is already running the updated DAST scanner.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.6 released with improvements to security policies, CI&#x2F;CD variables, and DAST API</title>
<release>15.6</release>
<link href='https://about.gitlab.com/releases/2022/11/22/gitlab-15-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/11/22/gitlab-15-6-released/</id>
<published>2022-11-22T00:00:00+00:00</published>
<updated>2022-11-22T00:00:00+00:00</updated>
<author>
<name>Alana Bellucci</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.6 with 
&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;11&#x2F;22&#x2F;gitlab-15-6-released&#x2F;#git-abuse-rate-limiting&quot;&gt;Git abuse rate limiting&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;11&#x2F;22&#x2F;gitlab-15-6-released&#x2F;#support-for-special-characters-in-cicd-variables&quot;&gt;Support for special characters in CI&#x2F;CD variables&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;11&#x2F;22&#x2F;gitlab-15-6-released&#x2F;#group-and-subgroup-level-scan-result-policies&quot;&gt;group and subgroup-level scan result policies&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;11&#x2F;22&#x2F;gitlab-15-6-released&#x2F;#dast-api-analyzer-for-on-demand-dast-api-scans&quot;&gt;DAST API analyzer for on-demand DAST API scans&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 30+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 200+ contributions they provided to GitLab 15.6! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.7 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_6&#x2F;15_6-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.5.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/11/14/gitlab-15-5-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/11/14/gitlab-15-5-4-released/</id>
<published>2022-11-14T00:00:00+00:00</published>
<updated>2022-11-14T00:00:00+00:00</updated>
<author>
<name>John Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.5.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;&quot;&gt;this month&#x27;s 15.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;102663&quot;&gt;Add Hashie::Array to allowed YAML serialization classes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;102845&quot;&gt;Allow links to be opened from Swagger UI documentations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;103483&quot;&gt;Revert Sidekiq default routing rules&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 15.4.0 introduced a default &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;operations&#x2F;extra_sidekiq_routing.html&quot;&gt;Sidekiq routing rule&lt;&#x2F;a&gt; that routes all jobs to the &lt;code&gt;default&lt;&#x2F;code&gt; queue. For instances using &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;operations&#x2F;extra_sidekiq_processes.html#queue-selector&quot;&gt;queue selectors&lt;&#x2F;a&gt;, this will cause &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;scalability&#x2F;-&#x2F;issues&#x2F;1991&quot;&gt;performance problems&lt;&#x2F;a&gt; as some Sidekiq processes will be idle.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;The default routing rule has been reverted in this release (15.5.4), so upgrading to this version or later will return to the previous behavior.&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;If a GitLab instance now listens only to the &lt;code&gt;default&lt;&#x2F;code&gt; queue (which is not currently recommended), it will be required to add this routing rule back in &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;sidekiq&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;routing_rules&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;[[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;*&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;default&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]]&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.4.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/11/14/gitlab-15-4-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/11/14/gitlab-15-4-5-released/</id>
<published>2022-11-14T00:00:00+00:00</published>
<updated>2022-11-14T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.4.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;09&#x2F;22&#x2F;gitlab-15-4-released&#x2F;&quot;&gt;September&#x27;s 15.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1199&quot;&gt;gitlab-base: set &#x2F;tmp sticky, RH bug 2138434 [15.4]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1200&quot;&gt;CI: UBI: cleanup artifacts after completion of tarball [15.4]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;103641&quot;&gt;Revert Sidekiq default routing rules&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1149&quot;&gt;Gitaly: add config.toml back, as mock template&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 15.4.0 introduced a default &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;operations&#x2F;extra_sidekiq_routing.html&quot;&gt;Sidekiq routing rule&lt;&#x2F;a&gt; that routes all jobs to the &lt;code&gt;default&lt;&#x2F;code&gt; queue. For instances using &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;operations&#x2F;extra_sidekiq_processes.html#queue-selector&quot;&gt;queue selectors&lt;&#x2F;a&gt;, this will cause &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;scalability&#x2F;-&#x2F;issues&#x2F;1991&quot;&gt;performance problems&lt;&#x2F;a&gt; as some Sidekiq processes will be idle.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;The default routing rule has been reverted in this release (15.4.5), so upgrading to this version or later will return to the previous behavior.&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;If a GitLab instance now listens only to the &lt;code&gt;default&lt;&#x2F;code&gt; queue (which is not currently recommended), it will be required to add this routing rule back in &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;sidekiq&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;routing_rules&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;[[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;*&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;default&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]]&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.5.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/11/08/gitlab-15-5-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/11/08/gitlab-15-5-3-released/</id>
<published>2022-11-08T00:00:00+00:00</published>
<updated>2022-11-08T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.5.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;&quot;&gt;this month&#x27;s 15.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101977&quot;&gt;Mentioned FF in WI iteration docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;102285&quot;&gt;Fix Opensearch compatibility check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1085&quot;&gt;Add support to AWS encryption with KMS key + S3 endpoint URL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1184&quot;&gt;gitlab-base: set &#x2F;tmp sticky, RH bug 2138434&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;container-registry&#x2F;-&#x2F;issues&#x2F;815&quot;&gt;Container Registry: Return 404 Not Found when the metadata DB is not enabled&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.5.2, 15.4.4, and 15.3.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/11/02/security-release-gitlab-15-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/11/02/security-release-gitlab-15-5-2-released/</id>
<published>2022-11-02T00:00:00+00:00</published>
<updated>2022-11-02T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.5.2, 15.4.4, and 15.3.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dast-analyzer-sends-custom-request-headers-with-every-request&quot;&gt;DAST analyzer sends custom request headers with every request&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-with-csp-bypass-via-scoped-labels-color&quot;&gt;Stored-XSS with CSP-bypass via scoped labels&#x27; color&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-datadog-api-key-by-changing-integration-url&quot;&gt;Maintainer can leak Datadog API key by changing integration URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#uncontrolled-resource-consumption-when-parsing-urls&quot;&gt;Uncontrolled resource consumption when parsing URLs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#issue-http-requests-when-users-view-an-openapi-document-and-click-buttons&quot;&gt;Issue HTTP requests when users view an OpenAPI document and click buttons&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#command-injection-in-ci-jobs-via-branch-name-in-ci-pipelines&quot;&gt;Command injection in CI jobs via branch name in CI pipelines&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirection&quot;&gt;Open redirection&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#prefill-variables-do-not-check-permission-of-the-project-in-external-ci-config&quot;&gt;Prefill variables do not check permission of the project in external CI config&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-audit-events-to-insufficiently-permissioned-group-and-project-members&quot;&gt;Disclosure of audit events to insufficiently permissioned group and project members&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-gfm-references-rendered-in-jira-issue-description-leak-privateconfidential-resources&quot;&gt;Arbitrary GFM references rendered in Jira issue description leak private&#x2F;confidential resources&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#award-emojis-api-for-an-internal-note-is-accessible-to-users-without-access-to-the-note&quot;&gt;Award emojis API for an internal note is accessible to users without access to the note&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirect-in-pipeline-artifacts-when-generating-html-documents&quot;&gt;Open redirect in pipeline artifacts when generating HTML documents&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#retrying-a-job-in-a-downstream-pipeline-allows-the-retrying-user-to-take-ownership-of-the-retried-jobs-in-upstream-pipelines&quot;&gt;Retrying a job in a downstream pipeline allows the retrying user to take ownership of the retried jobs in upstream pipelines&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-level-secure-files-can-be-written-out-of-the-target-directory&quot;&gt;Project-level Secure Files can be written out of the target directory&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;dast-analyzer-sends-custom-request-headers-with-every-request&quot;&gt;DAST analyzer sends custom request headers with every request&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;377473 --&gt;

&lt;p&gt;Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 7.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3767&quot;&gt;CVE-2022-3767&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-with-csp-bypass-via-scoped-labels-color&quot;&gt;Stored-XSS with CSP-bypass via scoped labels&#x27; color&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;770 --&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab CE&#x2F;EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. It was possible to exploit a vulnerability in setting the labels  colour feature  which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3265&quot;&gt;CVE-2022-3265&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-datadog-api-key-by-changing-integration-url&quot;&gt;Maintainer can leak Datadog API key by changing integration URL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;780 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.1 before 15.3.5, all versions starting from 15.4 before 15.4.4, all versions starting from 15.5 before 15.5.2. A malicious maintainer could exfiltrate a Datadog integration&#x27;s access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3483&quot;&gt;CVE-2022-3483&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryotak&quot;&gt;ryotak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;uncontrolled-resource-consumption-when-parsing-urls&quot;&gt;Uncontrolled resource consumption when parsing URLs&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;768 --&gt;

&lt;p&gt;An uncontrolled resource consumption issue when parsing URLs in GitLab CE&#x2F;EE affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to cause performance issues and potentially a denial of service on the GitLab instance. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3818&quot;&gt;CVE-2022-3818&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-http-requests-when-users-view-an-openapi-document-and-click-buttons&quot;&gt;Issue HTTP requests when users view an OpenAPI document and click buttons&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;778 --&gt;

&lt;p&gt;Lack of sand-boxing of OpenAPI documents in GitLab CE&#x2F;EE affecting all versions from 12.6 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick a user to click on the Swagger OpenAPI viewer and issue HTTP requests that affect the victim&#x27;s account. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3726&quot;&gt;CVE-2022-3726&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;command-injection-in-ci-jobs-via-branch-name-in-ci-pipelines&quot;&gt;Command injection in CI jobs via branch name in CI pipelines&lt;&#x2F;h2&gt;

&lt;p&gt;Improper sanitization of branch names in GitLab Runner affecting all versions prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user who creates a branch with a specially crafted name and gets another user to trigger a pipeline to execute commands in the runner as that other user. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2251&quot;&gt;CVE-2022-2251&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;stanlyoncm&quot;&gt;stanlyoncm&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirection&quot;&gt;Open redirection&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;781 --&gt;

&lt;p&gt;An open redirect vulnerability in GitLab EE&#x2F;CE affecting all versions from 9.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allows an attacker to redirect users to an arbitrary location if they trust the URL. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3486&quot;&gt;CVE-2022-3486&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryotak&quot;&gt;ryotak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prefill-variables-do-not-check-permission-of-the-project-in-external-ci-config&quot;&gt;Prefill variables do not check permission of the project in external CI config&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;761 --&gt;

&lt;p&gt;An improper authorization issue in GitLab CE&#x2F;EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to read variables set directly in a GitLab CI&#x2F;CD configuration file they don&#x27;t have access to. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3793&quot;&gt;CVE-2022-3793&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-audit-events-to-insufficiently-permissioned-group-and-project-members&quot;&gt;Disclosure of audit events to insufficiently permissioned group and project members&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;771 --&gt;

&lt;p&gt;Incorrect authorization during display of Audit Events in GitLab EE affecting all versions from 14.5 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2, allowed Developers to view the project&#x27;s Audit Events and Developers or Maintainers to view the group&#x27;s Audit Events. These should have been restricted to Project Maintainers, Group Owners, and above. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3413&quot;&gt;CVE-2022-3413&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-gfm-references-rendered-in-jira-issue-description-leak-privateconfidential-resources&quot;&gt;Arbitrary GFM references rendered in Jira issue description leak private&#x2F;confidential resources&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure issue in GitLab CE&#x2F;EE affecting all versions from 14.4 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to use GitLab Flavored Markdown (GFM) references in a Jira issue to disclose the names of resources they don&#x27;t have access to. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2761&quot;&gt;CVE-2022-2761&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;award-emojis-api-for-an-internal-note-is-accessible-to-users-without-access-to-the-note&quot;&gt;Award emojis API for an internal note is accessible to users without access to the note&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;783 --&gt;

&lt;p&gt;An improper authorization issue in GitLab CE&#x2F;EE affecting all versions from 15.0 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a malicious users to set emojis on internal notes they don&#x27;t have access to. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3819&quot;&gt;CVE-2022-3819&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-in-pipeline-artifacts-when-generating-html-documents&quot;&gt;Open redirect in pipeline artifacts when generating HTML documents&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;764 --&gt;

&lt;p&gt;An open redirect in GitLab CE&#x2F;EE affecting all versions from 10.1 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows an attacker to trick users into visiting a trustworthy URL and being redirected to arbitrary content. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3280&quot;&gt;CVE-2022-3280&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;retrying-a-job-in-a-downstream-pipeline-allows-the-retrying-user-to-take-ownership-of-the-retried-jobs-in-upstream-pipelines&quot;&gt;Retrying a job in a downstream pipeline allows the retrying user to take ownership of the retried jobs in upstream pipelines&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;779 --&gt;

&lt;p&gt;Improper authorization in GitLab CE&#x2F;EE affecting all versions from 7.14 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allows a user retrying a job in a downstream pipeline to take ownership of the retried jobs in the upstream pipeline even if the user doesn&#x27;t have access to that project. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3706&quot;&gt;CVE-2022-3706&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-level-secure-files-can-be-written-out-of-the-target-directory&quot;&gt;Project-level Secure Files can be written out of the target directory&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;376218 --&gt;

&lt;p&gt;Secure Files named in a specific way could traverse outside of the target directory in the CI job. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). Only GitLab.com was affected as this feature is not yet enabled on self-managed instances and the patch has been deployed in production.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl&quot;&gt;Update openssl&lt;&#x2F;h2&gt;

&lt;p&gt;The version of openssl has been updated to &lt;a href=&quot;https:&#x2F;&#x2F;launchpad.net&#x2F;ubuntu&#x2F;+source&#x2F;openssl&#x2F;3.0.2-0ubuntu1.7&quot;&gt;3.0.2-0ubuntu1.7&lt;&#x2F;a&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h1&gt;

&lt;p&gt;Affects all versions of GitLab Dynamic Application Security Testing (DAST) Analyzer prior to 3.0.32.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-curl&quot;&gt;Update curl&lt;&#x2F;h2&gt;

&lt;p&gt;The version of curl has been updated to 7.85.0 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h1&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-pcre2&quot;&gt;Update pcre2&lt;&#x2F;h2&gt;

&lt;p&gt;The version of pcre2 has been updated to 10.40 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h1&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-fixes&quot;&gt;Non-security fixes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;7275&quot;&gt;15.5.0 upgrade on CentOS 8 Stream in FIPS mode fails&lt;&#x2F;a&gt;: Backported to 15.5.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;7267&quot;&gt;Ohai fails to build trying to find unavailable version of the dependency chef-utils&lt;&#x2F;a&gt;: Backported to 15.4 and 15.3.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To update DAST scanner, self-managed customers that are using our built-in DAST CI template after 15.0 can get the latest release from &lt;code&gt;registry.gitlab.com&lt;&#x2F;code&gt;. If using the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;executors&#x2F;docker.html#using-the-always-pull-policy&quot;&gt;always pull policy&lt;&#x2F;a&gt; the update will occur automatically. GitLab.com is already running the updated DAST scanner.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.5.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/10/24/gitlab-15-5-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/10/24/gitlab-15-5-1-released/</id>
<published>2022-10-24T00:00:00+00:00</published>
<updated>2022-10-24T00:00:00+00:00</updated>
<author>
<name>John Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.5.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;&quot;&gt;this month&#x27;s 15.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;97451&quot;&gt;Docs: Remove deprecated SAST analyzers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;98927&quot;&gt;Remove git target from gitaly rake job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;99098&quot;&gt;Add Ubuntu 22.04 to the supported OS list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101109&quot;&gt;Add intended use for health status into docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101571&quot;&gt;Specify certificates when connecting to KAS using TLS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101636&quot;&gt;Batch records when preloading for indexing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6466&quot;&gt;Install chef-config 17.10.19 before installing Ohai&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101824&quot;&gt;Fix fail-fast job when there are migrations present&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.5 released with GitLab Cloud Seed and Autocomplete suggestions</title>
<release>15.5</release>
<link href='https://about.gitlab.com/releases/2022/10/22/gitlab-15-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/10/22/gitlab-15-5-released/</id>
<published>2022-10-22T00:00:00+00:00</published>
<updated>2022-10-22T00:00:00+00:00</updated>
<author>
<name>Matt Wilson</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.5 with &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;#deploy-apps-to-google-cloud-with-gitlab-cloud-seed&quot;&gt;GitLab Cloud Seed&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;#autocomplete-suggestions-in-the-content-editor&quot;&gt;Autocomplete suggestions in the Content Editor&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;#error-tracking-open-beta&quot;&gt;Error Tracking Open Beta&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;10&#x2F;22&#x2F;gitlab-15-5-released&#x2F;#operational-container-scanning&quot;&gt;Operational Container Scanning&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 50+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 153 contributions they provided to GitLab 15.5! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month&#x27;s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.6 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_5&#x2F;15_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.4.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/10/19/gitlab-15-4-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/10/19/gitlab-15-4-3-released/</id>
<published>2022-10-19T00:00:00+00:00</published>
<updated>2022-10-19T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.4.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;09&#x2F;22&#x2F;gitlab-15-4-released&#x2F;&quot;&gt;this month&#x27;s 15.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101434&quot;&gt;Restore caching for License.current logic&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;101278&quot;&gt;Fix closing of external issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1149&quot;&gt;Gitaly: add config.toml back, as mock template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;100081&quot;&gt;Fix REST&#x2F;GRAPHQL APIs handling TODOs WorkItem target&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;98898&quot;&gt;Sign in: use custom logo again&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;98898&quot;&gt;Sign in: use custom logo again&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1149&quot;&gt;Gitaly: add config.toml back, as mock template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.4.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/10/03/gitlab-15-4-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/10/03/gitlab-15-4-2-released/</id>
<published>2022-10-03T00:00:00+00:00</published>
<updated>2022-10-03T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.4.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;09&#x2F;22&#x2F;gitlab-15-4-released&#x2F;&quot;&gt;this month&#x27;s 15.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95128&quot;&gt;Docs for Suggested Reviewers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;96098&quot;&gt;Feat(doc): docs on Gitaly GPG signing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;98218&quot;&gt;Update work item tasks user docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;98480&quot;&gt;Add What&#x27;s New for 15.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;98506&quot;&gt;Ensure that stage name and record are in sync for page deployments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1145&quot;&gt;Gitaly: remove config.toml, unneeded, problematic.&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.4.1, 15.3.4, and 15.2.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/09/29/security-release-gitlab-15-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/09/29/security-release-gitlab-15-4-1-released/</id>
<published>2022-09-29T00:00:00+00:00</published>
<updated>2022-09-29T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.4.1, 15.3.4, and 15.2.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-cloning-an-issue&quot;&gt;Denial of Service via cloning an issue&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-put-request-as-victim-user-through-sentry-error-list&quot;&gt;Arbitrary PUT request as victim user through Sentry error list&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#content-injection-via-external-status-checks&quot;&gt;Content injection via External Status Checks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-maintainers-can-access-datadog-api-key-from-logs&quot;&gt;Project maintainers can access Datadog API Key from logs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unsafe-serialization-of-json-data-could-lead-to-sensitive-data-leakage&quot;&gt;Unsafe serialization of Json data could lead to sensitive data leakage&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#import-bug-allows-importing-of-private-local-git-repos&quot;&gt;Import bug allows importing of private local git repos&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-github-access-tokens-by-changing-integration-url-even-after-1521-patch&quot;&gt;Maintainer can leak Github access tokens by changing integration URL (even after 15.2.1 patch)&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-users-able-to-create-issues-in-any-project&quot;&gt;Unauthorized users able to create issues in any project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypass-group-ip-restriction-on-dependency-proxy&quot;&gt;Bypass group IP restriction on Dependency Proxy&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#healthcheck-endpoint-allow-list-can-be-bypassed-when-accessed-over-http-in-an-https-enabled-system&quot;&gt;Healthcheck endpoint allow list can be bypassed when accessed over HTTP in an HTTPS enabled system&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-todo-details-to-guest-users&quot;&gt;Disclosure of Todo details to guest users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#a-users-primary-email-may-be-disclosed-through-group-member-events-webhooks&quot;&gt;A user&#x27;s primary email may be disclosed through group member events webhooks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#content-manipulation-due-to-branchtag-name-confusion-with-the-default-branch-name&quot;&gt;Content manipulation due to branch&#x2F;tag name confusion with the default branch name&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#leakage-of-email-addresses-in-webhook-logs&quot;&gt;Leakage of email addresses in WebHook logs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#specially-crafted-output-makes-job-logs-inaccessible&quot;&gt;Specially crafted output makes job logs inaccessible&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;denial-of-service-via-cloning-an-issue&quot;&gt;Denial of Service via cloning an issue&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;766 --&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab CE&#x2F;EE affecting all versions before before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 While cloning an issue with special crafted content added to the description could have been used to trigger high CPU usage. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt; 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3283&quot;&gt;CVE-2022-3283&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;legit-security&quot;&gt;legit-security&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-put-request-as-victim-user-through-sentry-error-list&quot;&gt;Arbitrary PUT request as victim user through Sentry error list&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;739 --&gt;

&lt;p&gt;Improper control of a resource identifier in Error Tracking in GitLab CE&#x2F;EE affecting all versions from 12.7 allows an authenticated attacker to generate content which could cause a victim to make unintended arbitrary requests. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3060&quot;&gt;CVE-2022-3060&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;@joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;content-injection-via-external-status-checks&quot;&gt;Content injection via External Status Checks&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;736 --&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.2 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 It was possible to exploit a vulnerability in the external status checks feature  which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2904&quot;&gt;CVE-2022-2904&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-maintainers-can-access-datadog-api-key-from-logs&quot;&gt;Project maintainers can access Datadog API Key from logs&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;717 --&gt;

&lt;p&gt;An information disclosure vulnerability in GitLab CE&#x2F;EE affecting all versions starting from 9.3 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 allows a project maintainer to access the DataDog integration API key from webhook logs. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3018&quot;&gt;CVE-2022-3018&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unsafe-serialization-of-json-data-could-lead-to-sensitive-data-leakage&quot;&gt;Unsafe serialization of Json data could lead to sensitive data leakage&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;735 --&gt;

&lt;p&gt;Serialization of sensitive data in GitLab EE affecting all versions from 14.9 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 can leak sensitive information via cache. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3291&quot;&gt;CVE-2022-3291&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;import-bug-allows-importing-of-private-local-git-repos&quot;&gt;Import bug allows importing of private local git repos&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;758 --&gt;

&lt;p&gt;An issue has been discovered in the Import functionality of GitLab CE&#x2F;EE affecting all versions starting from 14.4 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an authenticated user to read arbitrary projects&#x27; content given the project&#x27;s ID. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3067&quot;&gt;CVE-2022-3067&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-leak-github-access-tokens-by-changing-integration-url-even-after-1521-patch&quot;&gt;Maintainer can leak Github access tokens by changing integration URL (even after 15.2.1 patch)&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;762 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.6 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. A malicious maintainer could exfiltrate a GitHub integration&#x27;s access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2882&quot;&gt;CVE-2022-2882&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-users-able-to-create-issues-in-any-project&quot;&gt;Unauthorized users able to create issues in any project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;759 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 10.0 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. It was possible for an unauthorised user to create issues in a project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3066&quot;&gt;CVE-2022-3066&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-group-ip-restriction-on-dependency-proxy&quot;&gt;Bypass group IP restriction on Dependency Proxy&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;740 --&gt;

&lt;p&gt;Lack of IP address checking in GitLab EE affecting all versions from 14.2 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows a group member to bypass IP restrictions when using a deploy token. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3286&quot;&gt;CVE-2022-3286&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;healthcheck-endpoint-allow-list-can-be-bypassed-when-accessed-over-http-in-an-https-enabled-system&quot;&gt;Healthcheck endpoint allow list can be bypassed when accessed over HTTP in an HTTPS enabled system&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;64 --&gt;

&lt;p&gt;Bypass of healthcheck endpoint allow list affecting all versions from 12.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an unauthorized attacker to prevent access to GitLab. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3285&quot;&gt;CVE-2022-3285&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-todo-details-to-guest-users&quot;&gt;Disclosure of Todo details to guest users&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;726 --&gt;

&lt;p&gt;It was possible for a guest user to read a todo targeting an inaccessible note in Gitlab CE&#x2F;EE affecting all versions from 15.0 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3330&quot;&gt;CVE-2022-3330&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;a-users-primary-email-may-be-disclosed-through-group-member-events-webhooks&quot;&gt;A user&#x27;s primary email may be disclosed through group member events webhooks&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;772 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 13.7 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. A user&#x27;s primary email may be disclosed to an attacker through group member events webhooks. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3351&quot;&gt;CVE-2022-3351&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;@joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;content-manipulation-due-to-branchtag-name-confusion-with-the-default-branch-name&quot;&gt;Content manipulation due to branch&#x2F;tag name confusion with the default branch name&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;713 --&gt;

&lt;p&gt;A branch&#x2F;tag name confusion in GitLab CE&#x2F;EE affecting all versions prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an attacker to manipulate pages where the content of the default branch would be expected. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3288&quot;&gt;CVE-2022-3288&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;leakage-of-email-addresses-in-webhook-logs&quot;&gt;Leakage of email addresses in WebHook logs&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;756 --&gt;

&lt;p&gt;Email addresses were leaked in WebHook logs in GitLab EE affecting all versions from 9.3 prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3293&quot;&gt;CVE-2022-3293&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;specially-crafted-output-makes-job-logs-inaccessible&quot;&gt;Specially crafted output makes job logs inaccessible&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;767 --&gt;

&lt;p&gt;An unhandled exception in job log parsing in GitLab CE&#x2F;EE affecting all versions prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an attacker to prevent access to job logs. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3279&quot;&gt;CVE-2022-3279&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;exem_pt&quot;&gt;exem_pt&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enforce-editing-approval-rules-on-project-level&quot;&gt;Enforce editing approval rules on project level&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;760 --&gt;

&lt;p&gt;Improper access control in the GitLab CE&#x2F;EE API affecting all versions starting from 12.8 before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1. Allowed for editing the approval rules via the API by an unauthorised user. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3325&quot;&gt;CVE-2022-3325&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-grafana&quot;&gt;Update Grafana&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;63 --&gt;

&lt;p&gt;Grafana has been patched in order to mitigate &quot;CVE-2022-31107 - Grafana account takeover via OAuth vulnerability&quot;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been updated to version 7.1.3 in order to mitigate security issues.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;backport-fix-for-geo-lfs-issue&quot;&gt;Backport fix for Geo LFS issue&lt;&#x2F;h2&gt;

&lt;p&gt;A non-security issue in Geo LFS is being backported to our &lt;code&gt;15.2.5&lt;&#x2F;code&gt; release: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;371397&quot;&gt;&quot;Geo: invalid lfs object deletion on secondary when managed object replication is disabled&quot;&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.4 released with Suggested Reviewers and better VS Code CI&#x2F;CD experience</title>
<release>15.4</release>
<link href='https://about.gitlab.com/releases/2022/09/22/gitlab-15-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/09/22/gitlab-15-4-released/</id>
<published>2022-09-22T00:00:00+00:00</published>
<updated>2022-09-22T00:00:00+00:00</updated>
<author>
<name>Derek Ferguson</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.4 with GitLab&#x27;s first machine learning powered feature: &lt;a href=&quot;#suggested-reviewers-open-beta&quot;&gt;Suggested Reviewers open beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#improved-cicd-integration-in-vs-code&quot;&gt;improved CI&#x2F;CD integration in VS Code&lt;&#x2F;a&gt;, &lt;a href=&quot;#getting-started-with-gitlab-pages-just-got-easier&quot;&gt;Pages Pipeline Wizard&lt;&#x2F;a&gt;, &lt;a href=&quot;#users-on-verified-domains-can-bypass-email-validation&quot;&gt;email validation bypass for verified domains&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 60+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 186 contributions they provided to GitLab 15.4! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.5 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_4&#x2F;15_4-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.3.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/09/05/gitlab-15-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/09/05/gitlab-15-3-3-released/</id>
<published>2022-09-05T00:00:00+00:00</published>
<updated>2022-09-05T00:00:00+00:00</updated>
<author>
<name>Jenny Kim</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.3.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;08&#x2F;22&#x2F;gitlab-15-3-released&#x2F;&quot;&gt;this month&#x27;s 15.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95094&quot;&gt;Change Tasks documentation to describe the widget experience&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95607&quot;&gt;Changed POST API saml_group_links to accept acccess_level as integer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95704&quot;&gt;Add documentation for dormant user period&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95738&quot;&gt;Fix user recent activity links for work item actions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95778&quot;&gt;Fix flaky SSH remote mirror spec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95833&quot;&gt;Revert &quot;Merge branch &#x27;tor&#x2F;feature&#x2F;interrupt-leaving-pending-review&#x27; into &#x27;master&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95868&quot;&gt;Add Whats New for 15.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95872&quot;&gt;Bypass earliest date validation in importing of iteration cadences&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95962&quot;&gt;Improve blame link feature&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;96123&quot;&gt;Remove the GIT_CLONE_PATH variable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;96368&quot;&gt;Updating image urls to indicate release&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6298&quot;&gt;Improve error message when omnibus_gitconfig is not set properly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;95974&quot;&gt;Geo: Fix redirects of LFS transfer downloads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;96556&quot;&gt;Geo: Do not delete object stored files when not GitLab managed&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Premium and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.3.2, 15.2.4 and 15.1.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/08/30/critical-security-release-gitlab-15-3-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/08/30/critical-security-release-gitlab-15-3-2-released/</id>
<published>2022-08-30T00:00:00+00:00</published>
<updated>2022-08-30T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.3.2, 15.2.4 and 15.1.6 for GitLab Community Edition (CE) and Enterprise Edition (EE). Please note, this critical release will also serve as our monthly security release for August.&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#remote-command-execution-via-github-import&quot;&gt;Remote Command Execution via GitHub import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-via-labels-color&quot;&gt;Stored XSS via labels color&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#content-injection-via-incidents-timeline-description&quot;&gt;Content injection via Incidents Timeline description&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-issue-preview&quot;&gt;Denial of Service via Issue preview&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#lack-of-length-validation-in-snippets-leads-to-denial-of-service&quot;&gt;Lack of length validation in Snippets leads to Denial of Service&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-ip-allow-list-not-fully-respected-by-the-package-registry&quot;&gt;Group IP allow-list not fully respected by the Package Registry&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#abusing-gitalygettreeentries-calls-leads-to-denial-of-service&quot;&gt;Abusing Gitaly.GetTreeEntries calls leads to denial of service&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-http-requests-possible-in-ipynb-notebook-with-malicious-form-tags&quot;&gt;Arbitrary HTTP Requests Possible in .ipynb Notebook with Malicious Form Tags&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#read-repository-content-via-livepreview-feature&quot;&gt;Read repository content via LivePreview feature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-via-special-crafted-input&quot;&gt;Regular Expression Denial of Service via special crafted input&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#information-disclosure-via-arbitrary-gfm-references-rendered-in-incident-timeline-events&quot;&gt;Information Disclosure via Arbitrary GFM references rendered in Incident Timeline Events&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-the-create-branch-api&quot;&gt;Denial of Service via the Create branch API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#brute-force-attack-may-guess-a-password-even-when-2fa-is-enabled&quot;&gt;Brute force attack may guess a password even when 2FA is enabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#idor-in-zentao-integration-leaked-issue-details&quot;&gt;IDOR in Zentao integration leaked issue details&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;remote-command-execution-via-github-import&quot;&gt;Remote Command Execution via GitHub import&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;755 --&gt;

&lt;p&gt;A vulnerability in GitLab CE&#x2F;EE affecting all versions from 11.10 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. allows an authenticated user to achieve remote code execution via the Import from GitHub API endpoint. This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 9.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2992&quot;&gt;CVE-2022-2992&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-via-labels-color&quot;&gt;Stored XSS via labels color&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;749 --&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. It was possible to exploit a vulnerability in setting the labels color feature which could lead to a stored XSS that allowed attackers to perform arbitrary actions on behalf of victims at client side. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2865&quot;&gt;CVE-2022-2865&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;content-injection-via-incidents-timeline-description&quot;&gt;Content injection via Incidents Timeline description&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;729 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 10.0 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2527&quot;&gt;CVE-2022-2527&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;lack-of-length-validation-in-snippets-leads-to-denial-of-service&quot;&gt;Lack of length validation in Snippets leads to Denial of Service&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;731 --&gt;

&lt;p&gt;A lack of length validation in Snippet descriptions in GitLab CE&#x2F;EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allows an authenticated attacker to create a maliciously large Snippet which when requested with or without authentication places excessive load on the server, potentially leading to Denial of Service. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2592&quot;&gt;CVE-2022-2592&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-ip-allow-list-not-fully-respected-by-the-package-registry&quot;&gt;Group IP allow-list not fully respected by the Package Registry&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;706 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.10 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. GitLab was not performing correct authentication with some Package Registries when IP address restrictions were configured, allowing an attacker already in possession of a valid Deploy Token to misuse it from any location. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2533&quot;&gt;CVE-2022-2533&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;abusing-gitalygettreeentries-calls-leads-to-denial-of-service&quot;&gt;Abusing Gitaly.GetTreeEntries calls leads to denial of service&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;709 --&gt;

&lt;p&gt;A business logic issue in the handling of large repositories in all versions of GitLab CE&#x2F;EE from 10.0 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allowed an authenticated and authorized user to exhaust server resources by importing a malicious project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2455&quot;&gt;CVE-2022-2455&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xn3va&quot;&gt;0xn3va&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-http-requests-possible-in-ipynb-notebook-with-malicious-form-tags&quot;&gt;Arbitrary HTTP Requests Possible in .ipynb Notebook with Malicious Form Tags&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;748 --&gt;

&lt;p&gt;A crafted tag in the Jupyter Notebook viewer in GitLab EE&#x2F;CE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allows an attacker to issue arbitrary HTTP requests. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2428&quot;&gt;CVE-2022-2428&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;read-repository-content-via-livepreview-feature&quot;&gt;Read repository content via LivePreview feature&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;349388 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 10.8 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. It was possible to read repository content by an unauthorised user if a project member used a crafted link. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2907&quot;&gt;CVE-2022-2907&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;niraeth&quot;&gt;niraeth&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-via-special-crafted-input&quot;&gt;Regular Expression Denial of Service via special crafted input&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DoS vulnerability was discovered in Gitlab CE&#x2F;EE versions starting from 10.7 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2 allowed an attacker to trigger high CPU usage via a special crafted input added in the Commit message field. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2908&quot;&gt;CVE-2022-2908&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-arbitrary-gfm-references-rendered-in-incident-timeline-events&quot;&gt;Information Disclosure via Arbitrary GFM references rendered in Incident Timeline Events&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;745 --&gt;

&lt;p&gt;An improper access control issue in GitLab CE&#x2F;EE affecting all versions starting from 15.2 before 15.2.4, all versions from 15.3 before 15.3.2 allows disclosure of confidential information via the Incident timeline events. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2630&quot;&gt;CVE-2022-2630&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-via-the-create-branch-api&quot;&gt;Denial of Service via the Create branch API&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;366876 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.9 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Improper data handling on branch creation could have been used to trigger high CPU usage. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3639&quot;&gt;CVE-2022-3639&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;elise&quot;&gt;elise&lt;&#x2F;a&gt; for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-via-issue-preview&quot;&gt;Denial of Service via Issue preview&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;361982 --&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab CE&#x2F;EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Malformed content added to the issue description could have been used to trigger high CPU usage. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2931&quot;&gt;CVE-2022-2931&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;legit-security&quot;&gt;legit-security&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-in-zentao-integration-leaked-issue-details&quot;&gt;IDOR in Zentao integration leaked issue details&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;360372 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 14.5 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. GitLab&#x27;s Zentao integration has an insecure direct object reference vulnerability that may be exploited by an attacker to leak project issues. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3331&quot;&gt;CVE-2022-3331&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;brute-force-attack-may-guess-a-password-even-when-2fa-is-enabled&quot;&gt;Brute force attack may guess a password even when 2FA is enabled&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;340395 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. It may be possible for an attacker to guess a user&#x27;s password by brute force by sending crafted requests to a specific endpoint, even if the victim user has 2FA enabled on their account.
 This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-3031&quot;&gt;CVE-2022-3031&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported to us by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.3.1, 15.2.3, 15.1.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/</id>
<published>2022-08-22T00:00:00+00:00</published>
<updated>2022-08-22T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.3.1, 15.2.3, 15.1.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Remote%20Command%20Execution%20via%20Github%20import&quot;&gt;Remote Command Execution via Github import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;remote-command-execution-via-github-import&quot;&gt;Remote Command Execution via Github import&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;371098 --&gt;

&lt;p&gt;A vulnerability in GitLab CE&#x2F;EE affecting all versions starting from 11.3.4 before 15.1.5, all versions starting from 15.2 before 15.2.3, all versions starting from 15.3 before 15.3.1 allows an an authenticated user to achieve remote code execution via the Import from GitHub API endpoint. This is a Critical severity issue (&lt;code&gt;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;,  9.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2884&quot;&gt;CVE-2022-2884&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab
installation against this vulnerability using the workaround outlined
below until you have time to upgrade.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;disable-github-import&quot;&gt;Disable GitHub import&lt;&#x2F;h4&gt;

&lt;p&gt;Login using an administrator account to your GitLab installation and perform the
following:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Click &quot;Menu&quot; -&amp;gt; &quot;Admin&quot;.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;Settings&quot; -&amp;gt; &quot;General&quot;.&lt;&#x2F;li&gt;
  &lt;li&gt;Expand the &quot;Visibility and access controls&quot; tab.&lt;&#x2F;li&gt;
  &lt;li&gt;Under &quot;Import sources&quot; disable the &quot;GitHub&quot; option.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;Save changes&quot;.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h3 id=&quot;verifying-the-workaround&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;In a browser window, login as any user.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;+&quot; on the top bar.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;New project&#x2F;repository&quot;.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;Import project&quot;.&lt;&#x2F;li&gt;
  &lt;li&gt;Verify that &quot;GitHub&quot; does not appear as an import option.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.3 released with tasks for managing your work and free GitOps features</title>
<release>15.3</release>
<link href='https://about.gitlab.com/releases/2022/08/22/gitlab-15-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/08/22/gitlab-15-3-released/</id>
<published>2022-08-22T00:00:00+00:00</published>
<updated>2022-08-22T00:00:00+00:00</updated>
<author>
<name>Amanda Rueda</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.3 with &lt;a href=&quot;#create-tasks-in-issues&quot;&gt;tasks in issues&lt;&#x2F;a&gt;, &lt;a href=&quot;#gitops-features-are-now-free&quot;&gt;free GitOps features&lt;&#x2F;a&gt;, &lt;a href=&quot;#maintain-saml-group-links-with-api&quot;&gt;SAML group link API maintenance&lt;&#x2F;a&gt;, &lt;a href=&quot;#define-password-complexity-requirements&quot;&gt;advanced password complexity requirements&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 63 improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;We thank the wider GitLab community for the 348 contributions they provided to GitLab 15.3! At GitLab, everyone can contribute and we couldn&#x27;t have done it without you!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.4 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_3&#x2F;15_3-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.2.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/08/01/gitlab-15-2-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/08/01/gitlab-15-2-2-released/</id>
<published>2022-08-01T00:00:00+00:00</published>
<updated>2022-08-01T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.2.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;07&#x2F;22&#x2F;gitlab-15-2-released&#x2F;&quot;&gt;this month&#x27;s 15.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;92641&quot;&gt;Add password complexity doc again&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;92941&quot;&gt;Use &lt;code&gt;CREATE OR REPLACE FUNCTION&lt;&#x2F;code&gt; to define vulnerability reads triggers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93050&quot;&gt;Fixes CI&#x2F;CD settings error when Secure Files feature flag is disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93171&quot;&gt;Resolve &quot;Illegal instruction in json.rb after upgrade to 15.2.0-ce&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93184&quot;&gt;Fix ES client for nil password&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93311&quot;&gt;Fix RescheduleBackfillImportedIssueSearchData migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93502&quot;&gt;Fix CI artifact sizes not logged for some runner endpoints&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93589&quot;&gt;Gracefully handle nil created_at values in CI pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;93611&quot;&gt;Upgrade Oj to v3.13.19 to fix a seg fault&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6230&quot;&gt;Gracefully handle blank CPU information&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6223&quot;&gt;Add security mirrors of GitLab projects&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 15.2.1, 15.1.4, and 15.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/07/28/security-release-gitlab-15-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/07/28/security-release-gitlab-15-2-1-released/</id>
<published>2022-07-28T00:00:00+00:00</published>
<updated>2022-07-28T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.2.1, 15.1.4, and 15.0.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;breaking-change&quot;&gt;Breaking change&lt;&#x2F;h2&gt;

&lt;p&gt;In July 2019 we fixed a vulnerability related to very large CI&#x2F;CD configuration files and the &lt;code&gt;ci_yaml_limit_size&lt;&#x2F;code&gt; feature flag was introduced as a way to disable the patch, if needed. We are now removing that feature flag as well, to remove the possibility of disabling the patch.&lt;&#x2F;p&gt;

&lt;p&gt;You are not affected by this change if the feature flag was not manually disabled. You can refer to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;feature_flags.html#check-if-a-feature-flag-is-enabled&quot;&gt;our documentation&lt;&#x2F;a&gt; for instructions on how to check the state of a feature flag.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;ve disabled this feature flag and like to maintain the existing behavior and avoid a breaking change, you can refer to our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;instance_limits.html#maximum-size-and-depth-of-cicd-configuration-yaml-files&quot;&gt;documentation&lt;&#x2F;a&gt; for instructions on how to configure the size of your CI&#x2F;CD configuration file from the rails console.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-leak-packagist-and-other-integration-access-tokens-by-changing-integration-url&quot;&gt;Maintainer can leak Packagist and other integration access tokens by changing integration URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#revoke-access-to-confidential-notes-todos&quot;&gt;Revoke access to confidential notes todos&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#pipeline-subscriptions-trigger-new-pipelines-with-the-wrong-author&quot;&gt;Pipeline subscriptions trigger new pipelines with the wrong author&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ability-to-gain-access-to-private-project-through-an-email-invite-by-using-other-users-email-address-as-an-unverified-secondary-email&quot;&gt;Ability to gain access to private project through an email invite by using other user&#x27;s email address as an unverified secondary email&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#import-via-git-protocol-allows-to-bypass-checks-on-repository&quot;&gt;Import via git protocol allows to bypass checks on repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthenticated-ip-allowlist-bypass-when-accessing-job-artifacts-through-gitlab-pages&quot;&gt;Unauthenticated IP allowlist bypass when accessing job artifacts through GitLab Pages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthenticated-access-to-victims-grafana-datasources-through-path-traversal&quot;&gt;Unauthenticated access to victims Grafana datasources through path traversal&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-users-can-filter-issues-by-contact-and-organization&quot;&gt;Unauthorized users can filter issues by contact and organization&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#malicious-maintainer-may-change-the-visibility-of-project-or-a-group&quot;&gt;Malicious Maintainer may change the visibility of project or a group&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-job-error-messages&quot;&gt;Stored XSS in job error messages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#enforced-group-mfa-can-be-bypassed-when-using-resource-owner-password-credentials-grant&quot;&gt;Enforced group MFA can be bypassed when using Resource Owner Password Credentials grant&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#non-project-members-can-view-public-projects-deploy-keys&quot;&gt;Non project members can view public project&#x27;s Deploy Keys&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#idor-in-project-with-jira-integration-leaks-project-owners-other-projects-jira-issues&quot;&gt;IDOR in project with Jira integration leaks project owner&#x27;s other projects Jira issues&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-bot-users-and-tokens-not-deleted-after-group-deletion&quot;&gt;Group Bot Users and Tokens not deleted after group deletion&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#email-invited-members-can-join-projects-even-after-the-member-lock-has-been-enabled&quot;&gt;Email invited members can join projects even after the member lock has been enabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#datadog-integration-returns-user-emails&quot;&gt;Datadog integration returns user emails&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;maintainer-can-leak-packagist-and-other-integration-access-tokens-by-changing-integration-url&quot;&gt;Maintainer can leak Packagist and other integration access tokens by changing integration URL&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;703 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.6 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. A malicious maintainer could exfiltrate an integration&#x27;s access token by modifying the integration URL such that authenticated requests are sent to an attacker controlled server. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 8.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2497&quot;&gt;CVE-2022-2497&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;revoke-access-to-confidential-notes-todos&quot;&gt;Revoke access to confidential notes todos&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;705 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 15.0 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. Membership changes are not reflected in TODO for confidential notes, allowing a former project members to read updates via TODOs. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2512&quot;&gt;CVE-2022-2512&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipeline-subscriptions-trigger-new-pipelines-with-the-wrong-author&quot;&gt;Pipeline subscriptions trigger new pipelines with the wrong author&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;642 --&gt;

&lt;p&gt;An issue in pipeline subscriptions in GitLab EE affecting all versions starting from 12.8 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 triggered new pipelines with the person who created the tag as the pipeline creator instead of the subscription&#x27;s author. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2498&quot;&gt;CVE-2022-2498&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ability-to-gain-access-to-private-project-through-an-email-invite-by-using-other-users-email-address-as-an-unverified-secondary-email&quot;&gt;Ability to gain access to private project through an email invite by using other user&#x27;s email address as an unverified secondary email&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;685 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible to gain access to a private project through an email invite by using other user&#x27;s email address as an unverified secondary email. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2326&quot;&gt;CVE-2022-2326&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;import-via-git-protocol-allows-to-bypass-checks-on-repository&quot;&gt;Import via git protocol allows to bypass checks on repository&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;715 --&gt;

&lt;p&gt;Insufficient validation in GitLab CE&#x2F;EE affecting all versions starting from 12.10 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows an authenticated and authorised user to import a project that includes branch names which are 40 hexadecimal characters, which could be abused in supply chain attacks where a victim pinned to a specific Git commit of the project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.2). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2417&quot;&gt;CVE-2022-2417&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-ip-allowlist-bypass-when-accessing-job-artifacts-through-gitlab-pages&quot;&gt;Unauthenticated IP allowlist bypass when accessing job artifacts through GitLab Pages&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;722 --&gt;

&lt;p&gt;An improper access control issue in GitLab EE affecting all versions starting from 12.0 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows an attacker to bypass IP allow-listing and download artifacts. This attack only bypasses IP allow-listing, proper permissions are still required. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2501&quot;&gt;CVE-2022-2501&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-access-to-victims-grafana-datasources-through-path-traversal&quot;&gt;Unauthenticated access to victims Grafana datasources through path traversal&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;701 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab was not performing correct authentication on Grafana API under specific conditions allowing unauthenticated users to perform queries through a path traversal vulnerability. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2531&quot;&gt;CVE-2022-2531&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-users-can-filter-issues-by-contact-and-organization&quot;&gt;Unauthorized users can filter issues by contact and organization&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;716 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 14.6 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1, allowed a project member to filter issues by contact and organization. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2539&quot;&gt;CVE-2022-2539&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;malicious-maintainer-may-change-the-visibility-of-project-or-a-group&quot;&gt;Malicious Maintainer may change the visibility of project or a group&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;708 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for malicious group or project maintainers to change their corresponding group or project visibility by crafting a malicious POST request. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2456&quot;&gt;CVE-2022-2456&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;suruli&quot;&gt;suruli&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-job-error-messages&quot;&gt;Stored XSS in job error messages&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;720 --&gt;

&lt;p&gt;A cross-site scripting issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. A stored XSS flaw in job error messages allows attackers to perform arbitrary actions on behalf of victims at client side. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2500&quot;&gt;CVE-2022-2500&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enforced-group-mfa-can-be-bypassed-when-using-resource-owner-password-credentials-grant&quot;&gt;Enforced group MFA can be bypassed when using Resource Owner Password Credentials grant&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;698 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for group members to bypass 2FA enforcement enabled at the group level by using Resource Owner Password Credentials grant to obtain an access token without using 2FA. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2303&quot;&gt;CVE-2022-2303&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;albatraoz&quot;&gt;albatraoz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-project-members-can-view-public-projects-deploy-keys&quot;&gt;Non project members can view public project&#x27;s Deploy Keys&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;724 --&gt;

&lt;p&gt;An improper access control check in GitLab CE&#x2F;EE affecting all versions starting from 13.7 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious authenticated user to view a public project&#x27;s Deploy Key&#x27;s public fingerprint and name when that key has write permission. Note that GitLab never asks for nor stores the private key. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2095&quot;&gt;CVE-2022-2095&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jimeno&quot;&gt;jimeno&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-in-project-with-jira-integration-leaks-project-owners-other-projects-jira-issues&quot;&gt;IDOR in project with Jira integration leaks project owner&#x27;s other projects Jira issues&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;702 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 13.10 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab&#x27;s Jira integration has an insecure direct object reference vulnerability that may be exploited by an attacker to leak Jira issues. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2499&quot;&gt;CVE-2022-2499&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-bot-users-and-tokens-not-deleted-after-group-deletion&quot;&gt;Group Bot Users and Tokens not deleted after group deletion&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;694 --&gt;

&lt;p&gt;A lack of cascading deletes in GitLab CE&#x2F;EE affecting all versions starting from 13.0 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1 allows a malicious Group Owner to retain a usable Group Access Token even after the Group is deleted, though the APIs usable by that token are limited. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2307&quot;&gt;CVE-2022-2307&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered by the JiHu team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;email-invited-members-can-join-projects-even-after-the-member-lock-has-been-enabled&quot;&gt;Email invited members can join projects even after the member lock has been enabled&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;718 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for email invited members to join a project even after the Group Owner has enabled the setting to prevent members from being added to projects in a group, if the invite was sent before the setting was enabled. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2459&quot;&gt;CVE-2022-2459&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;justas_b&quot;&gt;justas_b&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;datadog-integration-returns-user-emails&quot;&gt;Datadog integration returns user emails&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;704 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 9.3 before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. GitLab was returning contributor emails due to improper data handling in the Datadog integration. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.2). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2534&quot;&gt;CVE-2022-2534&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-bzip2&quot;&gt;Update bzip2&lt;&#x2F;h2&gt;

&lt;p&gt;The version of bzip2 has been updated to 1.0.8 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-exiftool&quot;&gt;Update exiftool&lt;&#x2F;h2&gt;

&lt;p&gt;The version of exiftool has been updated to 12.42 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.2 released with live wiki diagram previews and redesigned merge request reports</title>
<release>15.2</release>
<link href='https://about.gitlab.com/releases/2022/07/22/gitlab-15-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/07/22/gitlab-15-2-released/</id>
<published>2022-07-22T00:00:00+00:00</published>
<updated>2022-07-22T00:00:00+00:00</updated>
<author>
<name>Sam Kerr</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.2 with &lt;a href=&quot;#live-preview-diagrams-in-the-wiki-wysiwyg-editor&quot;&gt;Live preview diagrams in the wiki WYSIWYG editor&lt;&#x2F;a&gt;, &lt;a href=&quot;#incident-timeline&quot;&gt;Incident timelines&lt;&#x2F;a&gt;, &lt;a href=&quot;#group-and-subgroup-scan-execution-policies&quot;&gt;Group and subgroup scan execution policies&lt;&#x2F;a&gt;, &lt;a href=&quot;#change-failure-rate-chart-for-visualizing-software-stability&quot;&gt;Change failure rate chart for visualizing software stability&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 40+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.3 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_2&#x2F;15_2-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.1.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/07/19/gitlab-15-1-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/07/19/gitlab-15-1-3-released/</id>
<published>2022-07-19T00:00:00+00:00</published>
<updated>2022-07-19T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.1.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;06&#x2F;22&#x2F;gitlab-15-1-released&#x2F;&quot;&gt;this month&#x27;s 15.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;89936&quot;&gt;Add praefect list virtual storages subcommand documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;91630&quot;&gt;Fix flaky feature specs for &quot;user awards emoji&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;92178&quot;&gt;Fix flaky repository settings spec&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;91635&quot;&gt;Fix group access dropdown failure if no subgroups are available&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6192&quot;&gt;Fix worker processes not starting up due to 0 processes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6208&quot;&gt;Ensure Ruby platform is set globally for arm64 based operating systems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6210&quot;&gt;Adjust worker processes to use real CPUs instead of cores&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6212&quot;&gt;Set force_ruby_platform to true locally for Gitaly and GitLab Rails&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.1.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/07/04/gitlab-15-1-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/07/04/gitlab-15-1-2-released/</id>
<published>2022-07-04T00:00:00+00:00</published>
<updated>2022-07-04T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.1.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;06&#x2F;22&#x2F;gitlab-15-1-released&#x2F;&quot;&gt;this month&#x27;s 15.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;90282&quot;&gt;Refactor add populate commit permission migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;90448&quot;&gt;Resolve &quot;Gitlab doesn&#x27;t detect the deployment pods after K8s cluster upgrade to v1.22&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;90644&quot;&gt;Fix agent token modal&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;90707&quot;&gt;Geo Sites Form - Remove Beta Badge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;90751&quot;&gt;Update gitaly_cgroups metric name in docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;90760&quot;&gt;Geo: Update object storage replication documentation for GA&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;91282&quot;&gt;Resolve &quot;White screen of death on creating new project&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;91307&quot;&gt;Add support for object storage bucket prefixes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;91429&quot;&gt;Revert &quot;Merge branch &#x27;use-until_executed-for-ci-sync-events-workers&#x27; into &#x27;master&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1063&quot;&gt;Fix owner of public&#x2F;uploads directory in UBI-8 Sidekiq image&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.1.1, 15.0.4, and 14.10.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/06/30/critical-security-release-gitlab-15-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/06/30/critical-security-release-gitlab-15-1-1-released/</id>
<published>2022-06-30T00:00:00+00:00</published>
<updated>2022-06-30T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.1.1, 15.0.4, and 14.10.5 for GitLab Community Edition (CE) and Enterprise Edition (EE). &lt;em&gt;Please note, this critical release will also serve as our monthly security release for June&lt;&#x2F;em&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#remote-command-execution-via-project-imports&quot;&gt;Remote Command Execution via Project Imports&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-in-zentao-integration-affecting-self-hosted-instances-without-strict-csp&quot;&gt;XSS in ZenTao integration affecting self hosted instances without strict CSP&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-in-project-settings-page&quot;&gt;XSS in project settings page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unallowed-users-can-read-unprotected-ci-variables&quot;&gt;Unallowed users can read unprotected CI variables&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ip-allow-list-bypass-to-access-container-registries&quot;&gt;IP allow-list bypass to access Container Registries&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#2fa-status-is-disclosed-to-unauthenticated-users&quot;&gt;2FA status is disclosed to unauthenticated users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#idor-in-sentry-issues&quot;&gt;IDOR in sentry issues&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#reporters-can-manage-issues-in-error-tracking&quot;&gt;Reporters can manage issues in error tracking&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ci-variables-provided-to-runners-outside-of-a-group&#x27;s-restricted-ip-range&quot;&gt;CI variables provided to runners outside of a group&#x27;s restricted IP range&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-via-malicious-web-server-responses&quot;&gt;Regular Expression Denial of Service via malicious web server responses&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-read-for-conan-repository&quot;&gt;Unauthorized read for conan repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirect-vulnerability&quot;&gt;Open redirect vulnerability&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-labels-are-editable-through-subproject&quot;&gt;Group labels are editable through subproject&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#release-titles-visible-for-any-users-if-group-milestones-are-associated-with-any-project-releases&quot;&gt;Release titles visible for any users if group milestones are associated with any project releases&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#restrict-membership-by-email-domain-bypass&quot;&gt;Restrict membership by email domain bypass&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#job-information-is-leaked-to-users-who-previously-were-maintainers-via-the-runner-jobs-api-endpoint&quot;&gt;Job information is leaked to users who previously were maintainers via the Runner Jobs API endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;remote-command-execution-via-project-imports&quot;&gt;Remote Command Execution via Project Imports&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;695 --&gt;

&lt;p&gt;A critical issue has been discovered in GitLab affecting all versions starting from 14.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 where an authenticated user authorized to import projects could import a maliciously crafted project leading to remote code execution. This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 9.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2185&quot;&gt;CVE-2022-2185&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-zentao-integration-affecting-self-hosted-instances-without-strict-csp&quot;&gt;XSS in ZenTao integration affecting self hosted instances without strict CSP&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;676 --&gt;

&lt;p&gt;Insufficient sanitization in GitLab EE&#x27;s external issue tracker affecting all versions from 14.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to perform cross-site scripting when a victim clicks on a maliciously crafted ZenTao link. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2235&quot;&gt;CVE-2022-2235&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-project-settings-page&quot;&gt;XSS in project settings page&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;684 --&gt;

&lt;p&gt;A Stored Cross-Site Scripting vulnerability in the project settings page in GitLab CE&#x2F;EE affecting all versions from 14.4 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows an attacker to execute arbitrary JavaScript code in GitLab on a victim&#x27;s behalf. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2230&quot;&gt;CVE-2022-2230&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unallowed-users-can-read-unprotected-ci-variables&quot;&gt;Unallowed users can read unprotected CI variables&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;686 --&gt;

&lt;p&gt;An improper authorization issue in GitLab CE&#x2F;EE affecting all versions from 13.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to extract the value of an unprotected variable they know the name of in public projects or private projects they&#x27;re a member of. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2229&quot;&gt;CVE-2022-2229&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shell3c&quot;&gt;shell3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ip-allow-list-bypass-to-access-container-registries&quot;&gt;IP allow-list bypass to access Container Registries&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;679 --&gt;

&lt;p&gt;Incorrect authorization in GitLab EE affecting all versions from 10.7 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allowed an attacker already in possession of a valid Deploy Key or a Deploy Token to misuse it from any location to access Container Registries even when IP address restrictions were configured. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1983&quot;&gt;CVE-2022-1983&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was found internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;2fa-status-is-disclosed-to-unauthenticated-users&quot;&gt;2FA status is disclosed to unauthenticated users&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;675 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.4 before 14.10.5, all versions starting from 15.0 before 15.0.4, all versions starting from 15.1 before 15.1.1. GitLab reveals if a user has enabled two-factor authentication on their account in the HTML source, to unauthenticated users. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1963&quot;&gt;CVE-2022-1963&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;albatraoz&quot;&gt;albatraoz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-variables-provided-to-runners-outside-of-a-groups-restricted-ip-range&quot;&gt;CI variables provided to runners outside of a group&#x27;s restricted IP range&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;682 --&gt;

&lt;p&gt;Information exposure in GitLab EE affecting all versions from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access restrictions even if the GitLab Runner is calling from outside the allowed IP range. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2228&quot;&gt;CVE-2022-2228&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-in-sentry-issues&quot;&gt;IDOR in sentry issues&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;680 --&gt;

&lt;p&gt;An access control vulnerability in GitLab EE&#x2F;CE affecting all versions from 14.8 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows authenticated users to enumerate issues in non-linked sentry projects. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2243&quot;&gt;CVE-2022-2243&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reporters-can-manage-issues-in-error-tracking&quot;&gt;Reporters can manage issues in error tracking&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;680 --&gt;

&lt;p&gt;An improper authorization vulnerability in GitLab EE&#x2F;CE affecting all versions from 14.8 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows project memebers with reporter role to manage issues in project&#x27;s error tracking feature. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2244&quot;&gt;CVE-2022-2244&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-via-malicious-web-server-responses&quot;&gt;Regular Expression Denial of Service via malicious web server responses&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;671 --&gt;

&lt;p&gt;A Regular Expression Denial of Service vulnerability in GitLab CE&#x2F;EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1954&quot;&gt;CVE-2022-1954&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;afewgoats&quot;&gt;afewgoats&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-read-for-conan-repository&quot;&gt;Unauthorized read for conan repository&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;670 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.4 before 14.10.5, all versions starting from 15.0 before 15.0.4, all versions starting from 15.1 before 15.1.1. GitLab was leaking Conan packages names due to incorrect permissions verification. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2270&quot;&gt;CVE-2022-2270&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fushbey&quot;&gt;fushbey&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-vulnerability&quot;&gt;Open redirect vulnerability&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;687 --&gt;

&lt;p&gt;An open redirect vulnerability in GitLab EE&#x2F;CE affecting all versions from 11.1 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows redirect users to a malicious location. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2250&quot;&gt;CVE-2022-2250&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;stealthy&quot;&gt;stealthy&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-labels-are-editable-through-subproject&quot;&gt;Group labels are editable through subproject&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;683 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 8.13 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. Under certain conditions, using the REST API an unprivileged user was able to change labels description. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1999&quot;&gt;CVE-2022-1999&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;release-titles-visible-for-any-users-if-group-milestones-are-associated-with-any-project-releases&quot;&gt;Release titles visible for any users if group milestones are associated with any project releases&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;690 --&gt;

&lt;p&gt;An information disclosure vulnerability in GitLab EE affecting all versions from 12.5 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1, allows disclosure of release titles if group milestones are associated with any project releases. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2281&quot;&gt;CVE-2022-2281&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;restrict-membership-by-email-domain-bypass&quot;&gt;Restrict membership by email domain bypass&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;668 --&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 12.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1. In GitLab, if a group enables the setting to restrict access to users belonging to specific domains, that allow-list may be bypassed if a Maintainer uses the &#x27;Invite a group&#x27; feature to invite a group that has members that don&#x27;t comply with domain allow-list. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1981&quot;&gt;CVE-2022-1981&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;muthu_prakash&quot;&gt;muthu_prakash&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;job-information-is-leaked-to-users-who-previously-were-maintainers-via-the-runner-jobs-api-endpoint&quot;&gt;Job information is leaked to users who previously were maintainers via the Runner Jobs API endpoint&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;667 --&gt;

&lt;p&gt;Improper access control in the runner jobs API in GitLab CE&#x2F;EE affecting all versions prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows a previous maintainer of a project with a specific runner to access job and project meta data under certain conditions. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-2227&quot;&gt;CVE-2022-2227&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rack&quot;&gt;Update rack&lt;&#x2F;h2&gt;

&lt;p&gt;The version of rack has been updated to 2.2.3.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.1 released with SAML Group Sync and SLSA level 2 build artifact attestation</title>
<release>15.1</release>
<link href='https://about.gitlab.com/releases/2022/06/22/gitlab-15-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/06/22/gitlab-15-1-released/</id>
<published>2022-06-22T00:00:00+00:00</published>
<updated>2022-06-22T00:00:00+00:00</updated>
<author>
<name>Dov Hershkovitch</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.1 with &lt;a href=&quot;#saml-group-sync-for-self-managed-gitlab&quot;&gt;SAML Group Sync&lt;&#x2F;a&gt;, &lt;a href=&quot;#slsa-2-attestation-included-for-build-artifacts&quot;&gt;SLSA level 2 build artifact attestation&lt;&#x2F;a&gt;, &lt;a href=&quot;#link-to-included-cicd-configuration-from-the-pipeline-editor&quot;&gt;links to included CI&#x2F;CD configuration&lt;&#x2F;a&gt;, &lt;a href=&quot;#enhancing-visibility-into-value-stream-with-dora-metrics&quot;&gt;enhanced visibility into value stream with DORA metrics&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 30+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;Join us on June 23rd as we celebrate DevOps! GitLab co-founder and CEO, Sid Sijbrandij, will introduce best-selling author and DORA co-founder, Gene Kim. Gene will share his research and expectations for the future of DevOps then GitLab VP of Product, David DeSanto, will share how GitLab is evolving The One DevOps Platform to meet that future. We&#x27;ll also unveil a new program to support your career aspirations. You won&#x27;t want to miss this one-hour virtual event. &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;fifteen&quot;&gt;Reserve your seat&lt;&#x2F;a&gt; now!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.2 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_1&#x2F;15_1-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/06/16/gitlab-15-0-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/06/16/gitlab-15-0-3-released/</id>
<published>2022-06-16T00:00:00+00:00</published>
<updated>2022-06-16T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 15.0.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;05&#x2F;22&#x2F;gitlab-15-0-released&#x2F;&quot;&gt;this month&#x27;s 15.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88188&quot;&gt;Add GitLab agent image tag to install command&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;89033&quot;&gt;Resolve &quot;Add documentation for Opensearch Indexing paused.&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;89195&quot;&gt;Disconnect alternates when unlinking from a repository pool&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;89306&quot;&gt;Add version information for new fields in members API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6139&quot;&gt;Upgrade to bundler v2.3.15&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4635&quot;&gt;cgroups: Handle nil repo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4638&quot;&gt;catfile: Backport patches to fix leaking catfile processes&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 15.0.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/06/06/gitlab-15-0-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/06/06/gitlab-15-0-2-released/</id>
<published>2022-06-06T00:00:00+00:00</published>
<updated>2022-06-06T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 15.0.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;05&#x2F;22&#x2F;gitlab-15-0-released&#x2F;&quot;&gt;last month&#x27;s 15.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87851&quot;&gt;Restore DS_ANALYZER_NAME for deprecated jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87899&quot;&gt;Hide internal note checkbox on unsupported issuable types&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87904&quot;&gt;Fix drag and drop list item bugs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87983&quot;&gt;Move LFK scheduling out from EE check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88088&quot;&gt;Remove existing repository backups when creating a full backup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88132&quot;&gt;docs: Fix DS_DEFAULT_ANALYZERS variable docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88181&quot;&gt;Fix copy in what&#x27;s new entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88270&quot;&gt;Fix focus for linked issues input field &amp;amp; IDE cursor&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88423&quot;&gt;Fix issue description list item styling&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88486&quot;&gt;Include inherited owners when calculating User#solo_owned_groups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88509&quot;&gt;Add event type in audit event streaming&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88648&quot;&gt;Fix Service Ping payload hash key shadowing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88656&quot;&gt;Fix 500 on issues list page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88739&quot;&gt;Fix PG version mentioned for package upgrades&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88840&quot;&gt;Fix Advanced Search Opensearch detection&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;89191&quot;&gt;Update auto-deploy-image to v2.28.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6122&quot;&gt;Skip auto-restart of PG during reconfigure as part of pg-upgrade&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;1037&quot;&gt;UBI: fix gitlab-exporter artifact to include libpq&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 15.0.1, 14.10.4, and 14.9.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/06/01/critical-security-release-gitlab-15-0-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/06/01/critical-security-release-gitlab-15-0-1-released/</id>
<published>2022-06-01T00:00:00+00:00</published>
<updated>2022-06-01T00:00:00+00:00</updated>
<author>
<name>Nick Malcolm</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 15.0.1, 14.10.4, and 14.9.5 for GitLab Community Edition (CE) and Enterprise Edition (EE). &lt;em&gt;Please note, this critical release will also serve as our monthly security release for May.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released approximately one week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#account-take-over-via-scim-email-change&quot;&gt;Account take over via SCIM email change&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-jira-integration&quot;&gt;Stored XSS in Jira integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#quick-action-commands-susceptible-to-xss&quot;&gt;Quick action commands susceptible to XSS&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ip-allowlist-bypass-when-using-trigger-tokens&quot;&gt;IP allowlist bypass when using Trigger tokens&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ip-allowlist-bypass-when-using-project-deploy-tokens&quot;&gt;IP allowlist bypass when using Project Deploy Tokens&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-authorization-in-the-interactive-web-terminal&quot;&gt;Improper authorization in the Interactive Web Terminal&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#subgroup-member-can-list-members-of-parent-group&quot;&gt;Subgroup member can list members of parent group&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-member-lock-bypass&quot;&gt;Group member lock bypass&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;account-take-over-via-scim-email-change&quot;&gt;Account take over via SCIM email change&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;669 --&gt;

&lt;p&gt;An account takeover issue has been discovered in GitLab EE affecting all versions starting from 11.10 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. When group SAML SSO is configured, the SCIM feature (available only on Premium+ subscriptions) may allow any owner of a Premium group to invite arbitrary users through their username and email, then change those users&#x27; email addresses via SCIM to an attacker controlled email address and thus - in the absence of 2FA - take over those accounts. It is also possible for the attacker to change the display name and username of the targeted account. This is a critical severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 9.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1680&quot;&gt;CVE-2022-1680&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;p&gt;Self-managed administrators can check whether &lt;code&gt;group_saml&lt;&#x2F;code&gt; is enabled by reviewing &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#configuring-group-saml-on-a-self-managed-gitlab-instance&quot;&gt;&quot;Configuring Group SAML on a self-managed GitLab instance&quot;&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-jira-integration&quot;&gt;Stored XSS in Jira integration&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;674 --&gt;

&lt;p&gt;A Stored Cross-Site Scripting vulnerability in Jira integration in GitLab EE affecting all versions from 13.11 prior to 14.9.5, 14.10 prior to 14.10.4, and 15.0 prior to 15.0.1 allows an attacker to execute arbitrary JavaScript code in GitLab on a victim&#x27;s behalf via specially crafted Jira Issues. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1940&quot;&gt;CVE-2022-1940&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;quick-action-commands-susceptible-to-xss&quot;&gt;Quick action commands susceptible to XSS&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;673 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 15.0 before 15.0.1. Missing validation of input used in quick actions allowed an attacker to exploit XSS by injecting HTML in contact details. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1948&quot;&gt;CVE-2022-1948&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cryptopone&quot;&gt;cryptopone&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ip-allowlist-bypass-when-using-trigger-tokens&quot;&gt;IP allowlist bypass when using Trigger tokens&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;678 --&gt;

&lt;p&gt;Incorrect authorization in GitLab EE affecting all versions from 12.0 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1 allowed an attacker already in possession of a valid Project Trigger Token to misuse it from any location even when IP address restrictions were configured. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1935&quot;&gt;CVE-2022-1935&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ip-allowlist-bypass-when-using-project-deploy-tokens&quot;&gt;IP allowlist bypass when using Project Deploy Tokens&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;677 --&gt;

&lt;p&gt;Incorrect authorization in GitLab EE affecting all versions from 12.0 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1 allowed an attacker already in possession of a valid Project Deploy Token to misuse it from any location even when IP address restrictions were configured. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1936&quot;&gt;CVE-2022-1936&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This was reported by a customer through our Responsible Vulnerability Disclosure process.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-authorization-in-the-interactive-web-terminal&quot;&gt;Improper authorization in the Interactive Web Terminal&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;662 --&gt;

&lt;p&gt;When the feature is configured, improper authorization in the Interactive Web Terminal in GitLab CE&#x2F;EE affecting all versions from 11.3 prior to 14.9.5, 14.10 prior to 14.10.4, and 15.0 prior to 15.0.1 allows users with the Developer role to open terminals on other Developers&#x27; running jobs. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1944&quot;&gt;CVE-2022-1944&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;subgroup-member-can-list-members-of-parent-group&quot;&gt;Subgroup member can list members of parent group&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;672 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.8 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. It may be possible for a subgroup member to access the members list of their parent group. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1821&quot;&gt;CVE-2022-1821&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-member-lock-bypass&quot;&gt;Group member lock bypass&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;660 --&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 14.3 before 14.9.5, all versions starting from 14.10 before 14.10.4, all versions starting from 15.0 before 15.0.1. It may be possible for malicious group maintainers to add new members to a project within their group, through the REST API, even after their group owner enabled a setting to prevent members from being added to projects within that group. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1783&quot;&gt;CVE-2022-1783&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;salh4ckr&quot;&gt;salh4ckr&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Mattermost has been updated to 6.6.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus prior to 15.0.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 15.0 released with WYSIWYG for Wiki, container scanning in all tiers</title>
<release>15.0</release>
<link href='https://about.gitlab.com/releases/2022/05/22/gitlab-15-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/05/22/gitlab-15-0-released/</id>
<published>2022-05-22T00:00:00+00:00</published>
<updated>2022-05-22T00:00:00+00:00</updated>
<author>
<name>Kai Armstrong</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 15.0 with &lt;a href=&quot;#container-scanning-available-in-all-tiers&quot;&gt;container scanning in all tiers&lt;&#x2F;a&gt;, &lt;a href=&quot;#internal-notes&quot;&gt;internal notes&lt;&#x2F;a&gt;, &lt;a href=&quot;#link-external-organizations-and-contacts-to-issues&quot;&gt;better links to external organizations and contacts&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 40+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;Along with these exciting new features, there are a few &lt;a href=&quot;&#x2F;blog&#x2F;2022&#x2F;04&#x2F;18&#x2F;gitlab-releases-15-breaking-changes&#x2F;&quot;&gt;breaking changes in 15.0&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Want to learn more about where we&#x27;re headed from Product leadership? Register now for the &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;fifteen&quot;&gt;GitLab 15 launch event&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.1 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;15_0&#x2F;15_0-cover-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.10.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/05/16/gitlab-14-10-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/05/16/gitlab-14-10-3-released/</id>
<published>2022-05-16T00:00:00+00:00</published>
<updated>2022-05-16T00:00:00+00:00</updated>
<author>
<name>Graeme Gillies</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.10.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;04&#x2F;22&#x2F;gitlab-14-10-released&#x2F;&quot;&gt;this month&#x27;s 14.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;86551&quot;&gt;Resolve &quot;Batched background migrations - Add steal method&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;86614&quot;&gt;Add upgrade note from the 14.10 Release Post&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87088&quot;&gt;Add Git SSH &#x2F; Shell limits&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87164&quot;&gt;Fix assignee filtering on group&#x2F;project issues list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87648&quot;&gt;Fix gin index detection on routes table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;87374&quot;&gt;Fix gin index detection on background_migration&#x2F;project_namespaces&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6072&quot;&gt;Remove Geo database settings only if some services are enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6098&quot;&gt;Add object storage configuration key deprecations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;88016&quot;&gt;Add option to disable separated caches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;For multi-node deployments, this version &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.10.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/05/05/gitlab-14-10-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/05/05/gitlab-14-10-2-released/</id>
<published>2022-05-05T00:00:00+00:00</published>
<updated>2022-05-05T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.10.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;04&#x2F;22&#x2F;gitlab-14-10-released&#x2F;&quot;&gt;this month&#x27;s 14.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83917&quot;&gt;Fixes HTML browsing for CI artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85587&quot;&gt;Update CI job artifacts verification status&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85625&quot;&gt;What&#x27;s New 14.10&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85633&quot;&gt;Fix mappings errors for ES6.8&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85770&quot;&gt;Fix: unexpected escaped HTML tag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85779&quot;&gt;doc: Extend Gitaly &#x2F;tmp workaround to cover Git execution path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85796&quot;&gt;Add documentation for mr settings audit events part 1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85836&quot;&gt;Fix a broken image link in 14.10 What&#x27;s New&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85913&quot;&gt;Clarify cluster deletion behavior in APIs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;86102&quot;&gt;Resolve &quot;Fork relationship is not respected for certain projects&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;85888&quot;&gt;Add documentation for pending migration in 14.9&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6040&quot;&gt;Update deprecations for 15.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;6078&quot;&gt;Fix deprecation of gitlab_rails keys&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.10.1, 14.9.4, and 14.8.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/05/02/security-release-gitlab-14-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/05/02/security-release-gitlab-14-10-1-released/</id>
<published>2022-05-02T00:00:00+00:00</published>
<updated>2022-05-02T00:00:00+00:00</updated>
<author>
<name>Michael Henriksen</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.10.1, 14.9.4, and 14.8.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-access-control-in-cicd-cache-mechanism&quot;&gt;Improper access control in CI&#x2F;CD cache mechanism&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-on-ci-editor-and-ci-pipeline-detail-pages&quot;&gt;ReDoS on CI Editor and CI Pipeline detail pages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-with-developer-role-group-can-modify-protected-branches---allowed-to-merge-setting-on-imported-project&quot;&gt;User with developer role (group) can modify Protected branches -&amp;gt; Allowed to merge setting on imported project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#maintainer-can-execute-scheduled-ci-pipeline-as-another-user&quot;&gt;Maintainer can execute scheduled CI pipeline as another user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#missing-input-masking-on-sensitive-integration-properties&quot;&gt;Missing input masking on sensitive integration properties&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#api-discloses-issue-titles-of-limited-projects&quot;&gt;API discloses issue titles of limited projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#confidential-notes-disclosure&quot;&gt;Confidential notes disclosure&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-rack-attack-discriminator-for-authenticated_packages_api-with-a-deploy-token&quot;&gt;Improper rack-attack discriminator for &lt;code&gt;authenticated_packages_api&lt;&#x2F;code&gt; with a deploy token&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-access-control-in-project-members-only-wiki&quot;&gt;Improper access control in Project Members-only Wiki&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-project-member-can-access-trace-log-of-jobs-when-it-is-enabled&quot;&gt;Guest project member can access trace log of jobs when it is enabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-and-css-injection-in-pipeline-error-messages&quot;&gt;HTML and CSS injection in pipeline error messages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#forging-get-requests-through-and-denying-service-of-simple-pypi-api-endpoint&quot;&gt;Forging GET Requests through and Denying Service of Simple PyPi API Endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#missing-invalidation-of-markdown-cache-causes-potential-xss-payloads-to-persist&quot;&gt;Missing invalidation of Markdown cache causes potential XSS payloads to persist&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#conan-api-incorrectly-processes-jwt-encoded-personal-access-tokens&quot;&gt;Conan API incorrectly processes JWT-encoded Personal Access Tokens&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;improper-access-control-in-cicd-cache-mechanism&quot;&gt;Improper access control in CI&#x2F;CD cache mechanism&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;649 --&gt;

&lt;p&gt;Improper access control in the CI&#x2F;CD cache mechanism in GitLab CE&#x2F;EE affecting all versions from 1.0.2 before 14.8.6 allows a malicious actor with Developer privileges to perform cache poisoning leading to arbitrary code execution in protected branches. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 7.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1423&quot;&gt;CVE-2022-1423&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;wapiflapi&quot;&gt;wapiflapi&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-on-ci-editor-and-ci-pipeline-detail-pages&quot;&gt;ReDoS on CI Editor and CI Pipeline detail pages&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;641 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.9 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious text in the CI Editor and CI Pipeline details page allowing the attacker to cause uncontrolled resource consumption. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1510&quot;&gt;CVE-2022-1510&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;stunninglemon&quot;&gt;stunninglemon&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-with-developer-role-group-can-modify-protected-branches---allowed-to-merge-setting-on-imported-project&quot;&gt;User with developer role (group) can modify Protected branches -&amp;gt; Allowed to merge setting on imported project&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;636 --&gt;

&lt;p&gt;Improper input validation in GitLab CE&#x2F;EE affecting all versions from 8.12 prior to 14.8.6, all versions from 14.9.0 prior to 14.9.4, and 14.10.0 allows a Developer to read protected Group or Project CI&#x2F;CD variables by importing a malicious project. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1406&quot;&gt;CVE-2022-1406&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;justas_b&quot;&gt;@justas_b&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;maintainer-can-execute-scheduled-ci-pipeline-as-another-user&quot;&gt;Maintainer can execute scheduled CI pipeline as another user&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;658 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 9.2 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not performing correct authorizations on scheduled pipelines allowing a malicious user to run a pipeline in the context of another user. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1460&quot;&gt;CVE-2022-1460&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;peterl&quot;&gt;peterl&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-input-masking-on-sensitive-integration-properties&quot;&gt;Missing input masking on sensitive integration properties&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;646 --&gt;

&lt;p&gt;Missing input masking in GitLab CE&#x2F;EE affecting all versions starting from 1.0.2 before 14.8.6 causes potentially sensitive integration properties to be disclosed in the web interface. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1413&quot;&gt;CVE-2022-1413&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-discloses-issue-titles-of-limited-projects&quot;&gt;API discloses issue titles of limited projects&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;655 --&gt;

&lt;p&gt;Due to an insecure direct object reference vulnerability in Gitlab EE&#x2F;CE affecting all versions from 11.0 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1, an endpoint may reveal the issue title to a user who crafted an API call with the ID of the issue from a public project that restricts access to issue only to project members. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1352&quot;&gt;CVE-2022-1352&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-notes-disclosure&quot;&gt;Confidential notes disclosure&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;644 --&gt;

&lt;p&gt;It was possible to disclose details of confidential notes created via the API in Gitlab CE&#x2F;EE affecting all versions from 13.2 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1 if an unauthorised project member was tagged in the note. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-rack-attack-discriminator-for-authenticated_packages_api-with-a-deploy-token&quot;&gt;Improper rack-attack discriminator for &lt;code&gt;authenticated_packages_api&lt;&#x2F;code&gt; with a deploy token&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;652 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was incorrectly verifying throttling limits for authenticated package requests which resulted in limits not being enforced. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1428&quot;&gt;CVE-2022-1428&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-in-project-members-only-wiki&quot;&gt;Improper access control in Project Members-only Wiki&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;647 --&gt;

&lt;p&gt;Improper access control in GitLab CE&#x2F;EE affecting all versions starting from 8.12 before 14.8.6, all versions starting from 8.13 before 14.9.4, and all versions starting from 8.14 before 14.10.1 allows non-project members to access contents of Project Members-only Wikis via malicious CI jobs. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1417&quot;&gt;CVE-2022-1417&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;shells3c&quot;&gt;shells3c&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-project-member-can-access-trace-log-of-jobs-when-it-is-enabled&quot;&gt;Guest project member can access trace log of jobs when it is enabled&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;634 --&gt;

&lt;p&gt;An improper authorization issue has been discovered in GitLab CE&#x2F;EE affecting all versions prior to 14.8.6, all versions from 14.9.0 prior to 14.9.4, and 14.10.0, allowing Guest project members to access trace log of jobs when it is enabled. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1124&quot;&gt;CVE-2022-1124&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jimeno&quot;&gt;jimeno&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;html-and-css-injection-in-pipeline-error-messages&quot;&gt;HTML and CSS injection in pipeline error messages&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;645 --&gt;

&lt;p&gt;Missing sanitization of data in Pipeline error messages in GitLab CE&#x2F;EE affecting all versions starting from 1.0.2 before 14.8.6 allows for rendering of attacker controlled HTML tags and CSS styling. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1416&quot;&gt;CVE-2022-1416&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;forging-get-requests-through-and-denying-service-of-simple-pypi-api-endpoint&quot;&gt;Forging GET Requests through and Denying Service of Simple PyPi API Endpoint&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;659 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not correctly handling malicious requests to the PyPi API endpoint allowing the attacker to cause uncontrolled resource consumption. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1431&quot;&gt;CVE-2022-1431&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;iwis&quot;&gt;iwis&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-invalidation-of-markdown-cache-causes-potential-xss-payloads-to-persist&quot;&gt;Missing invalidation of Markdown cache causes potential XSS payloads to persist&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;654 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 14.4 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. Missing invalidation of Markdown caching causes potential payloads from a previously exploitable XSS vulnerability (CVE-2022-1175) to persist and execute. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1433&quot;&gt;CVE-2022-1433&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;stacksmashing&quot;&gt;stacksmashing&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;conan-api-incorrectly-processes-jwt-encoded-personal-access-tokens&quot;&gt;Conan API incorrectly processes JWT-encoded Personal Access Tokens&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;security&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;635 --&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.6 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1.  GitLab was not correctly authenticating a user that had some certain amount of information which allowed an user to authenticate without a personal access token. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1426&quot;&gt;CVE-2022-1426&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;firelizzard&quot;&gt;firelizzard&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-zlib&quot;&gt;Update Zlib&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Zlib has been updated to 1.2.12 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus prior to 14.8&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ipynbdiff&quot;&gt;Update Ipynbdiff&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Ipynbdiff has been updated to 0.4.5 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE prior to 14.10&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.10 released with individual compliance violation reporting and a UI for streaming audit events</title>
<release>14.10</release>
<link href='https://about.gitlab.com/releases/2022/04/22/gitlab-14-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/04/22/gitlab-14-10-released/</id>
<published>2022-04-22T00:00:00+00:00</published>
<updated>2022-04-22T00:00:00+00:00</updated>
<author>
<name>Brian Rhea</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 14.10 with &lt;a href=&quot;#compliance-report-individual-violation-reporting&quot;&gt;Compliance report individual violation reporting&lt;&#x2F;a&gt;, &lt;a href=&quot;#user-interface-for-streaming-audit-events&quot;&gt;a UI for streaming audit events&lt;&#x2F;a&gt;, &lt;a href=&quot;#gitlab-runner-operator-for-kubernetes&quot;&gt;GitLab Runner operator for Kubernetes&lt;&#x2F;a&gt;, &lt;a href=&quot;#escalating-manually-created-incidents&quot;&gt;escalating manually created incidents&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 25+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 15.0 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_10&#x2F;14_10-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.9.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/04/12/gitlab-14-9-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/04/12/gitlab-14-9-3-released/</id>
<published>2022-04-12T00:00:00+00:00</published>
<updated>2022-04-12T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.9.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;03&#x2F;22&#x2F;gitlab-14-9-released&#x2F;&quot;&gt;last month&#x27;s 14.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83435&quot;&gt;Change mp4 to image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;84318&quot;&gt;Fix null argument handling in background migration Rake task&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;84359&quot;&gt;Remove pending builds from the queue on conflict&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;84511&quot;&gt;Fix URL blocker when object storage enabled but type is disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;943&quot;&gt;Fixing regex on grep for cleanup function.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;946&quot;&gt;kubectl: set HOME to &#x2F;tmp&#x2F;kube, speed up kubectl&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;84685&quot;&gt;Revert Protected Environment group access inheritence&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.6.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/04/01/gitlab-14-6-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/04/01/gitlab-14-6-7-released/</id>
<published>2022-04-01T00:00:00+00:00</published>
<updated>2022-04-01T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.6.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;12&#x2F;22&#x2F;gitlab-14-6-released&#x2F;&quot;&gt;December&#x27;s 14.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5943&quot;&gt;Doc: Update repository signing key expriation date&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5979&quot;&gt;Update OpenSSL to v1.1.1n&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;README.html#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 14.9.2, 14.8.5, and 14.7.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/</id>
<published>2022-03-31T00:00:00+00:00</published>
<updated>2022-03-31T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;&lt;strong&gt;Updated 14:50 UTC 2022-04-01&lt;&#x2F;strong&gt; We have updated this blog post with &lt;a href=&quot;#script-to-identify-users-potentially-impacted-by-cve-2022-1162&quot;&gt;a script to be used by self-managed instance admins to identify user accounts potentially impacted by CVE-2022-1162&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Today we are releasing versions 14.9.2, 14.8.5, and 14.7.7 for GitLab Community Edition (CE) and Enterprise Edition (EE). &lt;em&gt;Please note, this critical release will also serve as our monthly security release for March.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;we-strongly-recommend-that-all-gitlab-installations-be-upgraded-to-one-of-these-versions-immediately&quot;&gt;We strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;h3&gt;

&lt;p&gt;These versions contain important security fixes. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#static-passwords-inadvertently-set-during-omniauth-based-registration&quot;&gt;Static passwords inadvertently set during OmniAuth-based registration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-notes&quot;&gt;Stored XSS in notes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-on-multi-word-milestone-reference&quot;&gt;Stored XSS on Multi-word milestone reference&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-caused-by-a-specially-crafted-rdoc-file&quot;&gt;Denial of service caused by a specially crafted RDoc file&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-pages-access-tokens-can-be-reused-on-multiple-domains&quot;&gt;GitLab Pages access tokens can be reused on multiple domains&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#gitlab-pages-uses-default-disabled-server-timeouts-and-a-weak-tcp-keep-alive-timeout&quot;&gt;GitLab Pages uses default (disabled) server Timeouts and a weak TCP Keep-Alive timeout&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#incorrect-include-in-pipeline-definition-exposes-masked-ci-variables-in-ui&quot;&gt;Incorrect include in pipeline definition exposes masked CI variables in UI&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-in-release-asset-link&quot;&gt;Regular expression denial of service in release asset link&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#latest-commit-details-from-private-projects-leaked-to-guest-users-via-merge-requests&quot;&gt;Latest Commit details from private projects leaked to guest users via Merge Requests&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#cicd-analytics-are-available-even-when-public-pipelines-are-disabled&quot;&gt;CI&#x2F;CD analytics are available even when public pipelines are disabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#absence-of-limit-for-the-number-of-tags-that-can-be-added-to-a-runner-can-cause-performance-issues&quot;&gt;Absence of limit for the number of tags that can be added to a runner can cause performance issues&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#client-dos-through-rendering-crafted-comments&quot;&gt;Client DoS through rendering crafted comments&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#blind-ssrf-through-repository-mirroring&quot;&gt;Blind SSRF Through Repository Mirroring&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypass-of-branch-restriction-in-asana-integration&quot;&gt;Bypass of branch restriction in Asana integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#readable-approval-rules-by-guest-user&quot;&gt;Readable approval rules by Guest user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redact-invalidurierror-error-messages&quot;&gt;Redact InvalidURIError error messages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-import-maps-members-created_by_id-users-based-on-source-user-id&quot;&gt;Project import maps members&#x27; created_by_id users based on source user ID&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;static-passwords-inadvertently-set-during-omniauth-based-registration&quot;&gt;Static passwords inadvertently set during OmniAuth-based registration&lt;&#x2F;h2&gt;

&lt;p&gt;A hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE&#x2F;EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts. This is a critical severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 9.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1162&quot;&gt;CVE-2022-1162&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; We executed a reset of GitLab.com passwords for a selected set of users as of 15:38 UTC. Our investigation shows no indication that users or accounts have been compromised but we’re taking precautionary measures for our users’ security.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-notes&quot;&gt;Stored XSS in notes&lt;&#x2F;h2&gt;

&lt;p&gt;Improper neutralization of user input in GitLab CE&#x2F;EE versions 14.4 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 allowed an attacker to exploit XSS by injecting HTML in notes. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1175&quot;&gt;CVE-2022-1175&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-on-multi-word-milestone-reference&quot;&gt;Stored XSS on Multi-word milestone reference&lt;&#x2F;h2&gt;

&lt;p&gt;Improper handling of user input in GitLab CE&#x2F;EE versions 8.3 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowed an attacker to exploit a stored XSS by abusing multi-word milestone references in issue descriptions, comments, etc. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1190&quot;&gt;CVE-2022-1190&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;ryhmnlfj&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-caused-by-a-specially-crafted-rdoc-file&quot;&gt;Denial of service caused by a specially crafted RDoc file&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service vulnerability when rendering RDoc files in GitLab CE&#x2F;EE versions 10 to 14.7.7, 14.8.0 to 14.8.5, and 14.9.0 to 14.9.2 allows an attacker to crash the GitLab web application with a maliciously crafted RDoc file. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1185&quot;&gt;CVE-2022-1185&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-pages-access-tokens-can-be-reused-on-multiple-domains&quot;&gt;GitLab Pages access tokens can be reused on multiple domains&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in GitLab Pages included with GitLab CE&#x2F;EE affecting all versions from 11.5 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowed an attacker to steal a user&#x27;s access token on an attacker-controlled private GitLab Pages website and reuse that token on the victim&#x27;s other private websites. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1148&quot;&gt;CVE-2022-1148&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ehhthing&quot;&gt;ehhthing&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-pages-uses-default-disabled-server-timeouts-and-a-weak-tcp-keep-alive-timeout&quot;&gt;GitLab Pages uses default (disabled) server Timeouts and a weak TCP Keep-Alive timeout&lt;&#x2F;h2&gt;

&lt;p&gt;A lack of appropriate timeouts in GitLab Pages included in GitLab CE&#x2F;EE all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows an attacker to cause unlimited resource consumption. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1121&quot;&gt;CVE-2022-1121&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;feistel&quot;&gt;feistel&lt;&#x2F;a&gt; for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-include-in-pipeline-definition-exposes-masked-ci-variables-in-ui&quot;&gt;Incorrect include in pipeline definition exposes masked CI variables in UI&lt;&#x2F;h2&gt;

&lt;p&gt;Missing filtering in an error message in GitLab CE&#x2F;EE affecting all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 exposed sensitive information when an include directive fails in the CI&#x2F;CD configuration. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1120&quot;&gt;CVE-2022-1120&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bdrich&quot;&gt;bdrich&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-in-release-asset-link&quot;&gt;Regular expression denial of service in release asset link&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab CE&#x2F;EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1100&quot;&gt;CVE-2022-1100&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;latest-commit-details-from-private-projects-leaked-to-guest-users-via-merge-requests&quot;&gt;Latest Commit details from private projects leaked to guest users via Merge Requests&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control in GitLab CE&#x2F;EE since version 10.7 allows a malicious actor to obtain details of the latest commit in a private project via Merge Requests under certain circumstances. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1193&quot;&gt;CVE-2022-1193&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;albatraoz&quot;&gt;albatraoz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cicd-analytics-are-available-even-when-public-pipelines-are-disabled&quot;&gt;CI&#x2F;CD analytics are available even when public pipelines are disabled&lt;&#x2F;h2&gt;

&lt;p&gt;An improper access control vulnerability in GitLab CE&#x2F;EE affecting all versions from 13.11 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows an unauthorized user to access pipeline analytics even when public pipelines are disabled. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1105&quot;&gt;CVE-2022-1105&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;absence-of-limit-for-the-number-of-tags-that-can-be-added-to-a-runner-can-cause-performance-issues&quot;&gt;Absence of limit for the number of tags that can be added to a runner can cause performance issues&lt;&#x2F;h2&gt;

&lt;p&gt;Adding a very large number of tags to a runner in GitLab CE&#x2F;EE affecting all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows an attacker to impact the performance of GitLab. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1099&quot;&gt;CVE-2022-1099&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;client-dos-through-rendering-crafted-comments&quot;&gt;Client DoS through rendering crafted comments&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DoS vulnerability was discovered in Gitlab CE&#x2F;EE versions 13.7 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2  allowed an attacker to trigger high CPU usage via a special crafted input added in Issues, Merge requests, Milestones, Snippets, Wiki pages, etc. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1174&quot;&gt;CVE-2022-1174&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;scaramouche31&quot;&gt;scaramouche31&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blind-ssrf-through-repository-mirroring&quot;&gt;Blind SSRF Through Repository Mirroring&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.1 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 where a blind SSRF attack through the repository mirroring feature was possible. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1188&quot;&gt;CVE-2022-1188&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jimeno&quot;&gt;jimeno&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-of-branch-restriction-in-asana-integration&quot;&gt;Bypass of branch restriction in Asana integration&lt;&#x2F;h2&gt;

&lt;p&gt;Incorrect authorization in the Asana integration&#x27;s branch restriction feature in all versions of GitLab CE&#x2F;EE starting from version 7.8.0 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 makes it possible to close Asana tasks from unrestricted branches. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0740&quot;&gt;CVE-2022-0740&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ooooooo_q&quot;&gt;ooooooo_q&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;readable-approval-rules-by-guest-user&quot;&gt;Readable approval rules by Guest user&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.2 before 14.7.7, all versions starting from 14.8 before 14.8.5, all versions starting from 14.9 before 14.9.2 that allowed for an unauthorised user to read the approval rules of a private project. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1189&quot;&gt;CVE-2022-1189&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redact-invalidurierror-error-messages&quot;&gt;Redact InvalidURIError error messages&lt;&#x2F;h2&gt;

&lt;p&gt;Missing sanitization of logged exception messages in all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 of GitLab CE&#x2F;EE causes potential sensitive values in invalid URLs to be logged. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1157&quot;&gt;CVE-2022-1157&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-import-maps-members-created_by_id-users-based-on-source-user-id&quot;&gt;Project import maps members&#x27; created_by_id users based on source user ID&lt;&#x2F;h2&gt;

&lt;p&gt;A business logic error in Project Import in GitLab CE&#x2F;EE versions 14.9 prior to 14.9.2, 14.8 prior to 14.8.5, and 14.0 prior to 14.7.7 under certain conditions caused imported projects to show an incorrect user in the &#x27;Access Granted&#x27; column in the project membership pages. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-1111&quot;&gt;CVE-2022-1111&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-commonmarker&quot;&gt;Update commonmarker&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;355752 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of commonmarker has been updated to &lt;code&gt;0.23.4&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-grafana&quot;&gt;Update Grafana&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;6729 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of Grafana has been updated to &lt;code&gt;7.5.15&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;issues&#x2F;6714 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of Mattermost has been updated to &lt;code&gt;6.4.2&lt;&#x2F;code&gt;, &lt;code&gt;6.3.5&lt;&#x2F;code&gt;, and &lt;code&gt;6.2.5&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-swagger&quot;&gt;Update Swagger&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;339696 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of Swagger has been updated to &lt;code&gt;4.0.0&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-python&quot;&gt;Update Python&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;3111 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of Python has been updated to &lt;code&gt;3.8.12&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&quot;&gt;GitLab Charts&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-go-proxyproto&quot;&gt;Update go-proxyproto&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-pages&#x2F;-&#x2F;issues&#x2F;699 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of go-proxyproto has been updated to &lt;code&gt;0.6.2&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Pages&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-devise&quot;&gt;Update Devise&lt;&#x2F;h2&gt;

&lt;!-- https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;357102 &#x2F;&#x2F;--&gt;

&lt;p&gt;The version of devise-two-factor has been updated to &lt;code&gt;4.0.2&lt;&#x2F;code&gt; in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of Gitlab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-security-updates&quot;&gt;Non-security updates&lt;&#x2F;h2&gt;

&lt;p&gt;14.7.7 and 14.8.5 include a non-security bug fix addressing Merge Request Approval Rules. The bug is not present in 14.9 releases.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;script-to-identify-users-potentially-impacted-by-cve-2022-1162&quot;&gt;Script to identify users potentially impacted by CVE-2022-1162&lt;&#x2F;h2&gt;

&lt;!-- Source: https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;production&#x2F;-&#x2F;snippets&#x2F;2282996 &#x2F;&#x2F;--&gt;

&lt;p&gt;GitLab has prepared a script which can be used by self-managed instance admins to identify user accounts potentially impacted by CVE-2022-1162.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;c1&quot;&gt;# This script identifies users who may have been impacted by &lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# CVE-2022-1162.&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# The list is not exhaustive and may not include attackers who have &lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# gained access and modified an account.&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# The START_DATE can be changed to the date a vulnerable version was&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# installed.&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# The result is a CSV printed to STDOUT containing potentially affected&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# users. The columns are:&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#   - User ID (integer)&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#   - Username (string)&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#   - User&#x27;s email (string)&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#   - Whether the user still has an automatically set password (boolean)&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# We strongly recommend that all GitLab installations be upgraded to&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# 14.9.2, 14.8.5, or 14.7.7 immediately.&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# See: https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2022&#x2F;03&#x2F;31&#x2F;critical-security-release-gitlab-14-9-2-released&#x2F;&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# To run the script, place this script into a file ie. &#x2F;tmp&#x2F;find-impacted-users.rb &lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# on your GitLab instance and then run the following command to execute the script:&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#     gitlab-rails runner &#x2F;tmp&#x2F;find-impacted-users.rb&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;#&lt;&#x2F;span&gt;
&lt;span class=&quot;no&quot;&gt;ActiveRecord&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;::&lt;&#x2F;span&gt;&lt;span class=&quot;no&quot;&gt;Base&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;connection&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;execute&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;set statement_timeout to 600000&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;

&lt;span class=&quot;no&quot;&gt;START_DATE&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;Time&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;utc&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;mi&quot;&gt;2022&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;mi&quot;&gt;1&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;mi&quot;&gt;20&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;

&lt;span class=&quot;n&quot;&gt;user_id&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;mi&quot;&gt;0&lt;&#x2F;span&gt;

&lt;span class=&quot;n&quot;&gt;csv&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;CSV&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;new&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;no&quot;&gt;STDOUT&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
&lt;span class=&quot;k&quot;&gt;begin&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;users&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;User&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;
        &lt;span class=&quot;nf&quot;&gt;joins&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;:identities&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;).&lt;&#x2F;span&gt;
        &lt;span class=&quot;nf&quot;&gt;where&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;users.created_at &amp;gt;= ?&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;START_DATE&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;).&lt;&#x2F;span&gt;
        &lt;span class=&quot;nf&quot;&gt;where&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;identities.created_at &amp;gt;= ?&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;START_DATE&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;).&lt;&#x2F;span&gt;
        &lt;span class=&quot;nf&quot;&gt;where&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;users.id &amp;gt; ?&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;user_id&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
          
    &lt;span class=&quot;n&quot;&gt;users&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;in_batches&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;of: &lt;&#x2F;span&gt;&lt;span class=&quot;mi&quot;&gt;250&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;).&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;each_record&lt;&#x2F;span&gt; &lt;span class=&quot;k&quot;&gt;do&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;|&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;user&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;|&lt;&#x2F;span&gt;
      &lt;span class=&quot;n&quot;&gt;csv&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;&amp;lt;&amp;lt;&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;user&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;id&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;user&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;username&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;user&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;email&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;user&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;password_automatically_set?&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt;
      &lt;span class=&quot;n&quot;&gt;user_id&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;user&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;id&lt;&#x2F;span&gt;
    &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;
&lt;span class=&quot;k&quot;&gt;rescue&lt;&#x2F;span&gt;
    &lt;span class=&quot;k&quot;&gt;retry&lt;&#x2F;span&gt;  
&lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;

&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;A &lt;code&gt;false&lt;&#x2F;code&gt; value in the &lt;code&gt;user.password_automatically_set?&lt;&#x2F;code&gt; column means that the user had overwritten the random password that was originally set when creating the user via an Omniauth method (e.g. OAuth, LDAP, or SAML). Double-check these accounts to ensure that this change was intentional and not the result of exploitation.&lt;&#x2F;p&gt;

&lt;p&gt;Out of an abundance of caution it is recommended to reset the passwords for all users returned by the script. Users where &lt;code&gt;password_automatically_set?&lt;&#x2F;code&gt; is &lt;code&gt;true&lt;&#x2F;code&gt; will not notice that the password reset happened and can continue logging in using OAuth, LDAP, or SAML. Those where the value is &lt;code&gt;false&lt;&#x2F;code&gt; can also keep logging in using those authentication methods, however the password they had set themselves will not work anymore.&lt;&#x2F;p&gt;

&lt;p&gt;Users created before the installation of GitLab 14.7.0 or after the update to GitLab 14.9.2, 14.8.5, or 14.7.7 are not affected and no actions are required.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab has conducted limited testing to validate this script. As such 
this script is provided AS-IS and GitLab makes no warranties of any
kind. GITLAB HEREBY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF 
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND 
NON-INFRINGEMENT.&lt;&#x2F;p&gt;

&lt;p&gt;After identifying potentially affected user accounts, it is recommended to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;reset_user_password.html#reset-a-users-password&quot;&gt;reset a user&#x27;s password&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.7.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/24/gitlab-14-7-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/24/gitlab-14-7-6-released/</id>
<published>2022-03-24T00:00:00+00:00</published>
<updated>2022-03-24T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.7.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;01&#x2F;22&#x2F;gitlab-14-7-released&#x2F;&quot;&gt;this month&#x27;s 14.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82084&quot;&gt;Detect and fix artifacts with backfilled expire_at&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82681&quot;&gt;Enable feature flags to resume artifact removal on self-managed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5979&quot;&gt;Update OpenSSL to v1.1.1n&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;README.html#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.9.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/23/gitlab-14-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/23/gitlab-14-9-1-released/</id>
<published>2022-03-23T00:00:00+00:00</published>
<updated>2022-03-23T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.9.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;03&#x2F;22&#x2F;gitlab-14-9-released&#x2F;&quot;&gt;this month&#x27;s 14.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83101&quot;&gt;Fix backups not working when feature_flags table does not exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83451&quot;&gt;Add deprecation notices that missed the 14.9.0 release tag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83213&quot;&gt;Alias user_email_lookup_limit to search_rate_limit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83302&quot;&gt;Reverts &#x27;353995-feature-flag-enable-geo_job_artifact_replication&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;83309&quot;&gt;Geo Upgrade warning for 14.9&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;README.html#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.9 released with epic to epic linking and integrated security training</title>
<release>14.9</release>
<link href='https://about.gitlab.com/releases/2022/03/22/gitlab-14-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/22/gitlab-14-9-released/</id>
<published>2022-03-22T00:00:00+00:00</published>
<updated>2022-03-22T00:00:00+00:00</updated>
<author>
<name>Brian Rhea</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 14.9 with &lt;a href=&quot;#link-an-epic-to-another-epic&quot;&gt;epic to epic linking&lt;&#x2F;a&gt;, &lt;a href=&quot;#integrated-security-training&quot;&gt;integrated security training&lt;&#x2F;a&gt;, &lt;a href=&quot;#new-design-for-the-environments-page&quot;&gt;a new Environments page design&lt;&#x2F;a&gt;, &lt;a href=&quot;#rule-mode-for-scan-result-policies&quot;&gt;rule mode for scan result policies&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 40+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.10 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_9&#x2F;14_9-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.8.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/16/gitlab-14-8-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/16/gitlab-14-8-4-released/</id>
<published>2022-03-16T00:00:00+00:00</published>
<updated>2022-03-16T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.8.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;02&#x2F;22&#x2F;gitlab-14-8-released&#x2F;&quot;&gt;this month&#x27;s 14.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81886&quot;&gt;Pass issue ID to merge request creation form&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82084&quot;&gt;Detect and fix artifacts with backfilled expire_at&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82681&quot;&gt;Enable feature flags to resume artifact removal on self-managed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5979&quot;&gt;Update OpenSSL to v1.1.1n&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Update OpenSSL to &lt;code&gt;1.1.1k-1+deb11u2&lt;&#x2F;code&gt; for Container Native GitLab&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.8.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/15/gitlab-14-8-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/15/gitlab-14-8-3-released/</id>
<published>2022-03-15T00:00:00+00:00</published>
<updated>2022-03-15T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.8.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;02&#x2F;22&#x2F;gitlab-14-8-released&#x2F;&quot;&gt;last month&#x27;s 14.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81022&quot;&gt;Ensure cleanup job artifacts task does not include pipeline artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81548&quot;&gt;Be specific that default.md is not case-sensitive&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82060&quot;&gt;Fix handling of resource iteration events when deleting a User&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82340&quot;&gt;Fix rake task to setup the Geo tracking database&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82817&quot;&gt;Fix startup crash in Puma single mode&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82383&quot;&gt;Removes advice not to mix p&#x2F;c with compliance pipes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;82418&quot;&gt;Move postcss to dependencies&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5943&quot;&gt;Doc: Update repository signing key expriation date&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.7.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/09/gitlab-14-7-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/09/gitlab-14-7-5-released/</id>
<published>2022-03-09T00:00:00+00:00</published>
<updated>2022-03-09T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.7.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;01&#x2F;22&#x2F;gitlab-14-7-released&#x2F;&quot;&gt;the 14.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79637&quot;&gt;Change to truncate table before adding finding_link_url_idx&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81022&quot;&gt;Ensure cleanup job artifacts task does not include pipeline artifacts&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.6.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/03/02/gitlab-14-6-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/03/02/gitlab-14-6-6-released/</id>
<published>2022-03-02T00:00:00+00:00</published>
<updated>2022-03-02T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.6.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;12&#x2F;22&#x2F;gitlab-14-6-released&#x2F;&quot;&gt;14.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;78479&quot;&gt;Resolve &quot;Imports fail in 14.5.2 fail with HTTParty::UnsupportedURIScheme error&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;80280&quot;&gt;Fix Geo checksummable check failing when file is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81022&quot;&gt;Ensure cleanup job artifacts task does not include pipeline artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5861&quot;&gt;Ensure EE services are added when gitlab-ee::config recipe is included&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 14.8.2, 14.7.4, and 14.6.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/02/25/critical-security-release-gitlab-14-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/02/25/critical-security-release-gitlab-14-8-2-released/</id>
<published>2022-02-25T00:00:00+00:00</published>
<updated>2022-02-25T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;&lt;strong&gt;Updated 00:00 UTC 2022-04-11&lt;&#x2F;strong&gt;
We have clarified the &lt;a href=&quot;#hotpatch-for-runner-registration-token-disclosure-through-quick-actions&quot;&gt;hotpatch instructions for self-managed instances running select versions older than 14.6&lt;&#x2F;a&gt; related to the use of &lt;code&gt;token-prefix-patch&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Updated 16:40 UTC 2022-03-04&lt;&#x2F;strong&gt;
If you are using Kubernetes runners, you will be required to manually update the Helm chart values with the new registration token. More information about updating the values can be found here: &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;kubernetes.html#store-registration-tokens-or-runner-tokens-in-secrets&quot;&gt;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;kubernetes.html#store-registration-tokens-or-runner-tokens-in-secrets&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Updated 00:00 UTC 2022-02-26&lt;&#x2F;strong&gt;
We have updated this blog post with &lt;a href=&quot;#hotpatch-for-runner-registration-token-disclosure-through-quick-actions&quot;&gt;hotpatch instructions for self-managed instances running select versions older than 14.6&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;we-strongly-recommend-that-all-gitlab-installations-be-upgraded-to-one-of-these-versions-immediately&quot;&gt;We strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;strong&gt;Note regarding Runner registration token disclosure:&lt;&#x2F;strong&gt; This update will reset runner registration tokens for your group and projects. If you use an automated process (scripts that encode the value of the registration token) to register runners, this update will break that process. However, it should have no affect on previously registered runners. If applicable to your processes, your administrator may choose to save a backup of your existing tokens which can later help identify potentially malicious registration tokens, or rogue runners. For example, if an unauthorized actor tries to register a runner using one of the revoked tokens, knowing that value will help admins monitor that type of activity.&lt;&#x2F;p&gt;

&lt;p&gt;Today we are releasing versions 14.8.2, 14.7.4, and 14.6.5 for GitLab Community Edition (CE) and Enterprise Edition (EE). &lt;em&gt;Please note, this critical release will also serve as our monthly security release for February.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#runner-registration-token-disclosure-through-quick-actions&quot;&gt;Runner registration token disclosure through Quick Actions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unprivileged-users-can-add-other-users-to-groups-through-an-api-endpoint&quot;&gt;Unprivileged users can add other users to groups through an API endpoint&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#inaccurate-display-of-snippet-contents-can-be-potentially-misleading-to-users&quot;&gt;Inaccurate display of Snippet contents can be potentially misleading to users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#environment-variables-can-be-leaked-via-the-sendmail-delivery-method&quot;&gt;Environment variables can be leaked via the sendmail delivery method&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthenticated-user-enumeration-on-graphql-api&quot;&gt;Unauthenticated user enumeration on GraphQL API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#adding-a-mirror-with-ssh-credentials-can-leak-password&quot;&gt;Adding a mirror with SSH credentials can leak password&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-via-user-comments&quot;&gt;Denial of Service via user comments&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;runner-registration-token-disclosure-through-quick-actions&quot;&gt;Runner registration token disclosure through Quick Actions&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.10 before 14.6.5, all versions starting from 14.7 before 14.7.4, all versions starting from 14.8 before 14.8.2. An unauthorized user was able to steal runner registration tokens through an information disclosure vulnerability using quick actions commands. This is a critical severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 9.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0735&quot;&gt;CVE-2022-0735&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xn3va&quot;&gt;0xn3va&lt;&#x2F;a&gt; for the report on our HackerOne bug bounty program which sparked the internal investigation that uncovered this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unprivileged-users-can-add-other-users-to-groups-through-an-api-endpoint&quot;&gt;Unprivileged users can add other users to groups through an API endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under certain conditions, GitLab REST API may allow unprivileged users to add other users to groups even if that is not possible to do through the Web UI. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0549&quot;&gt;CVE-2022-0549&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported to us by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;inaccurate-display-of-snippet-contents-can-be-potentially-misleading-to-users&quot;&gt;Inaccurate display of Snippet contents can be potentially misleading to users&lt;&#x2F;h2&gt;

&lt;p&gt;Inaccurate display of Snippet files containing special characters in all versions of GitLab CE&#x2F;EE allows an unauthorized actor to create Snippets with misleading content, which could trick unsuspecting users into executing arbitrary commands. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0751&quot;&gt;CVE-2022-0751&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;st4nly0n&quot;&gt;st4nly0n&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;This fix modifies our GraphQL API by adding the &lt;code&gt;hasUnretrievableBlobs&lt;&#x2F;code&gt; field to the &lt;code&gt;SnippetBlobConnection&lt;&#x2F;code&gt; type. It indicates if the snippet has unretrievable blobs. Please be aware of deploying this change if you use multi-version deployments. We encourage users to include this patch in all deployed server instances.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;environment-variables-can-be-leaked-via-the-sendmail-delivery-method&quot;&gt;Environment variables can be leaked via the sendmail delivery method&lt;&#x2F;h2&gt;

&lt;p&gt;Improper input validation in all versions of GitLab CE&#x2F;EE using sendmail to send emails allowed an unauthorized actor to steal environment variables via specially crafted email addresses. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0741&quot;&gt;CVE-2022-0741&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-user-enumeration-on-graphql-api&quot;&gt;Unauthenticated user enumeration on GraphQL API&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration by unauthenticated users through the GraphQL API. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-4191&quot;&gt;CVE-2021-4191&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mungsul&quot;&gt;mungsul&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;todb-r7&quot;&gt;todb-r7&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;adding-a-mirror-with-ssh-credentials-can-leak-password&quot;&gt;Adding a mirror with SSH credentials can leak password&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 14.6 before 14.6.5, all versions starting from 14.7 before 14.7.4, and all versions starting from 14.8 before 14.8.2. GitLab was leaking user passwords when adding mirrors with SSH credentials under specific conditions. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.2). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0738&quot;&gt;CVE-2022-0738&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-via-user-comments&quot;&gt;Denial of Service via user comments&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 8.15. It was possible to trigger a DOS by using the math feature with a specific formula in issue comments. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0489&quot;&gt;CVE-2022-0489&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cancerz&quot;&gt;cancerz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-grafana&quot;&gt;Update Grafana&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Grafana has been updated to 7.5.12 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Mattermost has been updated to 6.3.3 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus prior to 14.8.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;hotpatch-for-runner-registration-token-disclosure-through-quick-actions&quot;&gt;Hotpatch for Runner registration token disclosure through Quick Actions&lt;&#x2F;h2&gt;

&lt;p&gt;For self-managed instances not on versions 14.6 or greater, GitLab has &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;tree&#x2F;14.8.2-Security-Hotpatches&#x2F;config&#x2F;patches&#x2F;gitlab-rails&quot;&gt;published patches&lt;&#x2F;a&gt; which can be applied to
mitigate the &lt;a href=&quot;#runner-registration-token-disclosure-through-quick-actions&quot;&gt;Runner registration token disclosure through Quick Actions&lt;&#x2F;a&gt; vulnerability. These patches should be considered temporary. Any instances of GitLab should be upgraded to a patched version of 14.8.2, 14.7.4, or 14.6.5 as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;Patches named &lt;code&gt;security-patch-$VERSION.patch&lt;&#x2F;code&gt; close the vulnerability which exposed runner registration tokens via quick action commands, and
patches named &lt;code&gt;token-prefix-patch-$VERSION.patch&lt;&#x2F;code&gt; can be applied to automate a one-time rotation of all project &amp;amp; group registration tokens.&lt;&#x2F;p&gt;

&lt;p&gt;Version-specific patches are available for GitLab releases 14.5.4, 14.4.5, 14.3.6, 14.2.7, 14.1.8, 14.0.12 and 13.12.15.&lt;&#x2F;p&gt;

&lt;p&gt;To apply the desired patch(es) on a GitLab omnibus instance, first retrieve the appropriate patchfile(s) based on the version of your instance,
and then follow the below commands (example here uses patches for 14.0.12):&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;&lt;span class=&quot;nb&quot;&gt;sudo &lt;&#x2F;span&gt;su
&lt;span class=&quot;nb&quot;&gt;cd&lt;&#x2F;span&gt; ~
curl &lt;span class=&quot;nt&quot;&gt;-JLO&lt;&#x2F;span&gt; https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;raw&#x2F;14.8.2-Security-Hotpatches&#x2F;config&#x2F;patches&#x2F;gitlab-rails&#x2F;security-patch-14.0.patch
curl &lt;span class=&quot;nt&quot;&gt;-JLO&lt;&#x2F;span&gt; https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;raw&#x2F;14.8.2-Security-Hotpatches&#x2F;config&#x2F;patches&#x2F;gitlab-rails&#x2F;token-prefix-patch-14.0.patch
&lt;span class=&quot;nb&quot;&gt;cd&lt;&#x2F;span&gt; &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;service&#x2F;gitlab-rails&#x2F;
patch &lt;span class=&quot;nt&quot;&gt;-p1&lt;&#x2F;span&gt; &amp;lt;  ~&#x2F;security-patch-14.0.patch
patch &lt;span class=&quot;nt&quot;&gt;-p1&lt;&#x2F;span&gt; &amp;lt; ~&#x2F;token-prefix-patch-14.0.patch
gitlab-ctl restart
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;After applying the &lt;code&gt;token-prefix-patch&lt;&#x2F;code&gt;, instances with a small number of groups and projects (under 10,000) can optionally use the following rails console commands to immediately reset all project &amp;amp; group runner registration tokens:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;no&quot;&gt;Project&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;in_batches&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;of: &lt;&#x2F;span&gt;&lt;span class=&quot;mi&quot;&gt;100&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;).&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;update_all&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;runners_token_encrypted: &lt;&#x2F;span&gt;&lt;span class=&quot;kp&quot;&gt;nil&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
&lt;span class=&quot;no&quot;&gt;Group&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;in_batches&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;of: &lt;&#x2F;span&gt;&lt;span class=&quot;mi&quot;&gt;100&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;).&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;update_all&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;runners_token_encrypted: &lt;&#x2F;span&gt;&lt;span class=&quot;kp&quot;&gt;nil&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;GitLab has conducted limited testing to validate these patches. As such these patches are provided AS-IS and GitLab makes no warranties of any kind. GITLAB HEREBY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.8.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/02/23/gitlab-14-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/02/23/gitlab-14-8-1-released/</id>
<published>2022-02-23T00:00:00+00:00</published>
<updated>2022-02-23T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.8.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;02&#x2F;22&#x2F;gitlab-14-8-released&#x2F;&quot;&gt;this month&#x27;s 14.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;80919&quot;&gt;Fix toolbar buttons in Markdown field&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81006&quot;&gt;Revert: Link by commit and name for pipeline&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81098&quot;&gt;Stop backup files from requiring directories to exist when skipped&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;81099&quot;&gt;Allow assigning users with private profiles with quick-actions&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.8 released with new SSH key types and security approval policies</title>
<release>14.8</release>
<link href='https://about.gitlab.com/releases/2022/02/22/gitlab-14-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/02/22/gitlab-14-8-released/</id>
<published>2022-02-22T00:00:00+00:00</published>
<updated>2022-02-22T00:00:00+00:00</updated>
<author>
<name>Brian Rhea</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 14.8 with &lt;a href=&quot;#support-for-ecdsa-sk-and-ed25519-sk-ssh-keys&quot;&gt;new SSH key types&lt;&#x2F;a&gt;, &lt;a href=&quot;#security-approval-policies&quot;&gt;security approval policies&lt;&#x2F;a&gt;, &lt;a href=&quot;#auto-completion-of-keywords-in-the-pipeline-editor&quot;&gt;pipeline editor autocomplete&lt;&#x2F;a&gt;, &lt;a href=&quot;#user-impersonation-audit-events-for-groups&quot;&gt;impersonation audit events&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 25+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.9 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_8&#x2F;14_8-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.7.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/02/14/gitlab-14-7-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/02/14/gitlab-14-7-3-released/</id>
<published>2022-02-14T00:00:00+00:00</published>
<updated>2022-02-14T00:00:00+00:00</updated>
<author>
<name>Ahmad Tolba</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.7.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;01&#x2F;22&#x2F;gitlab-14-7-released&#x2F;&quot;&gt;this month&#x27;s 14.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79868&quot;&gt;Properly exclude pending_destruction packages when creating one&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;80278&quot;&gt;Update Import&#x2F;Export ObjectBuilder for merge requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;80280&quot;&gt;Fix Geo checksummable check failing when file is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;80379&quot;&gt;Update GitHub PRs Importer to force update repository&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5872&quot;&gt;Update Mattermost to 6.2.2 (GitLab 14.7)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5860&quot;&gt;Specify fetch_workers config option to omnibus&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5902&quot;&gt;Update Omnibus to v8.2.1.7&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.7.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/02/08/gitlab-14-7-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/02/08/gitlab-14-7-2-released/</id>
<published>2022-02-08T00:00:00+00:00</published>
<updated>2022-02-08T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.7.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2022&#x2F;01&#x2F;22&#x2F;gitlab-14-7-released&#x2F;&quot;&gt;this month&#x27;s 14.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;78733&quot;&gt;Create 14.7 What&#x27;s New entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;78737&quot;&gt;Fix cluster integration HTTP adapter&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;78966&quot;&gt;Revert &quot;Merge branch &#x27;wc-gitaly-keepalive-limit&#x27; into &#x27;master&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79043&quot;&gt;Fix broken mermaid diagrams&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79258&quot;&gt;GitLab Version - CE Admin Dashboard [RUN ALL RSPEC] [RUN AS-IF-FOSS]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79303&quot;&gt;Geo: Fix verification failures of remote stored files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79388&quot;&gt;Update to ruby-magic v0.5.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;79469&quot;&gt;Geo: Fix reverify object stored files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5848&quot;&gt;Update PG runtime conf before restarting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5861&quot;&gt;Ensure EE services are added when gitlab-ee::config recipe is included&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.7.1, 14.6.4, and 14.5.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/02/03/security-release-gitlab-14-7-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/02/03/security-release-gitlab-14-7-1-released/</id>
<published>2022-02-03T00:00:00+00:00</published>
<updated>2022-02-03T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.7.1, 14.6.4, and 14.5.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-post-requests-via-special-html-attributes-in-jupyter-notebooks&quot;&gt;Arbitrary POST requests via special HTML attributes in Jupyter Notebooks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dns-rebinding-vulnerability-in-irker-irc-gateway-integration&quot;&gt;DNS Rebinding vulnerability in Irker IRC Gateway integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#missing-certificate-validation-for-external-ci-services&quot;&gt;Missing certificate validation for external CI services&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#blind-ssrf-through-project-import&quot;&gt;Blind SSRF Through Project Import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#open-redirect-vulnerability-in-jira-integration&quot;&gt;Open redirect vulnerability in Jira Integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#issue-link-was-disclosing-the-linked-issue&quot;&gt;Issue link was disclosing the linked issue&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#service-desk-email-accessible-by-project-non-members&quot;&gt;Service Desk email accessible by project non-members&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#authenticated-users-can-search-other-users-by-their-private-email&quot;&gt;Authenticated users can search other users by their private email&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#external-status-checks-can-be-accepted-by-users-below-developer-access-if-the-user-is-either-author-or-assignee-of-the-target-merge-request&quot;&gt;&quot;External status checks&quot; can be accepted by users below developer access if the user is either author or assignee of the target merge request&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#deleting-packages-in-bulk-from-package-registries-may-cause-table-locks&quot;&gt;Deleting packages in bulk from package registries may cause table locks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#autocomplete-enabled-on-specific-pages&quot;&gt;Autocomplete enabled on specific pages&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#possible-ssrf-due-to-not-blocking-shared-address-space&quot;&gt;Possible SSRF due to not blocking shared address space&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#system-notes-reveals-private-project-path-when-issue-is-moved-to-a-public-project&quot;&gt;System notes reveals private project path when Issue is moved to a public project&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#timeout-for-pages-using-markdown&quot;&gt;Timeout for pages using Markdown&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#certain-branch-names-could-not-be-protected&quot;&gt;Certain branch names could not be protected&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;arbitrary-post-requests-via-special-html-attributes-in-jupyter-notebooks&quot;&gt;Arbitrary POST requests via special HTML attributes in Jupyter Notebooks&lt;&#x2F;h2&gt;

&lt;p&gt;Missing sanitization of HTML attributes in Jupyter notebooks in all versions of GitLab CE&#x2F;EE since version 14.5 allows an attacker to perform arbitrary HTTP POST requests on a user&#x27;s behalf leading to potential account takeover. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0427&quot;&gt;CVE-2022-0427&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dns-rebinding-vulnerability-in-irker-irc-gateway-integration&quot;&gt;DNS Rebinding vulnerability in Irker IRC Gateway integration&lt;&#x2F;h2&gt;

&lt;p&gt;A DNS rebinding vulnerability in the Irker IRC Gateway integration in all versions of GitLab CE&#x2F;EE since version 7.9 allows an attacker to trigger Server Side Request Forgery (SSRF) attacks. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0425&quot;&gt;CVE-2022-0425&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-certificate-validation-for-external-ci-services&quot;&gt;Missing certificate validation for external CI services&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab does not validate SSL certificates for some of external CI services which makes it possible to perform MitM attacks on connections to these external services. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0123&quot;&gt;CVE-2022-0123&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blind-ssrf-through-project-import&quot;&gt;Blind SSRF Through Project Import&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability was discovered in GitLab starting with version 10.5. GitLab was vulnerable to a blind SSRF attack through the Project Import feature. . This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:L&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0136&quot;&gt;CVE-2022-0136&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;no1zy&quot;&gt;no1zy&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-vulnerability-in-jira-integration&quot;&gt;Open redirect vulnerability in Jira Integration&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered affecting GitLab versions prior to 13.5. An open redirect vulnerability was fixed in GitLab integration with Jira that a could cause the web application to redirect the request to the attacker specified URL. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0283&quot;&gt;CVE-2022-0283&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-link-was-disclosing-the-linked-issue&quot;&gt;Issue link was disclosing the linked issue&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control allowed for project non-members to retrieve issue details when it was linked to an item form the vulnerability dashboard in GitLab CE&#x2F;EE. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0390&quot;&gt;CVE-2022-0390&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;wi11&quot;&gt;wi11&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;service-desk-email-accessible-by-project-non-members&quot;&gt;Service Desk email accessible by project non-members&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control allows project non-members to retrieve the Service Desk email address in GitLab CE&#x2F;EE. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0373&quot;&gt;CVE-2022-0373&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;albatraoz&quot;&gt;albatraoz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;authenticated-users-can-search-other-users-by-their-private-email&quot;&gt;Authenticated users can search other users by their private email&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab search may allow authenticated users to search other users by their respective private emails even if a user set their email to private. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0371&quot;&gt;CVE-2022-0371&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Customers may continue to search GitLab through the following methods:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Search via public email&lt;&#x2F;li&gt;
  &lt;li&gt;Search via username&lt;&#x2F;li&gt;
  &lt;li&gt;Query Users API for user id&lt;&#x2F;li&gt;
  &lt;li&gt;Use our new &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;groups.html#list-provisioned-users&quot;&gt;Provisioned Users endpoint&lt;&#x2F;a&gt; (if you use Group SAML or SCIM)&lt;&#x2F;li&gt;
  &lt;li&gt;Use an Admin token to search for the users via the API (if you are on a GitLab self-managed instance)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;This vulnerability was found internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;external-status-checks-can-be-accepted-by-users-below-developer-access-if-the-user-is-either-author-or-assignee-of-the-target-merge-request&quot;&gt;&quot;External status checks&quot; can be accepted by users below developer access if the user is either author or assignee of the target merge request&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization logic error in the External Status Check API in GitLab EE affecting all versions starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allowed a user to update the status of the check via an API call. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39943&quot;&gt;CVE-2021-39943&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deleting-packages-in-bulk-from-package-registries-may-cause-table-locks&quot;&gt;Deleting packages in bulk from package registries may cause table locks&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 11.9 before 14.5.4, all versions starting from 14.6.0 before 14.6.4, all versions starting from 14.7.0 before 14.7.1. GitLab was not correctly handling bulk requests to delete existing packages from the package registries which could result in a Denial of Service under specific conditions. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 4.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0477&quot;&gt;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;autocomplete-enabled-on-specific-pages&quot;&gt;Autocomplete enabled on specific pages&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 14.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not disabling the &lt;code&gt;Autocomplete&lt;&#x2F;code&gt; attribute of fields related to sensitive information making it possible to be retrieved under certain conditions. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0167&quot;&gt;CVE-2022-0167&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;possible-ssrf-due-to-not-blocking-shared-address-space&quot;&gt;Possible SSRF due to not blocking shared address space&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability was discovered in GitLab starting with version 12. GitLab was vulnerable to a blind SSRF attack since requests to shared address space were not blocked. . This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0249&quot;&gt;CVE-2022-0249&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;no1zy&quot;&gt;no1zy&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;system-notes-reveals-private-project-path-when-issue-is-moved-to-a-public-project&quot;&gt;System notes reveals private project path when Issue is moved to a public project&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 10.0 before 14.5.4, all versions starting from 10.1 before 14.6.4, all versions starting from 10.2 before 14.7.1. Private project paths can be disclosed to unauthorized users via system notes when an Issue is closed via a Merge Request and later moved to a public project. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0344&quot;&gt;CVE-2022-0344&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;timeout-for-pages-using-markdown&quot;&gt;Timeout for pages using Markdown&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with version 8.10. It was possible to trigger a timeout on a page with markdown by using a specific amount of block-quotes. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0488&quot;&gt;CVE-2022-0488&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;certain-branch-names-could-not-be-protected&quot;&gt;Certain branch names could not be protected&lt;&#x2F;h2&gt;

&lt;p&gt;In some cases, branch names containing HTML tags were not properly being protected. This is a follow-up to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39931&quot;&gt;CVE-2021-39931&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Mattermost has been updated to 6.1.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus prior to 14.7&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-go&quot;&gt;Update Go&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Go used in the GitLab Omnibus &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file has been updated to 2.9.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus prior to 14.7&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rouge&quot;&gt;Update Rouge&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Rouge has been updated to 3.27.0 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mermaid&quot;&gt;Update Mermaid&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Mermaid has been updated to 8.13.10 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.7 released with Streaming Audit Events, GitLab Runner compliance with FIPS 140-2, and Group Access Tokens</title>
<release>14.7</release>
<link href='https://about.gitlab.com/releases/2022/01/22/gitlab-14-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/01/22/gitlab-14-7-released/</id>
<published>2022-01-22T00:00:00+00:00</published>
<updated>2022-01-22T00:00:00+00:00</updated>
<author>
<name>Jensen Stava</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab 14.7 with &lt;a href=&quot;#streaming-audit-events&quot;&gt;Streaming Audit Events&lt;&#x2F;a&gt;, &lt;a href=&quot;#gitlab-runner-compliant-with-fips-140-2&quot;&gt;GitLab Runner compliance with FIPS 140-2&lt;&#x2F;a&gt;, &lt;a href=&quot;#group-access-tokens&quot;&gt;Group Access Tokens&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 25+ improvements in this release. Read on to check out all of the great updates.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.8 release kickoff video.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_7&#x2F;14_7-cover-image.jpeg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.6.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/01/17/gitlab-14-6-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/01/17/gitlab-14-6-3-released/</id>
<published>2022-01-17T00:00:00+00:00</published>
<updated>2022-01-17T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.6.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;12&#x2F;22&#x2F;gitlab-14-6-released&#x2F;&quot;&gt;last month&#x27;s 14.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77364&quot;&gt;Geo: adapt verification timed out query to use state table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77506&quot;&gt;Fix migration for cases with empty strings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77528&quot;&gt;Fix the order of subsequent jobs when requeuing a job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77676&quot;&gt;Geo: Resolve &quot;undefined method each_batch&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77941&quot;&gt;Fix destruction of projects with pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5819&quot;&gt;Revert chef-acme cookbook update&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;853&quot;&gt;Update golang to 1.16.12&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5818&quot;&gt;Pass knapsack generate report var to gitlab-qa&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.6.2, 14.5.3, and 14.4.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/01/11/security-release-gitlab-14-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/01/11/security-release-gitlab-14-6-2-released/</id>
<published>2022-01-11T00:00:00+00:00</published>
<updated>2022-01-11T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.6.2, 14.5.3, and 14.4.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-file-read-via-group-import-feature&quot;&gt;Arbitrary file read via group import feature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-notes&quot;&gt;Stored XSS in notes&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#lack-of-state-parameter-on-github-import-project-oauth&quot;&gt;Lack of state parameter on GitHub import project OAuth&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#vulnerability-related-fields-are-available-to-unauthorized-users-on-graphql-api&quot;&gt;Vulnerability related fields are available to unauthorized users on GraphQL API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#deleting-packages-may-cause-table-locks&quot;&gt;Deleting packages may cause table locks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ip-restriction-bypass-via-graphql&quot;&gt;IP restriction bypass via GraphQL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#repository-content-spoofing-using-git-replacement-references&quot;&gt;Repository content spoofing using Git replacement references&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#users-can-import-members-from-projects-that-they-are-not-a-maintainer-on-through-api&quot;&gt;Users can import members from projects that they are not a maintainer on through API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#possibility-to-direct-user-to-malicious-site-through-slack-integration&quot;&gt;Possibility to direct user to malicious site through Slack integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypassing-file-size-limits-to-the-npm-package-repository&quot;&gt;Bypassing file size limits to the NPM package repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-with-expired-password-can-still-access-sensitive-informations&quot;&gt;User with expired password can still access sensitive information&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#incorrect-port-validation-allows-access-to-services-on-ports-80-and-443-if-gitlab-is-configured-to-run-on-another-port&quot;&gt;Incorrect port validation allows access to services on ports 80 and 443 if GitLab is configured to run on another port&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;arbitrary-file-read-via-group-import-feature&quot;&gt;Arbitrary file read via group import feature&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group due to incorrect file handling. This is a critical severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 8.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0244&quot;&gt;CVE-2022-0244&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-notes&quot;&gt;Stored XSS in notes&lt;&#x2F;h2&gt;

&lt;p&gt;Improper neutralization of user input in GitLab CE&#x2F;EE versions 14.3 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed an attacker to exploit XSS by abusing the generation of the HTML code related to emojis. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39946&quot;&gt;CVE-2021-39946&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jarij&quot;&gt;jarij&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;lack-of-state-parameter-on-github-import-project-oauth&quot;&gt;Lack of state parameter on GitHub import project OAuth&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 7.7 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, and all versions starting from 14.6.0 before 14.6.2. GitLab was vulnerable to a Cross-Site Request Forgery attack that allows a malicious user to have their GitHub project imported on another GitLab user account. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0154&quot;&gt;CVE-2022-0154&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;aryan2808&quot;&gt;aryan2808&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;vulnerability-related-fields-are-available-to-unauthorized-users-on-graphql-api&quot;&gt;Vulnerability related fields are available to unauthorized users on GraphQL API&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.10 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, and all versions starting from 14.6.0 before 14.6.2. GitLab was vulnerable to unauthorized access to some particular fields through the GraphQL API. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0152&quot;&gt;CVE-2022-0152&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deleting-packages-may-cause-table-locks&quot;&gt;Deleting packages may cause table locks&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.10 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, and all versions starting from 14.6.0 before 14.6.2. GitLab was not correctly handling requests to delete existing packages which could result in a Denial of Service under specific conditions. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0151&quot;&gt;CVE-2022-0151&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ip-restriction-bypass-via-graphql&quot;&gt;IP restriction bypass via GraphQL&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 12.3. Under certain conditions it was possible to bypass the IP restriction for public projects through GraphQL allowing unauthorised users to read titles of issues, merge
requests and milestones. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0172&quot;&gt;CVE-2022-0172&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-content-spoofing-using-git-replacement-references&quot;&gt;Repository content spoofing using Git replacement references&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab is configured in a way that it doesn&#x27;t ignore replacement references with &lt;code&gt;git&lt;&#x2F;code&gt; sub-commands, allowing a malicious user to spoof the contents of their commits in the UI. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0090&quot;&gt;CVE-2022-0090&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;star-labs&quot;&gt;star-labs&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-can-import-members-from-projects-that-they-are-not-a-maintainer-on-through-api&quot;&gt;Users can import members from projects that they are not a maintainer on through API&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, and all versions starting from 14.6.0 before 14.6.2. GitLab was not verifying that a maintainer of a project had the right access to import members from a target project. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0125&quot;&gt;CVE-2022-0125&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;possibility-to-direct-user-to-malicious-site-through-slack-integration&quot;&gt;Possibility to direct user to malicious site through Slack integration&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. Gitlab&#x27;s Slack integration is incorrectly validating user input and allows crafting of malicious URLs that are sent to slack. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0124&quot;&gt;CVE-2022-0124&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rafaltrojniak&quot;&gt;rafaltrojniak&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypassing-file-size-limits-to-the-npm-package-repository&quot;&gt;Bypassing file size limits to the NPM package repository&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service vulnerability in GitLab CE&#x2F;EE affecting all versions starting from 12.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, and all versions starting from 14.5 before 14.5.2, allows low-privileged users to bypass file size limits in the NPM package repository to potentially cause denial of service. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39942&quot;&gt;CVE-2021-39942&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xn3va&quot;&gt;0xn3va&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-with-expired-password-can-still-access-sensitive-information&quot;&gt;User with expired password can still access sensitive information&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered affecting GitLab versions prior to 14.4.5, between 14.5.0 and 14.5.3, and between 14.6.0 and 14.6.1. GitLab allows a user with an expired password to access sensitive information through RSS feeds. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2022-0093&quot;&gt;CVE-2022-0093&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-port-validation-allows-access-to-services-on-ports-80-and-443-if-gitlab-is-configured-to-run-on-another-port&quot;&gt;Incorrect port validation allows access to services on ports 80 and 443 if GitLab is configured to run on another port&lt;&#x2F;h2&gt;

&lt;p&gt;Server side request forgery protections in GitLab CE&#x2F;EE versions between 8.4 and 14.4.x, between 14.5.0 and 14.5.x, and between 14.6.0 and 14.6.x would fail to protect against attacks sending requests to localhost on port 80 or 443 if GitLab was configured to run on a port other than 80 or 443. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39927&quot;&gt;CVE-2021-39927&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-prometheus&quot;&gt;Update Prometheus&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Prometheus included in GitLab Omnibus has been updated to 2.25.2 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.6.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2022/01/04/gitlab-14-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2022/01/04/gitlab-14-6-1-released/</id>
<published>2022-01-04T00:00:00+00:00</published>
<updated>2022-01-04T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.6.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;12&#x2F;22&#x2F;gitlab-14-6-released&#x2F;&quot;&gt;last month&#x27;s 14.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;!--
- [Description](GitLab MR LINK)
- [Description](GitLab MR LINK)
--&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77319&quot;&gt;Fix re-use of extensions between instances&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77429&quot;&gt;Ignore new line differences when deciding whether to squash MR&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77454&quot;&gt;Drop LetsEncrypt X3 expired root test&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;77474&quot;&gt;Fix date-dependent failing spec in export_service_spec.rb&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;849&quot;&gt;Fix an issue with sidekiq starting in docker compose&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;850&quot;&gt;Fix the final chown of the rails ubi image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;2333&quot;&gt;Fix sha256 digest of nginx-ingress controller image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;2327&quot;&gt;Fix duplicate NGINX labels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;2317&quot;&gt;Restore loadBalancerIP=global.hosts.externalIP on NGINX Controller Service&lt;&#x2F;a&gt;
&lt;!-- {{ MERGE_REQUEST_LIST }} --&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.6 adds seamless Geo experience and supports .NET 6 in SAST</title>
<release>14.6</release>
<link href='https://about.gitlab.com/releases/2021/12/22/gitlab-14-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/12/22/gitlab-14-6-released/</id>
<published>2021-12-22T00:00:00+00:00</published>
<updated>2021-12-22T00:00:00+00:00</updated>
<author>
<name>Viktor Nagy</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are thrilled to announce the release of GitLab 14.6, the last release for 2021. This release brings &lt;a href=&quot;#seamless-worldwide-performance-with-geo&quot;&gt;simplified Geo configuration&lt;&#x2F;a&gt; that helps globally distributed teams accelerate Git clone or Git pull commands by automatically using the geo site closest to them, an &lt;a href=&quot;#gitlab-agents-activity-information&quot;&gt;activity list for GitLab&#x27;s Agent&lt;&#x2F;a&gt; that logs real-time events such as connection and token status, and various SAST improvements including &lt;a href=&quot;#sast-scan-execution-policies&quot;&gt;SAST execution policies&lt;&#x2F;a&gt; and support for &lt;a href=&quot;#sast-support-for-net-6&quot;&gt;.NET 6&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 30+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.7 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_6&#x2F;14_6-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Runner Critical Security Release: 14.5.2, 14.4.2, and 14.3.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/12/10/security-release-gitlab-runner-14-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/12/10/security-release-gitlab-runner-14-5-2-released/</id>
<published>2021-12-10T00:00:00+00:00</published>
<updated>2021-12-10T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.5.2, 14.4.2, and 14.3.4 for GitLab Runner.&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes and we strongly recommend that all GitLab Runner installations for both GitLab.com and self-managed instances be upgraded to one of them immediately. This critical security release is for two security vulnerabilities that have been assigned a CVSS with medium severity, but that have a critical impact on GitLab.com users.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab.com Shared Runners are already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;We estimate that the number of self-managed GitLab Runner installations vulnerable to these exploits to be small due to a very specific combination of settings required to take advantage of this vulnerability. Even so, again: we strongly recommend that all GitLab Runner installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;
&lt;p&gt;We strongly recommend that all installations running a version affected by the issues described below are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Specially-crafted-docker-images-can-exhaust-resources-on-managers&quot;&gt;Specially crafted docker images can exhaust resources on managers&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Golang-vulnerability-CVE-2021-44717-dont-close-fd-0-on-ForkExec-error&quot;&gt;Golang vulnerability CVE-2021-44717: don’t close fd 0 on ForkExec error&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;specially-crafted-docker-images-can-exhaust-resources-on-managers&quot;&gt;Specially crafted docker images can exhaust resources on managers&lt;&#x2F;h2&gt;

&lt;p&gt;An uncontrolled resource consumption vulnerability in GitLab Runner affecting all versions starting from 13.7 before 14.3.4, all versions starting from 14.4 before 14.4.2, all versions starting from 14.5 before 14.5.2, allows an attacker triggering a job with a specially crafted docker image to exhaust resources on a runner manager. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39939&quot;&gt;CVE-2021-39939&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;temporary-workaround&quot;&gt;Temporary workaround&lt;&#x2F;h3&gt;

&lt;p&gt;A temporary workaround, in cases when GitLab Runner can&#x27;t be updated immediately, would be to disable the &lt;code&gt;FF_DISABLE_UMASK_FOR_DOCKER_EXECUTOR&lt;&#x2F;code&gt; feature flag in Runner&#x27;s &lt;code&gt;config.toml&lt;&#x2F;code&gt; configuration file. This will turn off the vulnerable feature and make it impossible for users to turn it on from the job level.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Open the &lt;code&gt;config.toml&lt;&#x2F;code&gt; file of the Runner that you want to update.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;In each &lt;code&gt;[[runners]]&lt;&#x2F;code&gt; section add:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight toml&quot;&gt;&lt;code&gt; &lt;span class=&quot;nn&quot;&gt;[runners.feature_flags]&lt;&#x2F;span&gt;
   &lt;span class=&quot;py&quot;&gt;FF_DISABLE_UMASK_FOR_DOCKER_EXECUTOR&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;kc&quot;&gt;false&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Save the file and exit.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;After that, the runner&#x27;s process should detect the change and start applying the configuration within a minute. For this configuration change, restarting the GitLab Runner process is not required.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;golang-vulnerability-cve-2021-44717-dont-close-fd-0-on-forkexec-error&quot;&gt;Golang vulnerability CVE-2021-44717: don’t close fd 0 on ForkExec error&lt;&#x2F;h2&gt;

&lt;p&gt;All previous versions of GitLab Runner were susceptible to &lt;a href=&quot;https:&#x2F;&#x2F;groups.google.com&#x2F;g&#x2F;golang-announce&#x2F;c&#x2F;hcmEScgc00k?pli=1&quot;&gt;Golang security issue CVE-2021-44717: don’t close fd 0 on ForkExec error&lt;&#x2F;a&gt;, which could result in misdirected I&#x2F;O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39947&quot;&gt;CVE-2021-39947&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;temporary-workaround-1&quot;&gt;Temporary workaround&lt;&#x2F;h3&gt;

&lt;p&gt;A temporary workaround, in cases when GitLab Runner can&#x27;t be updated immediately, would be to increase the file descriptor limit set for the runner process. However, this is dependent on how it&#x27;s specifically configured and deployed.&lt;&#x2F;p&gt;

&lt;p&gt;Please keep in mind that updating the file descriptors limit requires restarting the runner process. To do that without interrupting any running jobs one should send a &lt;code&gt;SIGQUIT&lt;&#x2F;code&gt; signal to the runner process. This will initiate a graceful shutdown, during which the runner will not accept any new jobs but will finish all the jobs that were already started before exiting.&lt;&#x2F;p&gt;

&lt;p&gt;The ability to determine the best value for the file descriptors limit will vary depending on the load that the runners are handling and their specific configuration. Setting the limit at 50 for each potential job that can run concurrently on the runner manager is a good starting point. However, to find the best value we highly recommend monitoring the runner process and the number of file descriptors that it uses and adjust as needed depending on the specific needs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;&quot;&gt;find your installation method and steps for updating here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.5.2, 14.4.4, and 14.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/</id>
<published>2021-12-06T00:00:00+00:00</published>
<updated>2021-12-06T00:00:00+00:00</updated>
<author>
<name>Rohit Shambhuni</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.5.2, 14.4.4, and 14.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#group-members-with-developer-role-can-escalate-their-privilege-to-maintainer-on-projects-that-they-import&quot;&gt;Group members with developer role can escalate their privilege to maintainer on projects that they import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#when-user-registration-is-limited-external-users-that-arent-developers-shouldnt-have-access-to-the-ci-lint-api&quot;&gt;When user registration is limited, external users that aren&#x27;t developers shouldn&#x27;t have access to the CI Lint API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#collision-in-access-memoization-leads-to-potential-elevated-privileges-on-groups-and-projects&quot;&gt;Collision in access memoization leads to potential elevated privileges on groups and projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-access-token-names-are-returned-for-unauthenticated-requesters&quot;&gt;Project access token names are returned for unauthenticated requesters&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#sensitive-info-disclosure-in-logs&quot;&gt;Sensitive info disclosure in logs&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#disclosure-of-a-users-custom-project-and-group-templates&quot;&gt;Disclosure of a user&#x27;s custom project and group templates&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#redos-in-maven-package-version&quot;&gt;ReDoS in Maven package version&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#potential-denial-of-service-via-the-diff-feature&quot;&gt;Potential denial of service via the Diff feature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-via-user-comments&quot;&gt;Regular Expression Denial of Service via user comments&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#service-desk-email-accessible-by-any-project-member&quot;&gt;Service Desk email accessible by any project member&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-via-quick-actions&quot;&gt;Regular Expression Denial of Service via quick actions&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#idor-in-external-status-check-api-leaks-data-about-any-status-check-on-the-instance&quot;&gt;IDOR in &quot;external status check&quot; API leaks data about any status check on the instance&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#default-branch-name-visible-in-public-projects-restricting-access-to-the-source-code-repository&quot;&gt;Default branch name visible in public projects restricting access to the source code repository&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#deploy-token-allows-access-to-disabled-project-wiki&quot;&gt;Deploy token allows access to disabled project Wiki&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-via-deploy-slash-commands&quot;&gt;Regular Expression Denial of Service via deploy Slash commands&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#users-can-reply-to-vulnerability-report-discussions-despite-only-project-members-settings&quot;&gt;Users can reply to Vulnerability Report discussions despite Only Project Members settings&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorised-deletion-of-protected-branches&quot;&gt;Unauthorised deletion of protected branches&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#author-can-approve-merge-request-after-having-access-revoked&quot;&gt;Author can approve Merge Request after having access revoked&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-injection-via-swagger-ui&quot;&gt;HTML Injection via Swagger UI&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;group-members-with-developer-role-can-escalate-their-privilege-to-maintainer-on-projects-that-they-import&quot;&gt;Group members with developer role can escalate their privilege to maintainer on projects that they import&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A permissions validation flaw allowed group members with a developer role to elevate their privilege to a maintainer on projects they import. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 7.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39944&quot;&gt;CVE-2021-39944&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @justas_b for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;when-user-registration-is-limited-external-users-that-arent-developers-shouldnt-have-access-to-the-ci-lint-api&quot;&gt;When user registration is limited, external users that aren&#x27;t developers shouldn&#x27;t have access to the CI Lint API&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39935&quot;&gt;CVE-2021-39935&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;minhli?type=user&quot;&gt;@minhli&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;collision-in-access-memoization-leads-to-potential-elevated-privileges-on-groups-and-projects&quot;&gt;Collision in access memoization leads to potential elevated privileges on groups and projects&lt;&#x2F;h2&gt;

&lt;p&gt;A collision in access memoization logic in all versions of GitLab CE&#x2F;EE before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, leads to potential elevated privileges in groups and projects under rare circumstances. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39937&quot;&gt;CVE-2021-39937&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-access-token-names-are-returned-for-unauthenticated-requesters&quot;&gt;Project access token names are returned for unauthenticated requesters&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control in the GraphQL API in GitLab CE&#x2F;EE affecting all versions starting from 13.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to see the names of project access tokens on arbitrary projects. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39915&quot;&gt;CVE-2021-39915&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar?type=user&quot;&gt;@joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sensitive-info-disclosure-in-logs&quot;&gt;Sensitive info disclosure in logs&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:L&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39919&quot;&gt;CVE-2021-39919&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-a-users-custom-project-and-group-templates&quot;&gt;Disclosure of a user&#x27;s custom project and group templates&lt;&#x2F;h2&gt;

&lt;p&gt;Missing authorization in GitLab EE versions starting from 12.4 before 14.3.6, starting from 14.4.0 before 14.4.4, and starting from 14.5.0 before 14.5.2 allowed an attacker to access a user&#x27;s custom project and group templates. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39930&quot;&gt;CVE-2021-39930&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog?type=user&quot;&gt;@ngalog&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redos-in-maven-package-version&quot;&gt;ReDoS in Maven package version&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39940&quot;&gt;CVE-2021-39940&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;anyday?type=user&quot;&gt;@anyday&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-denial-of-service-via-the-diff-feature&quot;&gt;Potential denial of service via the Diff feature&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Using large payloads, the diff feature could be used to trigger high load time for users reviewing code changes. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39932&quot;&gt;CVE-2021-39932&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-via-user-comments&quot;&gt;Regular Expression Denial of Service via user comments&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39933&quot;&gt;CVE-2021-39933&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;hashkitten?type=user&quot;&gt;@hashkitten&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;service-desk-email-accessible-by-any-project-member&quot;&gt;Service Desk email accessible by any project member&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control allows any project member to retrieve the Service Desk email address in GitLab CE&#x2F;EE versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39934&quot;&gt;CVE-2021-39934&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gratitude101?type=user&quot;&gt;@gratitude101&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-via-quick-actions&quot;&gt;Regular Expression Denial of Service via quick actions&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.9 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression related to quick actions features was susceptible to catastrophic backtracking that could cause a DOS attack. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39917&quot;&gt;CVE-2021-39917&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;hashkitten?type=user&quot;&gt;@hashkitten&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-in-external-status-check-api-leaks-data-about-any-status-check-on-the-instance&quot;&gt;IDOR in &quot;external status check&quot; API leaks data about any status check on the instance&lt;&#x2F;h2&gt;

&lt;p&gt;Lack of an access control check in the External Status Check feature allowed any authenticated user to retrieve the configuration of any External Status Check in GitLab EE starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39916&quot;&gt;CVE-2021-39916&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar?type=user&quot;&gt;@joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;default-branch-name-visible-in-public-projects-restricting-access-to-the-source-code-repository&quot;&gt;Default branch name visible in public projects restricting access to the source code repository&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure vulnerability in GitLab CE&#x2F;EE versions 12.0 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed non-project members to see the default branch name for projects that restrict access to the repository to project members. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39941&quot;&gt;CVE-2021-39941&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar?type=user&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deploy-token-allows-access-to-disabled-project-wiki&quot;&gt;Deploy token allows access to disabled project Wiki&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control in GitLab CE&#x2F;EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project&#x27;s disabled wiki. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39936&quot;&gt;CVE-2021-39936&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky?type=user&quot;&gt;@vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-via-deploy-slash-commands&quot;&gt;Regular Expression Denial of Service via deploy Slash commands&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerable regular expression pattern in GitLab CE&#x2F;EE since version 8.15 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to cause uncontrolled resource consumption leading to Denial of Service via specially crafted deploy Slash commands. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39938&quot;&gt;CVE-2021-39938&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-can-reply-to-vulnerability-report-discussions-despite-only-project-members-settings&quot;&gt;Users can reply to Vulnerability Report discussions despite Only Project Members settings&lt;&#x2F;h2&gt;

&lt;p&gt;Incorrect Authorization in GitLab EE affecting all versions starting from 11.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows a user to add comments to a vulnerability which cannot be accessed. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39918&quot;&gt;CVE-2021-39918&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;wi11?type=user&quot;&gt;@wi11&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorised-deletion-of-protected-branches&quot;&gt;Unauthorised deletion of protected branches&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under specific condition an unauthorised project member was allowed to delete a protected branches due to a business logic error. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39931&quot;&gt;CVE-2021-39931&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar?type=user&quot;&gt;@joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;author-can-approve-merge-request-after-having-access-revoked&quot;&gt;Author can approve Merge Request after having access revoked&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control in the GitLab CE&#x2F;EE API affecting all versions starting from 9.4 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an author of a Merge Request to approve the Merge Request even after having their project access revoked. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39945&quot;&gt;CVE-2021-39945&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;muthu_prakash?type=user&quot;&gt;@muthu_prakash&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;html-injection-via-swagger-ui&quot;&gt;HTML Injection via Swagger UI&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 12.6 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab was vulnerable to HTML Injection through the Swagger UI feature. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39910&quot;&gt;CVE-2021-39910&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;muthu_prakash?type=user&quot;&gt;@kannthu&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ruby&quot;&gt;Update Ruby&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Ruby included in GitLab Omnibus has been updated to 2.7.5 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rails&quot;&gt;Update Rails&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Rails included in GitLab Omnibus has been updated to 6.1.4.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 12.8 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ncurses&quot;&gt;Update ncurses&lt;&#x2F;h2&gt;

&lt;p&gt;The version of ncurses included in GitLab Omnibus has been updated to 6.3 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-libgcrypt&quot;&gt;Update libgcrypt&lt;&#x2F;h2&gt;

&lt;p&gt;The version of libgcrypt included in GitLab Omnibus has been updated to 1.9.4 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 10.3 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;The version of mattermost included in GitLab Omnibus versions 14.4.4 and 14.5.2 has been updated to 5.39.2 in order to mitigate security concerns. The version of mattermost included in GitLab Omnibus versions 14.3.6 has been updated to 5.38.4 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 14.1 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-graphql&quot;&gt;Update graphql&lt;&#x2F;h2&gt;

&lt;p&gt;The version of graphql included in GitLab Omnibus has been updated to 1.11.10 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 8.11 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mermaid&quot;&gt;Update mermaid&lt;&#x2F;h2&gt;

&lt;p&gt;The version of mermaid included in GitLab Omnibus has been updated to 8.13.4 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.4.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/12/01/gitlab-14-4-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/12/01/gitlab-14-4-3-released/</id>
<published>2021-12-01T00:00:00+00:00</published>
<updated>2021-12-01T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.4.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;10&#x2F;22&#x2F;gitlab-14-4-released&#x2F;&quot;&gt;October&#x27;s 14.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73538&quot;&gt;Fix 2FA setup for LDAP users&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73550&quot;&gt;Allow SSO callbacks through maintenance mode&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73952&quot;&gt;Prevent Git operations from checking replication lag on non-Geo-secondary sites&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;74133&quot;&gt;Geo - Fix no repo error message for group-level wikis&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;75344&quot;&gt;Fix for hexadecimal branch deletion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5740&quot;&gt;Add praefect prometheus_exclude_database_from_default_metrics config value&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;75523&quot;&gt;Check validation only if new record of license&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;74778&quot;&gt;Wrap Sidekiq scheduler threads in Rails reloader&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4090&quot;&gt;Materialize valid_primaries view &lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4094&quot;&gt;praefect: Backport separate endpoint for datastore collector&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4113&quot;&gt;sql-migrate: Update storage_repositories table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4117&quot;&gt;datastore: Revert use of materialized views&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4115&quot;&gt;list-untracked-repositories: Praefect sub-command to show untracked repositories&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.5.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/12/01/gitlab-14-5-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/12/01/gitlab-14-5-1-released/</id>
<published>2021-12-01T00:00:00+00:00</published>
<updated>2021-12-01T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.5.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;11&#x2F;22&#x2F;gitlab-14-5-released&#x2F;&quot;&gt;last month&#x27;s 14.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;75173&quot;&gt;Support Action Cable on GCP Memorystore&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;75196&quot;&gt;Fix the SSL_CERT_DIR logging on git operations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;75344&quot;&gt;Fix for hexadecimal branch deletion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;75352&quot;&gt;Check validation for license only if new record&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5753&quot;&gt;Fix Google Memorystore support for Action Cable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4142&quot;&gt;catfile: Ensure structs are properly aligned in memory for 32-bit CPUs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4107&quot;&gt;praefect: Backport separate endpoint for datastore collector&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.3.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/11/26/gitlab-14-3-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/26/gitlab-14-3-5-released/</id>
<published>2021-11-26T00:00:00+00:00</published>
<updated>2021-11-26T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.3.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;09&#x2F;22&#x2F;gitlab-14-3-released&#x2F;&quot;&gt;September&#x27;s 14.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72492&quot;&gt;Remove defaultAuthors from MR Analytics and VSA&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72925&quot;&gt;Fix error 500 loading branch with UTF-8 characters with performance bar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73952&quot;&gt;Prevent Git operations from checking replication lag on non-Geo-secondary sites&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;74133&quot;&gt;Geo - Fix no repo error message for group-level wikis&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;74706&quot;&gt;Allow SSO callbacks through maintenance mode&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5674&quot;&gt;Conditionally generate public_attributes.json&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5675&quot;&gt;Downgrade grafana to the 7.x release branch&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5705&quot;&gt;Fix URL for unzip v6.0 download&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5740&quot;&gt;Add praefect prometheus_exclude_database_from_default_metrics config value&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;808&quot;&gt;ubi8: Install Ruby binstubs for Gitaly gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;802&quot;&gt;Update GitLab MailRoom to v0.0.14&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4095&quot;&gt;Praefect: Backport separate endpoint for datastore collector&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4089&quot;&gt;Materialize valid_primaries view&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4118&quot;&gt;Fix for regression with Postgres 11 due to MATERIALIZED views&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4114&quot;&gt;Backport praefect sub-commands to 14.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.2.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/11/26/gitlab-14-2-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/26/gitlab-14-2-7-released/</id>
<published>2021-11-26T00:00:00+00:00</published>
<updated>2021-11-26T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.2.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;08&#x2F;22&#x2F;gitlab-14-2-released&#x2F;&quot;&gt;August&#x27;s 14.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68459&quot;&gt;Let non-members set confidential flag when creating an issue in public project&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70329&quot;&gt;Geo: Reduce frequency of redownload attempts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72492&quot;&gt;Remove defaultAuthors from MR Analytics and VSA&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73952&quot;&gt;Prevent Git operations from checking replication lag on non-Geo-secondary sites&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5647&quot;&gt;Delay praefect database_no_proxy removals&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5674&quot;&gt;Conditionally generate public_attributes.json&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5705&quot;&gt;Fix URL for unzip v6.0 download&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5740&quot;&gt;Add praefect prometheus_exclude_database_from_default_metrics config value&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;784&quot;&gt;Symlink OpenSSL default cert file to Debian cert path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;808&quot;&gt;ubi8: Install Ruby binstubs for Gitaly gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;802&quot;&gt;Update GitLab MailRoom to v0.0.14&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4096&quot;&gt;Praefect: Backport separate endpoint for datastore collector&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4088&quot;&gt;Materialize valid_primaries view&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4119&quot;&gt;Fix for regression with Postgres 11 due to MATERIALIZED views&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4072&quot;&gt;Backport praefect sub-commands to 14.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.5 released with infrastructure as code security scanning and group-level merge request approvals</title>
<release>14.5</release>
<link href='https://about.gitlab.com/releases/2021/11/22/gitlab-14-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/22/gitlab-14-5-released/</id>
<published>2021-11-22T00:00:00+00:00</published>
<updated>2021-11-22T00:00:00+00:00</updated>
<author>
<name>Jackie Porter</name>
</author>
<content type='html'>&lt;p&gt;Today, we are thrilled to announce the release of GitLab 14.5 with &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2021&#x2F;11&#x2F;22&#x2F;gitlab-14-5-released&#x2F;#introducing-infrastructure-as-code-iac-security-scanning&quot;&gt;infrastructure as code security scanning&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2021&#x2F;11&#x2F;22&#x2F;gitlab-14-5-released&#x2F;#group-level-settings-for-merge-request-approvals&quot;&gt;group-level merge request approvals settings&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2021&#x2F;11&#x2F;22&#x2F;gitlab-14-5-released&#x2F;#gitlab-kubernetes-agent-available-in-gitlab-free&quot;&gt;Kubernetes Agent available in GitLab Free&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2021&#x2F;11&#x2F;22&#x2F;gitlab-14-5-released&#x2F;#explore-project-topics-tab&quot;&gt;project topics&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are only a selection of highlights from the 40+ improvements in this release. Read on to check out all of the super updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;upcoming-releases&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.6 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_5&#x2F;14_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.1.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/11/15/gitlab-14-1-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/15/gitlab-14-1-8-released/</id>
<published>2021-11-15T00:00:00+00:00</published>
<updated>2021-11-15T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.1.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;07&#x2F;22&#x2F;gitlab-14-1-released&#x2F;&quot;&gt;July&#x27;s 14.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4061&quot;&gt;Backport praefect sub-commands to 14.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70329&quot;&gt;Geo: Reduce frequency of redownload attempts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73952&quot;&gt;Prevent Git operations from checking replication lag on non-Geo-secondary sites&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5647&quot;&gt;Delay praefect database_*_no_proxy removals&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5674&quot;&gt;Conditionally generate public_attributes.json&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5687&quot;&gt;Update gitlab-mail_room to 0.0.14&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.4.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/11/08/gitlab-14-4-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/08/gitlab-14-4-2-released/</id>
<published>2021-11-08T00:00:00+00:00</published>
<updated>2021-11-08T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.4.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;10&#x2F;22&#x2F;gitlab-14-4-released&#x2F;&quot;&gt;last month&#x27;s 14.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72382&quot;&gt;Fix focus mode on boards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72435&quot;&gt;Prevent Sidekiq size limiter middleware from running multiple times on the same job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72897&quot;&gt;Skip st_diff callback setting on LegacyDiffNote when importing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72900&quot;&gt;Create 14.4 What&#x27;s New entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72925&quot;&gt;Fix error 500 loading branch with UTF-8 characters with performance bar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;72928&quot;&gt;Fix issue_metrics index creation error&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73207&quot;&gt;Remove skip_legacy_diff_note_callback_on_import from legacy diff note&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73488&quot;&gt;Document track-repository praefect subcommand&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73715&quot;&gt;Skip retrying for reads on connection errors if primary only&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73829&quot;&gt;Bump Go dependency to 1.16&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5682&quot;&gt;Build and publish ARM64 AMIs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5705&quot;&gt;Fix URL for unzip v6.0 download&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;808&quot;&gt;ubi8: Install Ruby binstubs for Gitaly gems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/11/05/gitlab-14-0-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/05/gitlab-14-0-12-released/</id>
<published>2021-11-05T00:00:00+00:00</published>
<updated>2021-11-05T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.0.12 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;June&#x27;s 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;4018&quot;&gt;Backport praefect sub-commands to 14.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70329&quot;&gt;Geo: Reduce frequency of redownload attempts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5674&quot;&gt;Conditionally generate public_attributes.json&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5687&quot;&gt;Update gitlab-mail_room to 0.0.14&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64472&quot;&gt;Allow nil for CI CD settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.15</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/11/03/gitlab-13-12-15-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/11/03/gitlab-13-12-15-released/</id>
<published>2021-11-03T00:00:00+00:00</published>
<updated>2021-11-03T00:00:00+00:00</updated>
<author>
<name>John T. Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.12.15 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;13.12&#x27;s release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70329&quot;&gt;Geo: Reduce frequency of redownload attempts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5674&quot;&gt;Conditionally generate public_attributes.json&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5687&quot;&gt;Update gitlab-mail_room to 0.0.14&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3946&quot;&gt;Add new sub-command for Praefect to remove repository&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3968&quot;&gt;Add new sub-command for Praefect to show untracked repositories&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3973&quot;&gt;Add new sub-command for Praefect to show repositories that exist on disk but not in the database&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;73522&quot;&gt;Allow nil for remaining ci cd settings&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.4.1, 14.3.4, and 14.2.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/10/28/security-release-gitlab-14-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/10/28/security-release-gitlab-14-4-1-released/</id>
<published>2021-10-28T00:00:00+00:00</published>
<updated>2021-10-28T00:00:00+00:00</updated>
<author>
<name>Nikhil George</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.4.1, 14.3.4, and 14.2.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-via-ipynb-files&quot;&gt;Stored XSS via ipynb files&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unicode-characters-can-be-abused-to-commit-malicious-code-into-projects-without-notice&quot;&gt;Unicode characters can be abused to commit malicious code into projects without notice&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#pipeline-schedules-on-imported-projects-can-be-set-to-automatically-active-after-import&quot;&gt;Pipeline schedules on imported projects can be set to automatically active after import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#potential-denial-of-service-via-workhorse&quot;&gt;Potential Denial of service via Workhorse&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-access-control-allows-merge-request-creator-to-bypass-locked-status&quot;&gt;Improper Access Control allows Merge Request creator to bypass locked status&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#projects-api-discloses-id-and-name-of-private-groups&quot;&gt;Projects API discloses ID and name of private groups&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#severity-of-an-incident-can-be-changed-by-a-guest-user&quot;&gt;Severity of an incident can be changed by a guest user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#system-root-password-accidentally-written-to-log-file&quot;&gt;System root password accidentally written to log file&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#potential-dos-via-a-malformed-tiff-image&quot;&gt;Potential DoS via a malformed TIFF image&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypass-of-codeowners-merge-request-approval-requirement&quot;&gt;Bypass of CODEOWNERS Merge Request approval requirement&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#change-project-visibility-to-a-restricted-option&quot;&gt;Change project visibility to a restricted option&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#project-exports-leak-external-webhook-token-value&quot;&gt;Project exports leak external webhook token value&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#invited-group-members-with-access-inherited-from-parent-group-continue-to-have-project-access-even-after-invited-subgroup-is-transfered&quot;&gt;Invited group members, with access inherited from parent group, continue to have project access even after invited subgroup is transfered&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#scim-token-is-visible-after-creation&quot;&gt;SCIM token is visible after creation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#regular-expression-denial-of-service-issue-when-cleaning-namespace-path&quot;&gt;Regular expression denial of service issue when cleaning namespace path&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#prevent-creation-of-scopeless-apps-using-applications-api&quot;&gt;Prevent creation of scopeless apps using applications API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#webhook-data-exposes-assignee&#x27;s-private-email-address&quot;&gt;Webhook data exposes assignee&#x27;s private email address&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stored-xss-via-ipynb-files&quot;&gt;Stored XSS via ipynb files&lt;&#x2F;h2&gt;

&lt;p&gt;Improper validation of ipynb files in GitLab CE&#x2F;EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim&#x27;s behalf. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39906&quot;&gt;CVE-2021-39906&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @saleemrashid for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unicode-characters-can-be-abused-to-commit-malicious-code-into-projects-without-notice&quot;&gt;Unicode characters can be abused to commit malicious code into projects without notice&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE, certain Unicode characters can be abused to commit malicious code into projects without being noticed in merge request or source code viewer UI. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39908&quot;&gt;CVE-2021-39908&lt;&#x2F;a&gt;. The general attack vector was also assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-42574&quot;&gt;CVE-2021-42574&lt;&#x2F;a&gt; by the original researchers and is known as a &quot;Trojan Source Attack&quot;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @nickboucher for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipeline-schedules-on-imported-projects-can-be-set-to-automatically-active-after-import&quot;&gt;Pipeline schedules on imported projects can be set to automatically active after import&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:L&lt;&#x2F;code&gt;, 6.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39895&quot;&gt;CVE-2021-39895&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @justas_b for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-denial-of-service-via-workhorse&quot;&gt;Potential Denial of service via Workhorse&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab CE&#x2F;EE starting with version 13.7. The stripping of EXIF data from certain images resulted in high CPU usage. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39907&quot;&gt;CVE-2021-39907&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ajxchapman for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-allows-merge-request-creator-to-bypass-locked-status&quot;&gt;Improper Access Control allows Merge Request creator to bypass locked status&lt;&#x2F;h2&gt;

&lt;p&gt;An Improper Access Control vulnerability in the GraphQL API in GitLab CE&#x2F;EE since version 13.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39904&quot;&gt;CVE-2021-39904&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @jimeno for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;projects-api-discloses-id-and-name-of-private-groups&quot;&gt;Projects API discloses ID and name of private groups&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure vulnerability in the GitLab CE&#x2F;EE API since version 8.9.6 allows a user to see basic information on private groups that a public project has been shared with. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39905&quot;&gt;CVE-2021-39905&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @rafiem for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;severity-of-an-incident-can-be-changed-by-a-guest-user&quot;&gt;Severity of an incident can be changed by a guest user&lt;&#x2F;h2&gt;

&lt;p&gt;Incorrect Authorization in GitLab CE&#x2F;EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39902&quot;&gt;CVE-2021-39902&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @cradlr for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;system-root-password-accidentally-written-to-log-file&quot;&gt;System root password accidentally written to log file&lt;&#x2F;h2&gt;

&lt;p&gt;Accidental logging of system root password in the migration log in all versions of GitLab CE&#x2F;EE allows an attacker with local file system access to obtain system root-level privileges. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:L&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39913&quot;&gt;CVE-2021-39913&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-dos-via-a-malformed-tiff-image&quot;&gt;Potential DoS via a malformed TIFF image&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DoS vulnerability was discovered in GitLab CE&#x2F;EE starting with version 13.7. Using a malformed TIFF images was possible to trigger memory exhaustion. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39912&quot;&gt;CVE-2021-39912&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @haquaman for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-of-codeowners-merge-request-approval-requirement&quot;&gt;Bypass of CODEOWNERS Merge Request approval requirement&lt;&#x2F;h2&gt;

&lt;p&gt;Lack of email address ownership verification in the CODEOWNERS feature in all versions of GitLab EE since version 11.3 allows an attacker to bypass CODEOWNERS Merge Request approval requirement under rare circumstances. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39909&quot;&gt;CVE-2021-39909&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @vaib25vicky for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;change-project-visibility-to-a-restricted-option&quot;&gt;Change project visibility to a restricted option&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 13.0, a low privileged user, through an API call, can change the visibility level of a group or a project to a restricted option even after the instance administrator sets that visibility option as restricted in settings. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39903&quot;&gt;CVE-2021-39903&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @s4nderdevelopment for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-exports-leak-external-webhook-token-value&quot;&gt;Project exports leak external webhook token value&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 10.6, a project export leaks the external webhook token value which may allow access to the project which it was exported from. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39898&quot;&gt;CVE-2021-39898&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @xanbanx for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;invited-group-members-with-access-inherited-from-parent-group-continue-to-have-project-access-even-after-invited-subgroup-is-transfered&quot;&gt;Invited group members, with access inherited from parent group, continue to have project access even after invited subgroup is transfered&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control in GitLab CE&#x2F;EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39897&quot;&gt;CVE-2021-39897&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;scim-token-is-visible-after-creation&quot;&gt;SCIM token is visible after creation&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 11.10, an admin of a group can see the SCIM token of that group by visiting a specific endpoint. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39901&quot;&gt;CVE-2021-39901&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-issue-when-cleaning-namespace-path&quot;&gt;Regular expression denial of service issue when cleaning namespace path&lt;&#x2F;h2&gt;

&lt;p&gt;A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0
could cause excessive usage of resources when a specially crafted username was used when provisioning a new user. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39914&quot;&gt;CVE-2021-39914&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prevent-creation-of-scopeless-apps-using-applications-api&quot;&gt;Prevent creation of scopeless apps using applications API&lt;&#x2F;h2&gt;

&lt;p&gt;The application api in GitLab CE&#x2F;EE version 10.5 and above allowed creation of scopeless apps. This is a low severity issue and is now mitigated in latest release.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team&lt;&#x2F;p&gt;

&lt;h2 id=&quot;webhook-data-exposes-assignees-private-email-address&quot;&gt;Webhook data exposes assignee&#x27;s private email address&lt;&#x2F;h2&gt;

&lt;p&gt;An improper access control flaw in GitLab CE&#x2F;EE since version 13.9 exposes private email address of Issue and Merge Requests assignee to Webhook data consumers. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:P&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 1.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39914&quot;&gt;CVE-2021-39911&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-redis&quot;&gt;Update Redis&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Redis included in GitLab Omnibus has been updated to 6.0.16 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl&quot;&gt;Update OpenSSL&lt;&#x2F;h2&gt;

&lt;p&gt;The version of OpenSSL included in GitLab Omnibus has been updated to 1.1.1l in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-curl&quot;&gt;Update Curl&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Curl included in GitLab Omnibus has been updated to 7.79.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.4 released with Scheduled DAST scans and Integrated error tracking</title>
<release>14.4</release>
<link href='https://about.gitlab.com/releases/2021/10/22/gitlab-14-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/10/22/gitlab-14-4-released/</id>
<published>2021-10-22T00:00:00+00:00</published>
<updated>2021-10-22T00:00:00+00:00</updated>
<author>
<name>Orit Golowinski</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;Today, we are excited to announce the release of GitLab &lt;code&gt;14.4&lt;&#x2F;code&gt; with &lt;a href=&quot;#scheduled-dast-scans&quot;&gt;Scheduled DAST scans&lt;&#x2F;a&gt;, &lt;a href=&quot;#integrated-error-tracking-inside-gitlab-without-a-sentry-instance&quot;&gt;Integrated error tracking inside GitLab without a Sentry instance&lt;&#x2F;a&gt;, &lt;a href=&quot;#remote-repositories-for-gitlab-in-visual-studio-code&quot;&gt;Remote Repositories for GitLab in Visual Studio Code&lt;&#x2F;a&gt;, &lt;a href=&quot;#devops-adoption-trend-graph&quot;&gt;DevOps Adoption trend graph&lt;&#x2F;a&gt;, &lt;a href=&quot;#the-gitlab-operator-is-generally-available&quot;&gt;GA for GitLab Operator&lt;&#x2F;a&gt; and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the &lt;code&gt;30+&lt;&#x2F;code&gt; improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.5 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_4&#x2F;14_4-cover-image.jpeg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.3.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/10/12/gitlab-14-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/10/12/gitlab-14-3-3-released/</id>
<published>2021-10-12T00:00:00+00:00</published>
<updated>2021-10-12T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.3.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;09&#x2F;22&#x2F;gitlab-14-3-released&#x2F;&quot;&gt;this month&#x27;s 14.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71511&quot;&gt;Fix dependency proxy image prefix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71606&quot;&gt;Drop taggings index if exists during migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71694&quot;&gt;Fix 2FA setup for users with no password&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71909&quot;&gt;Disable caching of MergeToRefService call in mergeability check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5647&quot;&gt;Delay praefect database_*_no_proxy removals&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5650&quot;&gt;Update cacerts to 2021-09-30&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;784&quot;&gt;Symlink OpenSSL default cert file to Debian cert path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.3.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/10/01/gitlab-14-3-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/10/01/gitlab-14-3-2-released/</id>
<published>2021-10-01T00:00:00+00:00</published>
<updated>2021-10-01T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.3.2 GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;09&#x2F;22&#x2F;gitlab-14-3-released&#x2F;&quot;&gt;the 14.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70726&quot;&gt;Add OR REPLACE when creating function&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70751&quot;&gt;Top 7 Highlight items for 14.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71037&quot;&gt;Update GitLab Shell to v13.21.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71192&quot;&gt;Remove feature flag check for candece finder&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;71311&quot;&gt;Remove unexpected FK prior to swapping columns&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;768&quot;&gt;Allow ee images to be skipped on CE pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70750&quot;&gt;Bump kas to v14.3.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.3.1, 14.2.5, and 14.1.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/30/security-release-gitlab-14-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/30/security-release-gitlab-14-3-1-released/</id>
<published>2021-09-30T00:00:00+00:00</published>
<updated>2021-09-30T00:00:00+00:00</updated>
<author>
<name>Michael Henriksen</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.3.1, 14.2.5, and 14.1.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-merge-request-creation-page&quot;&gt;Stored XSS in merge request creation page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-attack-in-markdown-parser&quot;&gt;Denial-of-service attack in Markdown parser&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-cross-site-scripting-vulnerability-in-the-gitlab-flavored-markdown&quot;&gt;Stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dns-rebinding-vulnerability-in-gitea-importer&quot;&gt;DNS Rebinding vulnerability in Gitea importer&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#exposure-of-trigger-tokens-on-project-exports&quot;&gt;Exposure of trigger tokens on project exports&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-access-control-for-users-with-expired-password&quot;&gt;Improper access control for users with expired password&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#access-tokens-are-not-cleared-after-impersonation&quot;&gt;Access tokens are not cleared after impersonation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#reflected-cross-site-scripting-in-jira-integration&quot;&gt;Reflected Cross-Site Scripting in Jira Integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#dns-rebinding-vulnerability-in-fogbugz-importer&quot;&gt;DNS Rebinding vulnerability in Fogbugz importer&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#access-tokens-persist-after-project-deletion&quot;&gt;Access tokens persist after project deletion&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-enumeration-vulnerability&quot;&gt;User enumeration vulnerability&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#potential-dos-via-api-requests&quot;&gt;Potential DOS via API requests&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#pending-invitations-of-public-groups-and-public-projects-are-visible-to-any-user&quot;&gt;Pending invitations of public groups and public projects are visible to any user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypass-disabled-repo-by-url-project-creation&quot;&gt;Bypass Disabled Repo by URL Project Creation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#low-privileged-users-can-see-names-of-the-private-groups-shared-in-projects&quot;&gt;Low privileged users can see names of the private groups shared in projects&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#api-discloses-sensitive-info-to-low-privileged-users&quot;&gt;API discloses sensitive info to low privileged users&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#epic-listing-do-not-honour-group-memberships&quot;&gt;Epic listing do not honour group memberships&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#insecure-direct-object-reference-vulnerability-may-lead-to-protected-branch-names-getting-disclosed&quot;&gt;Insecure Direct Object Reference vulnerability may lead to protected branch names getting disclosed&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#low-privileged-users-can-import-users-from-projects-that-they-they-are-not-a-maintainer-on&quot;&gt;Low privileged users can import users from projects that they they are not a maintainer on&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#potential-dos-via-dependencies-api&quot;&gt;Potential DOS via dependencies API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#create-a-project-with-unlimited-repository-size-through-malicious-project-import&quot;&gt;Create a project with unlimited repository size through malicious Project Import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#bypass-disabled-bitbucket-server-import-source-project-creation&quot;&gt;Bypass disabled Bitbucket Server import source project creation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#requirement-to-enforce-2fa-is-not-honored-when-using-git-commands&quot;&gt;Requirement to enforce 2FA is not honored when using git commands&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#content-spoofing-vulnerability&quot;&gt;Content spoofing vulnerability&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-session-management-in-impersonation-feature&quot;&gt;Improper session management in impersonation feature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#create-oauth-application-with-arbitrary-scopes-through-content-spoofing&quot;&gt;Create OAuth application with arbitrary scopes through content spoofing&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ldap-users-can-bypass-2fa-and-load-certain-pages-with-http-basic-auth&quot;&gt;LDAP users can bypass 2FA and load certain pages with HTTP Basic Auth&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#lack-of-account-lockout-on-change-password-functionality&quot;&gt;Lack of account lockout on change password functionality&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#epic-reference-was-not-updated-while-moved-between-groups&quot;&gt;Epic reference was not updated while moved between groups&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#missing-authentication-allows-disabling-of-two-factor-authentication&quot;&gt;Missing authentication allows disabling of two-factor authentication&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#information-disclosure-in-sendentry&quot;&gt;Information disclosure in SendEntry&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stored-xss-in-merge-request-creation-page&quot;&gt;Stored XSS in merge request creation page&lt;&#x2F;h2&gt;

&lt;p&gt;A Stored XSS in merge request creation page in Gitlab EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim&#x27;s behalf via malicious approval rule names. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39885&quot;&gt;CVE-2021-39885&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-attack-in-markdown-parser&quot;&gt;Denial-of-service attack in Markdown parser&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability was discovered in GitLab starting with version 12.2 that allows an attacker to cause uncontrolled resource consumption with a specially crafted file. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39877&quot;&gt;CVE-2021-39877&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks phill for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-cross-site-scripting-vulnerability-in-the-gitlab-flavored-markdown&quot;&gt;Stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown&lt;&#x2F;h2&gt;

&lt;p&gt;A stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown in GitLab CE&#x2F;EE version 8.4 and above allowed an attacker to execute arbitrary JavaScript code on the victim&#x27;s behalf. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39887&quot;&gt;CVE-2021-39887&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks saleemrashid for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dns-rebinding-vulnerability-in-gitea-importer&quot;&gt;DNS Rebinding vulnerability in Gitea importer&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.15, a DNS rebinding vulnerability in Gitea Importer may be exploited by an attacker to trigger Server Side Request Forgery (SSRF) attacks. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39867&quot;&gt;CVE-2021-39867&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was found internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exposure-of-trigger-tokens-on-project-exports&quot;&gt;Exposure of trigger tokens on project exports&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.9, project exports may expose trigger tokens configured on that project. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39869&quot;&gt;CVE-2021-39869&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @mishre for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-for-users-with-expired-password&quot;&gt;Improper access control for users with expired password&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 14.1, an improper access control vulnerability allows users with expired password to still access GitLab through git and API through access tokens acquired before password expiration. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39872&quot;&gt;CVE-2021-39872&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;access-tokens-are-not-cleared-after-impersonation&quot;&gt;Access tokens are not cleared after impersonation&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.0, access tokens created as part of admin&#x27;s impersonation of a user are not cleared at the end of impersonation which may lead to unnecessary sensitive info disclosure. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39891&quot;&gt;CVE-2021-39891&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reflected-cross-site-scripting-in-jira-integration&quot;&gt;Reflected Cross-Site Scripting in Jira Integration&lt;&#x2F;h2&gt;

&lt;p&gt;A stored Reflected Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.0 up to 14.3.1 allowed an attacker to execute arbitrary javascript code. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39878&quot;&gt;CVE-2021-39878&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks ooooooo_q for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dns-rebinding-vulnerability-in-fogbugz-importer&quot;&gt;DNS Rebinding vulnerability in Fogbugz importer&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.0, a DNS rebinding vulnerability exists in Fogbugz importer which may be used by attackers to exploit Server Side Request Forgery attacks. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39894&quot;&gt;CVE-2021-39894&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;access-tokens-persist-after-project-deletion&quot;&gt;Access tokens persist after project deletion&lt;&#x2F;h2&gt;

&lt;p&gt;A business logic error in the project deletion process in GitLab 13.6 and later allows persistent access via project access tokens. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39866&quot;&gt;CVE-2021-39866&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks joaxcar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-enumeration-vulnerability&quot;&gt;User enumeration vulnerability&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE, provided a user ID, anonymous users can use a few endpoints to retrieve information about any GitLab user. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39882&quot;&gt;CVE-2021-39882&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was found internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-dos-via-api-requests&quot;&gt;Potential DOS via API requests&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab starting with version 9.1 that allowed parsing files without authorisation. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39893&quot;&gt;CVE-2021-39893&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pending-invitations-of-public-groups-and-public-projects-are-visible-to-any-user&quot;&gt;Pending invitations of public groups and public projects are visible to any user&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 13.6, it is possible to see pending invitations of any public group or public project by visiting an API endpoint. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39875&quot;&gt;CVE-2021-39875&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-disabled-repo-by-url-project-creation&quot;&gt;Bypass Disabled Repo by URL Project Creation&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 11.11, an instance that has the setting to disable Repo by URL import enabled is bypassed by an attacker making a crafted API call. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39870&quot;&gt;CVE-2021-39870&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;low-privileged-users-can-see-names-of-the-private-groups-shared-in-projects&quot;&gt;Low privileged users can see names of the private groups shared in projects&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab EE since version 8.13, an endpoint discloses names of private groups that have access to a project to low privileged users that are part of that project. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39884&quot;&gt;CVE-2021-39884&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-discloses-sensitive-info-to-low-privileged-users&quot;&gt;API discloses sensitive info to low privileged users&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab EE since version 13.10, a specific API endpoint may reveal details about a private group and other sensitive info inside issue and merge request templates. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39888&quot;&gt;CVE-2021-39888&lt;&#x2F;a&gt;.
Thanks @0xn3va for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;epic-listing-do-not-honour-group-memberships&quot;&gt;Epic listing do not honour group memberships&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization checks in GitLab EE &amp;gt; 13.11 allows subgroup members to see epics from all parent subgroups. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39883&quot;&gt;CVE-2021-39883&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-direct-object-reference-vulnerability-may-lead-to-protected-branch-names-getting-disclosed&quot;&gt;Insecure Direct Object Reference vulnerability may lead to protected branch names getting disclosed&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39889&quot;&gt;CVE-2021-39889&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;low-privileged-users-can-import-users-from-projects-that-they-they-are-not-a-maintainer-on&quot;&gt;Low privileged users can import users from projects that they they are not a maintainer on&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 12.0, a lower privileged user can import users from projects that they don&#x27;t have a maintainer role on and disclose email addresses of those users. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39892&quot;&gt;CVE-2021-39892&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-dos-via-dependencies-api&quot;&gt;Potential DOS via dependencies API&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab EE starting with version 12.6 due to lack of pagination in dependencies API. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22259&quot;&gt;CVE-2021-22259&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;create-a-project-with-unlimited-repository-size-through-malicious-project-import&quot;&gt;Create a project with unlimited repository size through malicious Project Import&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39868&quot;&gt;CVE-2021-39868&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ngalog for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-disabled-bitbucket-server-import-source-project-creation&quot;&gt;Bypass disabled Bitbucket Server import source project creation&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 13.0, an instance that has the setting to disable Bitbucket Server import enabled is bypassed by an attacker making a crafted API call. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39871&quot;&gt;CVE-2021-39871&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was discovered internally by a member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;requirement-to-enforce-2fa-is-not-honored-when-using-git-commands&quot;&gt;Requirement to enforce 2FA is not honored when using git commands&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 11.0, the requirement to enforce 2FA is not honored when using git commands. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39874&quot;&gt;CVE-2021-39874&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @melar_dev for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;content-spoofing-vulnerability&quot;&gt;Content spoofing vulnerability&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE, there exists a content spoofing vulnerability which may be leveraged by attackers to trick users into visiting a malicious website by spoofing the content in an error response. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39873&quot;&gt;CVE-2021-39873&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @w00t1 for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-session-management-in-impersonation-feature&quot;&gt;Improper session management in impersonation feature&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 8.0, when an admin uses the impersonate feature twice and stops impersonating, the admin may be logged in as the second user they impersonated, which may lead to repudiation issues. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39896&quot;&gt;CVE-2021-39896&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was reported to GitLab by a customer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;create-oauth-application-with-arbitrary-scopes-through-content-spoofing&quot;&gt;Create OAuth application with arbitrary scopes through content spoofing&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39881&quot;&gt;CVE-2021-39881&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @executor for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ldap-users-can-bypass-2fa-and-load-certain-pages-with-http-basic-auth&quot;&gt;LDAP users can bypass 2FA and load certain pages with HTTP Basic Auth&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible to bypass 2FA for LDAP users and access some specific pages with Basic Authentication in GitLab 14.1.1 and above. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39890&quot;&gt;CVE-2021-39890&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;lack-of-account-lockout-on-change-password-functionality&quot;&gt;Lack of account lockout on change password functionality&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab CE&#x2F;EE, an attacker with access to a user’s session may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by splitting the attack over several IP addresses. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:P&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39899&quot;&gt;CVE-2021-39899&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;epic-reference-was-not-updated-while-moved-between-groups&quot;&gt;Epic reference was not updated while moved between groups&lt;&#x2F;h2&gt;

&lt;p&gt;Permissions rules were not applied while issues were moved between projects of the same group in GitLab versions starting with 10.6 and up to 14.1.7 allowing users to read confidential Epic references. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39886&quot;&gt;CVE-2021-39886&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-authentication-allows-disabling-of-two-factor-authentication&quot;&gt;Missing authentication allows disabling of two-factor authentication&lt;&#x2F;h2&gt;

&lt;p&gt;Missing authentication in all versions of GitLab CE&#x2F;EE since version 7.11.0 allows an attacker with access to a victim&#x27;s session to disable two-factor authentication. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:L&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.2). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39879&quot;&gt;CVE-2021-39879&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-in-sendentry&quot;&gt;Information disclosure in SendEntry&lt;&#x2F;h2&gt;

&lt;p&gt;Information disclosure from SendEntry in GitLab starting with 10.8 allowed exposure of full URL of artifacts stored in object-storage with a temporary availability via Rails logs. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-39900&quot;&gt;CVE-2021-39900&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.1.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/27/gitlab-14-1-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/27/gitlab-14-1-6-released/</id>
<published>2021-09-27T00:00:00+00:00</published>
<updated>2021-09-27T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.1.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;07&#x2F;22&#x2F;gitlab-14-1-released&#x2F;&quot;&gt;this month&#x27;s 14.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3835&quot;&gt;Derive virtual storage&#x27;s filesystem id from its name&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70429&quot;&gt;Fix Elastic::MigrationWorker current_migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/27/gitlab-14-0-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/27/gitlab-14-0-11-released/</id>
<published>2021-09-27T00:00:00+00:00</published>
<updated>2021-09-27T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.0.11 GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;the 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3834&quot;&gt;Derive virtual storage&#x27;s filesystem id from its name&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70429&quot;&gt;Fix Elastic::MigrationWorker current_migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.3 releases Project Security Policies &amp; Next Gen SAST</title>
<release>14.3</release>
<link href='https://about.gitlab.com/releases/2021/09/22/gitlab-14-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/22/gitlab-14-3-released/</id>
<published>2021-09-22T00:00:00+00:00</published>
<updated>2021-09-22T00:00:00+00:00</updated>
<author>
<name>Nicole Schwartz</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 14.3 with &lt;a href=&quot;#project-level-dast-and-secret-detection-scan-execution-policies&quot;&gt;project-level security scan execution policies&lt;&#x2F;a&gt;, &lt;a href=&quot;#next-generation-sast-to-reduce-ruby-false-positives&quot;&gt;next generation SAST to reduce Ruby false positives&lt;&#x2F;a&gt;, &lt;a href=&quot;#group-level-permissions-for-protected-environments&quot;&gt;group-level permissions for protected environments&lt;&#x2F;a&gt;, &lt;a href=&quot;#grant-group-access-to-the-gitlab-agents-cicd-tunnel&quot;&gt;group access for the GitLab Agent for Kubernetes&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 40+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.4 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_3&#x2F;14_3-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/22/gitlab-13-12-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/22/gitlab-13-12-12-released/</id>
<published>2021-09-22T00:00:00+00:00</published>
<updated>2021-09-22T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.12.12 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;the 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3833&quot;&gt;Derive virtual storage&#x27;s filesystem id from its name&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5564&quot;&gt;Allow Raspberry Pi builds on Graviton&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;733&quot;&gt;Stop pinning versions of perl related packages in UBI images&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.2.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/17/gitlab-14-2-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/17/gitlab-14-2-4-released/</id>
<published>2021-09-17T00:00:00+00:00</published>
<updated>2021-09-17T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.2.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;08&#x2F;22&#x2F;gitlab-14-2-released&#x2F;&quot;&gt;last month&#x27;s 14.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70383&quot;&gt;Removes cleanup job from Terraform.latest&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5575&quot;&gt;Run AWS Release rake task only if on latest stable tag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;70429&quot;&gt;Fix Elastic::MigrationWorker current_migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3838&quot;&gt;Derive virtual storage&#x27;s filesystem id from its name&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.10 and 14.1.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/02/gitlab-14-0-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/02/gitlab-14-0-10-released/</id>
<published>2021-09-02T00:00:00+00:00</published>
<updated>2021-09-02T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.0.10 and 14.1.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs in the
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;14.0&lt;&#x2F;a&gt; and
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;07&#x2F;22&#x2F;gitlab-14-1-released&#x2F;&quot;&gt;14.1&lt;&#x2F;a&gt; releases.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The main purpose of these two releases is to resolve &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;issues&#x2F;3754&quot;&gt;high CPU usage by the
Gitaly server&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3807&quot;&gt;Only activate Git pack-objects hook if cache is enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3825&quot;&gt;Backport improved replication logic&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Additionally, 14.1.5 includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;67624&quot;&gt;Geo: Replicate multi-arch containers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5575&quot;&gt;Run AWS Release rake task only if on latest stable tag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/02/gitlab-13-12-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/02/gitlab-13-12-11-released/</id>
<published>2021-09-02T00:00:00+00:00</published>
<updated>2021-09-02T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.12.11 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;the 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The main purpose of this release is to resolve &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;issues&#x2F;3754&quot;&gt;high CPU usage by the Gitaly
server&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3807&quot;&gt;Only activate Git pack-objects hook if cache is enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3825&quot;&gt;Backport improved replication logic&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.2.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/09/01/gitlab-14-2-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/09/01/gitlab-14-2-3-released/</id>
<published>2021-09-01T00:00:00+00:00</published>
<updated>2021-09-01T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.2.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;08&#x2F;22&#x2F;gitlab-14-2-released&#x2F;&quot;&gt;last month&#x27;s 14.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;67624&quot;&gt;Geo: Replicate multi-arch containers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68586&quot;&gt;Reset severity_levels default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68601&quot;&gt;Create 14.2 In-app top 7 product highlights&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68784&quot;&gt;Fix OrphanedInviteTokensCleanup migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68803&quot;&gt;Fix Live Markdown Preview in personal and subgroup projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68865&quot;&gt;Downgrade grpc from 1.38.0 to 1.30.2 for compatibility with older CPUs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;742&quot;&gt;Restore proper contents to toolbox ubi8 image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3815&quot;&gt;Only activate Git pack-objects hook if cache is enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does include post deploy db migrations. For multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;it should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.2.2, 14.1.4, and 14.0.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/08/31/security-release-gitlab-14-2-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/31/security-release-gitlab-14-2-2-released/</id>
<published>2021-08-31T00:00:00+00:00</published>
<updated>2021-08-31T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.2.2, 14.1.4, and 14.0.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-datadog-integration&quot;&gt;Stored XSS in DataDog Integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#invited-group-members-continue-to-have-project-access-even-after-invited-group-is-deleted&quot;&gt;Invited group members continue to have project access even after invited group is deleted&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#specially-crafted-requests-to-apollo_upload_server-middleware-leads-to-denial-of-service&quot;&gt;Specially crafted requests to apollo_upload_server middleware leads to denial of service&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#privilege-escalation-of-an-external-user-through-project-token&quot;&gt;Privilege escalation of an external user through project token&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#missing-access-control-allows-non-admin-users-to-addremove-jira-connect-namespaces&quot;&gt;Missing access control allows non-admin users to add&#x2F;remove Jira Connect Namespaces&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#user-enumeration-on-private-instances&quot;&gt;User enumeration on private instances&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#member-e-mails-can-be-revealed-via-project-importexport-feature&quot;&gt;Member e-mails can be revealed via project import&#x2F;export feature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-jira-integration&quot;&gt;Stored XSS in Jira integration&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-markdown-via-the-design-reference&quot;&gt;Stored XSS in markdown via the Design reference&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stored-xss-in-datadog-integration&quot;&gt;Stored XSS in DataDog Integration&lt;&#x2F;h2&gt;

&lt;p&gt;A stored Cross-Site Scripting vulnerability in the DataDog integration in GitLab CE&#x2F;EE version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim&#x27;s behalf. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.7). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks shells3c for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;invited-group-members-continue-to-have-project-access-even-after-invited-group-is-deleted&quot;&gt;Invited group members continue to have project access even after invited group is deleted&lt;&#x2F;h2&gt;

&lt;p&gt;Under specialized conditions, an invited group member may continue to have access to a project even after the invited group, which the member was part of, is deleted. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the member of the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;specially-crafted-requests-to-apollo_upload_server-middleware-leads-to-denial-of-service&quot;&gt;Specially crafted requests to apollo_upload_server middleware leads to denial of service&lt;&#x2F;h2&gt;

&lt;p&gt;A Denial Of Service vulnerability in the apollo_upload_server Ruby gem in GitLab CE&#x2F;EE version 11.11 and above allows an attacker to deny access to all users via specially crafted requests to the apollo_upload_server middleware. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks 0xn3va for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-of-an-external-user-through-project-token&quot;&gt;Privilege escalation of an external user through project token&lt;&#x2F;h2&gt;

&lt;p&gt;A user account with &#x27;external&#x27; status which is granted &#x27;Maintainer&#x27; role on any project on the GitLab instance where &#x27;project tokens&#x27; are allowed may elevate its privilege to &#x27;Internal&#x27; and access Internal projects. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.5). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @joaxcar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-access-control-allows-non-admin-users-to-addremove-jira-connect-namespaces&quot;&gt;Missing access control allows non-admin users to add&#x2F;remove Jira Connect Namespaces&lt;&#x2F;h2&gt;

&lt;p&gt;Missing access control in GitLab version 13.10 and above with Jira Cloud integration enabled allows Jira users without administrative privileges to add and remove Jira Connect Namespaces via the GitLab.com for Jira Cloud application configuration page. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.4). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks updatelap for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-enumeration-on-private-instances&quot;&gt;User enumeration on private instances&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 14.0 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. The route for &#x2F;user.keys is not restricted on instances with public visibility disabled. This allows user enumeration on such instances. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22257&quot;&gt;CVE-2021-22257&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab would like to thank a customer who reported this issue.&lt;&#x2F;p&gt;

&lt;p&gt;Upgrade note: Please be aware that the fix for this finding makes the &lt;code&gt;&#x2F;:username.keys&lt;&#x2F;code&gt; and &lt;code&gt;&#x2F;api&#x2F;v4&#x2F;users&#x2F;:id&#x2F;keys&lt;&#x2F;code&gt; endpoints behave the same. The result is that these endpoints will not be publicly accessible when the restricted public visibility setting is enabled by the instance admin. This could result in some workflows breaking. In this situation, the solution would be to create a Personal Access Token with the &lt;code&gt;read_user&lt;&#x2F;code&gt; scope.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;member-e-mails-can-be-revealed-via-project-importexport-feature&quot;&gt;Member e-mails can be revealed via project import&#x2F;export feature&lt;&#x2F;h2&gt;

&lt;p&gt;The project import&#x2F;export feature in GitLab 8.9 and greater could be used to obtain otherwise private email addresses. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22258&quot;&gt;CVE-2021-22258&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks ngalog for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-jira-integration&quot;&gt;Stored XSS in Jira integration&lt;&#x2F;h2&gt;

&lt;p&gt;A stored Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim&#x27;s behalf via malicious Jira API responses. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.0). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks thornguyen for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-markdown-via-the-design-reference&quot;&gt;Stored XSS in markdown via the Design reference&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 13.3. GitLab was vulnerable to a stored XSS by using the design feature in issues. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22238&quot;&gt;CVE-2021-22238&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks vakzz for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-curl&quot;&gt;Update cURL&lt;&#x2F;h2&gt;

&lt;p&gt;The version of cURL included in GitLab Omnibus has been updated to 7.77.0 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-postgresql&quot;&gt;Update PostgreSQL&lt;&#x2F;h2&gt;

&lt;p&gt;The version of PostgreSQL that is bundled with GitLab Omnibus was updated to 12.7 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;patch-nginx&quot;&gt;Patch nginx&lt;&#x2F;h2&gt;

&lt;p&gt;A patch was applied in GitLab Omnibus version 14.0.9 to mitigate a security concern related to nginx. Versions 14.1 and later already contain fixes for this security concern.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 14.0 until 14.0.9&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/08/26/gitlab-14-0-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/26/gitlab-14-0-8-released/</id>
<published>2021-08-26T00:00:00+00:00</published>
<updated>2021-08-26T00:00:00+00:00</updated>
<author>
<name>Reuben Pereira</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.0.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;the 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66627&quot;&gt;Revert backfill on ci_build_trace_sections&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;67288&quot;&gt;Resolve &quot;operator does not exist: integer[] || bigint in app&#x2F;models&#x2F;namespace&#x2F;traversal_hierarchy.rb&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68771&quot;&gt;Fix Sidekiq workers delete each other&#x27;s metrics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68867&quot;&gt;Geo 2.0 Regression - Add ability to remove primary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68959&quot;&gt;Backport fix for flaky spec to 14.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a post deploy migration. For multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;it should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/08/23/gitlab-14-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/23/gitlab-14-2-1-released/</id>
<published>2021-08-23T00:00:00+00:00</published>
<updated>2021-08-23T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.2.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;08&#x2F;22&#x2F;gitlab-14-2-released&#x2F;&quot;&gt;this month&#x27;s 14.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68088&quot;&gt;Adding upgrade messaging for PK migrations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68313&quot;&gt;Don&#x27;t override vulnerability feedback UUID anymore&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68503&quot;&gt;Reorder vulnerability check criteria&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68583&quot;&gt;Fix &quot;getAction is undefined&quot; bug&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68710&quot;&gt;Drop un-used db&#x2F;ci_migrate symlink&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5552&quot;&gt;Fix migration NameError in rails env helper&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;740&quot;&gt;Bump Container Registry to v3.9.0-gitlab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.2 released with the Build Cloud for macOS beta and Markdown preview</title>
<release>14.2</release>
<link href='https://about.gitlab.com/releases/2021/08/22/gitlab-14-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/22/gitlab-14-2-released/</id>
<published>2021-08-22T00:00:00+00:00</published>
<updated>2021-08-22T00:00:00+00:00</updated>
<author>
<name>Taylor McCaslin</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 14.2 with  &lt;a href=&quot;#gitlab-build-cloud-for-macos-beta&quot;&gt;introduction of the Build Cloud for macOS beta&lt;&#x2F;a&gt;, &lt;a href=&quot;#preview-markdown-live-while-editing&quot;&gt;Markdown preview&lt;&#x2F;a&gt;, &lt;a href=&quot;#launch-a-preconfigured-gitpod-workspace-from-a-merge-request&quot;&gt;expanded Gitpod integration&lt;&#x2F;a&gt;, &lt;a href=&quot;#track-use-of-dependency-scanning-and-fuzz-testing&quot;&gt;new DevOps adoption metrics&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights of the 50+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.3 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_2&#x2F;14_2-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.1.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/08/17/gitlab-14-1-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/17/gitlab-14-1-3-released/</id>
<published>2021-08-17T00:00:00+00:00</published>
<updated>2021-08-17T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.1.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;07&#x2F;22&#x2F;gitlab-14-1-released&#x2F;&quot;&gt;last month&#x27;s 14.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66791&quot;&gt;AS Fix SAML SSO login redirects not working&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66806&quot;&gt;Bump kas to v14.1.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;67288&quot;&gt;Resolve &lt;code&gt;operator does not exist: integer[] || bigint in app&#x2F;models&#x2F;namespace&#x2F;traversal_hierarchy.rb&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;68005&quot;&gt;Geo 2.0 Regression - Add ability to remove primary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5513&quot;&gt;Add AES256-GCM-SHA384 to allowed list of Nginx SSL ciphers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/08/10/gitlab-13-12-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/10/gitlab-13-12-10-released/</id>
<published>2021-08-10T00:00:00+00:00</published>
<updated>2021-08-10T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.12.10 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;May&#x27;s 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66432&quot;&gt;Fix: Sidekiq workers delete each other&#x27;s metrics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65504&quot;&gt;Do not create audit event for failed logins on read-only DB&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65954&quot;&gt;Fix validation method regarding MIME type keys&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;67288&quot;&gt;Resolve &quot;operator does not exist&quot; in app&#x2F;models&#x2F;namespace&#x2F;traversal_hierarchy.rb&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;663&quot;&gt;gitlab-rails: checks&#x2F;postgresql detect silent NoDatabaseError&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;678&quot;&gt;Adding -ubi8 to version to find UBI images&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.1.2, 14.0.7, and 13.12.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/08/03/security-release-gitlab-14-1-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/08/03/security-release-gitlab-14-1-2-released/</id>
<published>2021-08-03T00:00:00+00:00</published>
<updated>2021-08-03T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.1.2, 14.0.7, and 13.12.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;recommended-action&quot;&gt;Recommended Action&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version affected by the issues described below are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-mermaid-when-viewing-markdown-files&quot;&gt;Stored XSS in Mermaid when viewing Markdown files&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-default-branch-name&quot;&gt;Stored XSS in default branch name&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#perform-git-actions-with-an-impersonation-token-even-if-impersonation-is-disabled&quot;&gt;Perform Git actions with an impersonation token even if impersonation is disabled&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#tag-and-branch-name-confusion-allows-developer-to-access-protected-ci-variables&quot;&gt;Tag and branch name confusion allows Developer to access protected CI variables&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#new-subscriptions-generate-oauth-tokens-on-an-incorrect-oauth-client-application&quot;&gt;New subscriptions generate OAuth tokens on an incorrect OAuth client application&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#ability-to-list-and-delete-impersonation-tokens-for-your-own-user&quot;&gt;Ability to list and delete impersonation tokens for your own user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#pipelines-page-is-partially-visible-for-users-that-have-no-right-to-see-cicd&quot;&gt;Pipelines page is partially visible for users that have no right to see CI&#x2F;CD&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-email-validation-on-an-invite-url&quot;&gt;Improper email validation on an invite URL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorised-user-was-able-to-add-meta-data-upon-issue-creation&quot;&gt;Unauthorised user was able to add meta data upon issue creation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-user-can-trigger-deployment-to-a-protected-environment&quot;&gt;Unauthorized user can trigger deployment to a protected environment&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-in-private-project-can-see-cicd-analytics&quot;&gt;Guest in private project can see CI&#x2F;CD Analytics&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#guest-users-can-create-issues-for-sentry-errors-and-track-their-status&quot;&gt;Guest users can create issues for Sentry errors and track their status&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#private-user-email-disclosure-via-group-invitation&quot;&gt;Private user email disclosure via group invitation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#projects-are-allowed-to-add-members-with-email-address-domain-that-should-be-blocked-by-group-settings&quot;&gt;Projects are allowed to add members with email address domain that should be blocked by group settings&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#misleading-username-could-lead-to-impersonation-in-using-ssh-certificates&quot;&gt;Misleading username could lead to impersonation in using SSH Certificates&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthorized-user-is-able-to-access-and-view-project-vulnerability-reports&quot;&gt;Unauthorized user is able to access and view project vulnerability reports&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-in-repository-caused-by-malformed-commit-author&quot;&gt;Denial of service in repository caused by malformed commit author&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stored-xss-in-mermaid-when-viewing-markdown-files&quot;&gt;Stored XSS in Mermaid when viewing Markdown files&lt;&#x2F;h2&gt;

&lt;p&gt;Insufficient input sanitization in Mermaid markdown in GitLab CE&#x2F;EE version 11.4 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22242&quot;&gt;CVE-2021-22242&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @saleemrashid for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;Users will no longer be able to configure &lt;code&gt;htmlLabels&lt;&#x2F;code&gt; setting in Mermaid charts.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-default-branch-name&quot;&gt;Stored XSS in default branch name&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.4. It was possible to exploit a stored cross-site-scripting via a specifically crafted default branch name. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22241&quot;&gt;CVE-2021-22241&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;perform-git-actions-with-an-impersonation-token-even-if-impersonation-is-disabled&quot;&gt;Perform Git actions with an impersonation token even if impersonation is disabled&lt;&#x2F;h2&gt;

&lt;p&gt;Under specialized conditions, GitLab may allow a user with an impersonation token to perform Git actions even if impersonation is disabled. This vulnerability is present in GitLab CE&#x2F;EE versions before 13.12.9, 14.0.7, 14.1.2. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 6.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22237&quot;&gt;CVE-2021-22237&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab would like to thank a customer who reported this issue.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;tag-and-branch-name-confusion-allows-developer-to-access-protected-ci-variables&quot;&gt;Tag and branch name confusion allows Developer to access protected CI variables&lt;&#x2F;h2&gt;

&lt;p&gt;A confusion between tag and branch names in GitLab CE&#x2F;EE affecting all versions since 13.7 allowed a Developer to access protected CI variables which should only be accessible to Maintainers. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22252&quot;&gt;CVE-2021-22252&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @rodrigopetter for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-subscriptions-generate-oauth-tokens-on-an-incorrect-oauth-client-application&quot;&gt;New subscriptions generate OAuth tokens on an incorrect OAuth client application&lt;&#x2F;h2&gt;

&lt;p&gt;Due to improper handling of OAuth client IDs, new subscriptions generated OAuth tokens on an incorrect OAuth client application. This vulnerability is present in GitLab CE&#x2F;EE since version 14.1. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:L&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22236&quot;&gt;CVE-2021-22236&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ability-to-list-and-delete-impersonation-tokens-for-your-own-user&quot;&gt;Ability to list and delete impersonation tokens for your own user&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in GitLab CE&#x2F;EE affecting all versions since 13.3 allowed users to view and delete impersonation tokens that administrations created for their account. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22250&quot;&gt;CVE-2021-22250&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @jimeno for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipelines-page-is-partially-visible-for-users-that-have-no-right-to-see-cicd&quot;&gt;Pipelines page is partially visible for users that have no right to see CI&#x2F;CD&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization on the pipelines page in GitLab CE&#x2F;EE affecting all versions since 13.12 allowed unauthorized users to view some pipeline information for public projects that have access to pipelines restricted to members only. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22248&quot;&gt;CVE-2021-22248&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-email-validation-on-an-invite-url&quot;&gt;Improper email validation on an invite URL&lt;&#x2F;h2&gt;

&lt;p&gt;Under specialized conditions, GitLab CE&#x2F;EE versions starting 7.10 may allow existing GitLab users to use an invite URL meant for another email address to gain access into a group. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:L&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22243&quot;&gt;CVE-2021-22243&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was found internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorised-user-was-able-to-add-meta-data-upon-issue-creation&quot;&gt;Unauthorised user was able to add meta data upon issue creation&lt;&#x2F;h2&gt;

&lt;p&gt;An unauthorized user was able to insert metadata when creating new issue on GitLab CE&#x2F;EE 14.0 and later. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22239&quot;&gt;CVE-2021-22239&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-user-can-trigger-deployment-to-a-protected-environment&quot;&gt;Unauthorized user can trigger deployment to a protected environment&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in GitLab EE affecting all versions since 13.4 allowed a user who previously had the necessary access to trigger deployments to protected environments under specific conditions after the access has been removed. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:L&#x2F;A:L&lt;&#x2F;code&gt;, 4.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-CVE-2021-22253&quot;&gt;CVE-2021-22253&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @vaib25vicky for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-in-private-project-can-see-cicd-analytics&quot;&gt;Guest in private project can see CI&#x2F;CD Analytics&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in GitLab CE&#x2F;EE affecting all versions since 13.0 allows guests in private projects to view CI&#x2F;CD analytics. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22247&quot;&gt;CVE-2021-22247&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-users-can-create-issues-for-sentry-errors-and-track-their-status&quot;&gt;Guest users can create issues for Sentry errors and track their status&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in GitLab CE&#x2F;EE affecting all versions since 12.6 allowed guest users to create issues for Sentry errors and track their status. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22256&quot;&gt;CVE-2021-22256&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @maruthi12 for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-user-email-disclosure-via-group-invitation&quot;&gt;Private user email disclosure via group invitation&lt;&#x2F;h2&gt;

&lt;p&gt;A verbose error message in GitLab EE affecting all versions since 12.2 could disclose the private email address of a user invited to a group. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22249&quot;&gt;CVE-2021-22249&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @jimeno for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;projects-are-allowed-to-add-members-with-email-address-domain-that-should-be-blocked-by-group-settings&quot;&gt;Projects are allowed to add members with email address domain that should be blocked by group settings&lt;&#x2F;h2&gt;

&lt;p&gt;Improper validation of invited users&#x27; email address in GitLab EE affecting all versions since 12.2 allowed projects to add members with email address domain that should be blocked by group settings. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22251&quot;&gt;CVE-2021-22251&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @ashish_r_padelkar for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;misleading-username-could-lead-to-impersonation-in-using-ssh-certificates&quot;&gt;Misleading username could lead to impersonation in using SSH Certificates&lt;&#x2F;h2&gt;

&lt;p&gt;Under very specific conditions a user could be impersonated using Gitlab shell. This vulnerability affects GitLab CE&#x2F;EE 13.1 and later through 14.1.2, 14.0.7 and 13.12.9. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22254&quot;&gt;CVE-2021-22254&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks ledz1996 for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-user-is-able-to-access-and-view-project-vulnerability-reports&quot;&gt;Unauthorized user is able to access and view project vulnerability reports&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in the vulnerability report feature in GitLab EE affecting all versions since 13.1 allowed a reporter to access vulnerability data. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22244&quot;&gt;CVE-2021-22244&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @vaib25vicky for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-in-repository-caused-by-malformed-commit-author&quot;&gt;Denial of service in repository caused by malformed commit author&lt;&#x2F;h2&gt;

&lt;p&gt;Improper validation of commit author in GitLab CE&#x2F;EE affecting all versions allowed an attacker to make several pages in a project impossible to view. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22245&quot;&gt;CVE-2021-22245&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @stanlyoncm for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been upgraded to 5.35.4 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus versions 13.10 and later&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-oauth-ruby-gem&quot;&gt;Update oauth ruby gem&lt;&#x2F;h2&gt;

&lt;p&gt;The oauth ruby gem has been upgraded to 0.5.6 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 10.6 and later&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-libgcrypt&quot;&gt;Update libgcrypt&lt;&#x2F;h2&gt;

&lt;p&gt;libgcrypt has been upgraded to 1.9.3 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous versions of GitLab Omnibus&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.1.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/28/gitlab-14-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/28/gitlab-14-1-1-released/</id>
<published>2021-07-28T00:00:00+00:00</published>
<updated>2021-07-28T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.1.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;07&#x2F;22&#x2F;gitlab-14-1-released&#x2F;&quot;&gt;this month&#x27;s 14.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;63287&quot;&gt;Extend RackAttack basic authentication detection for rate limiting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66312&quot;&gt;Enable bulk dismissal checkboxes on group vulnerability report&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66410&quot;&gt;Fix syntax highlighting inline background on darkmode&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66432&quot;&gt;Fix: Sidekiq workers delete each other&#x27;s metrics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66437&quot;&gt;Prevent terms from being created if blank&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66627&quot;&gt;Remove backfill migration for ci_build_trace_sections&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65783&quot;&gt;Geo: Fix snippet verification by replicating the HEAD ref&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;66291&quot;&gt;Remove securityScansSucceeded from DevOps adoption&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5481&quot;&gt;Fix markdown in development docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5484&quot;&gt;Fix deployer task&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5488&quot;&gt;Don&#x27;t ask users to upgrade to PG 13 yet&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.1 released with Helm Chart Registry and Escalation Policies</title>
<release>14.1</release>
<link href='https://about.gitlab.com/releases/2021/07/22/gitlab-14-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/22/gitlab-14-1-released/</id>
<published>2021-07-22T00:00:00+00:00</published>
<updated>2021-07-22T00:00:00+00:00</updated>
<author>
<name>Sam White</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to announce the release of GitLab 14.1 with the ability to &lt;a href=&quot;#build-publish-and-share-helm-charts&quot;&gt;build, publish, and share Helm charts&lt;&#x2F;a&gt;, &lt;a href=&quot;#escalation-policies&quot;&gt;create escalation policies to page responders&lt;&#x2F;a&gt;, &lt;a href=&quot;#cicd-tunnel-for-kubernetes-clusters&quot;&gt;connect GitLab Runners to your Kubernetes clusters&lt;&#x2F;a&gt;, &lt;a href=&quot;#code-coverage-merge-request-approval-rule&quot;&gt;enforce code coverage decisions&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the 50+ improvements in this release. Read on to check out all of the great updates below.&lt;&#x2F;p&gt;

&lt;p&gt;To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases page&lt;&#x2F;a&gt;, which includes our 14.2 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_1&#x2F;14_1-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/20/gitlab-14-0-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/20/gitlab-14-0-6-released/</id>
<published>2021-07-20T00:00:00+00:00</published>
<updated>2021-07-20T00:00:00+00:00</updated>
<author>
<name>Amy Phillips</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 14.0.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;this month&#x27;s 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64192&quot;&gt;Replace Excon with Faraday for requesting object storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65380&quot;&gt;Fix LFS objects not downloading with Bitbucket&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65581&quot;&gt;Resolve &quot;Terraform module usage instructions are incorrect&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65783&quot;&gt;Geo: Fix snippet verification by replicating the HEAD ref&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65954&quot;&gt;Fix validation method regarding MIME type keys&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3675&quot;&gt;coordinator: Fix repo creation&#x2F;removal race for up-to-date secondaries for 14-0-stable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/08/gitlab-14-0-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/08/gitlab-14-0-5-released/</id>
<published>2021-07-08T00:00:00+00:00</published>
<updated>2021-07-08T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.0.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;this month&#x27;s 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64553&quot;&gt;Resolve &quot;404 for package details link under Infrastructure Registry for projects nested under 2 group levels&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64660&quot;&gt;Resolve &quot;Terraform module usage instructions are incorrect&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65454&quot;&gt;Add documentation for boards epic create&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65477&quot;&gt;Initialize conversion of ci_builds_metadata.id for bigint migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65489&quot;&gt;Fix git clone for projects with a trailing dot over HTTP&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65504&quot;&gt;Do not create audit event for failed logins on read-only DB&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65508&quot;&gt;Add prefix to autocomplete path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65547&quot;&gt;Return empty strings for Jira links when URL is not set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;build&#x2F;CNG&#x2F;-&#x2F;merge_requests&#x2F;699&quot;&gt;Fix libmagic not being able to find magic files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 14.0.4, 13.12.8, and 13.11.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/07/critical-security-release-gitlab-14-0-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/07/critical-security-release-gitlab-14-0-4-released/</id>
<published>2021-07-07T00:00:00+00:00</published>
<updated>2021-07-07T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.0.4, 13.12.8, and 13.11.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-file-read-via-design-feature&quot;&gt;Arbitrary file read via design feature&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;arbitrary-file-read-via-design-feature&quot;&gt;Arbitrary file read via design feature&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 13.11, 13.12 and 14.0. A specially crafted &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issues&#x2F;design_management.html&quot;&gt;design&lt;&#x2F;a&gt; allowed attackers to read arbitrary files on the server. This is a critical severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 9.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22234&quot;&gt;CVE-2021-22234&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/06/gitlab-14-0-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/06/gitlab-14-0-3-released/</id>
<published>2021-07-06T00:00:00+00:00</published>
<updated>2021-07-06T00:00:00+00:00</updated>
<author>
<name>Amy Phillips</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.0.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;this month&#x27;s 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64632&quot;&gt;Reintroduce recursive_approach_for_all_projects default-enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64697&quot;&gt;Fix pages deployment storage migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64737&quot;&gt;Fix frequent items timestamps not updated&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64775&quot;&gt;Fix bug where Milestone page led to console error&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64797&quot;&gt;Fix broken Time Tracking Reports on Issuable sidebar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64801&quot;&gt;Geo - Fix state value in the lfs_object_registry table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64845&quot;&gt;Revert a 14.0 change in the deployments API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64904&quot;&gt;DevOps Adoption - ensure displayNamespaceId is included&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64948&quot;&gt;Geo - Move migration to a pre-deployment migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65106&quot;&gt;Run batched migrations on self-managed instances&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65205&quot;&gt;Fix deploy keys not working with LFS auth check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3631&quot;&gt;Repository: Fix repo replication with transactions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3621&quot;&gt;Repository: Fix excessive voting in CreateRepositoryFromBundle&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/05/gitlab-13-12-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/05/gitlab-13-12-7-released/</id>
<published>2021-07-05T00:00:00+00:00</published>
<updated>2021-07-05T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.12.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;this month&#x27;s 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64697&quot;&gt;Fix pages deployment storage migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64632&quot;&gt;Reintroduce recursive_approach_for_all_projects default-enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5399&quot;&gt;Exempt unicorn[&#x27;svlogd_prefix&#x27;] from deprecation check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3632&quot;&gt;Gitaly: fixes to issues with strong consistency&#x2F;transactional voting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;65466&quot;&gt;Geo - Fix state value in the lfs_object_registry table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 14.0.2, 13.12.6, and 13.11.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/07/01/security-release-gitlab-14-0-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/07/01/security-release-gitlab-14-0-2-released/</id>
<published>2021-07-01T00:00:00+00:00</published>
<updated>2021-07-01T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 14.0.2, 13.12.6, and 13.11.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#DoS-using-Webhook-connections&quot;&gt;DoS using Webhook connections &lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#csrf-on-graphql-api-allows-executing-mutations-through-get-requests&quot;&gt;CSRF on GraphQL API allows executing mutations through GET requests&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#private-projects-information-disclosure&quot;&gt;Private projects information disclosure&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#single-sign-on-users-not-getting-blocked&quot;&gt;Single sign-on users not getting blocked&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#some-users-can-push-to-protected-branch-with-deploy-keys&quot;&gt;Some users can push to Protected Branch with Deploy keys&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#a-deactivated-user-can-access-data-through-graphql&quot;&gt;A deactivated user can access data through GraphQL&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#reflected-xss-in-release-edit-page&quot;&gt;Reflected XSS in release edit page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#clipboard-dom-based-xss&quot;&gt;Clipboard DOM-based XSS&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-on-audit-log&quot;&gt;Stored XSS on Audit Log&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#forks-of-public-projects-by-project-members-could-leak-codebase&quot;&gt;Forks of public projects by project members could leak codebase&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#improper-text-rendering&quot;&gt;Improper text rendering&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#html-injection-in-full-name-field&quot;&gt;HTML Injection in full name field&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-of-user-profile-page&quot;&gt;Denial of service of user profile page&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-nokogiri&quot;&gt;Update Nokogiri&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-redis&quot;&gt;Update Redis&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-rdoc&quot;&gt;Update Rdoc&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-libxml2&quot;&gt;Update libxml2&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-Rails-gem&quot;&gt;Update Rails gem&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;dos-using-webhook-connections&quot;&gt;DoS using Webhook connections&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability was discovered in GitLab versions before 14.0.2, 13.12.6, 13.11.6. GitLab Webhook feature could be abused to perform denial of service attacks. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.7). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;afewgoats&quot;&gt;afewgoats&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;csrf-on-graphql-api-allows-executing-mutations-through-get-requests&quot;&gt;CSRF on GraphQL API allows executing mutations through GET requests&lt;&#x2F;h2&gt;

&lt;p&gt;A cross-site request forgery vulnerability in the GraphQL API in GitLab since version 13.12 and before versions 13.12.6 and 14.0.2 allowed an attacker to call mutations as the victim. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.1). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;az3z3l&quot;&gt;az3z3l&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-projects-information-disclosure&quot;&gt;Private projects information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure vulnerability was found in GitLab EE versions 13.10 and later allowed a user to read project details. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xn3va&quot;&gt;0xn3va&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;single-sign-on-users-not-getting-blocked&quot;&gt;Single sign-on users not getting blocked&lt;&#x2F;h2&gt;

&lt;p&gt;Improper access control in GitLab EE before versions 13.11.6, 13.12.6, and 14.0.2 allowed users to be created via single sign on despite user cap being enabled. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.2). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bingomzan&quot;&gt;bingomzan&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;some-users-can-push-to-protected-branch-with-deploy-keys&quot;&gt;Some users can push to Protected Branch with Deploy keys&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain conditions, some users were able to push to protected branches that were restricted to deploy keys in GitLab CE&#x2F;EE since version 13.9. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;a-deactivated-user-can-access-data-through-graphql&quot;&gt;A deactivated user can access data through GraphQL&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions. Improper access control allows unauthorised users to access project details using Graphql. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;joaxcar&quot;&gt;joaxcar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reflected-xss-in-release-edit-page&quot;&gt;Reflected XSS in release edit page&lt;&#x2F;h2&gt;

&lt;p&gt;A reflected cross-site scripting vulnerability in GitLab before versions 13.11.6, 13.12.6 and 14.0.2 allowed an attacker to send a malicious link to a victim and trigger actions on their behalf if they clicked it. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.1). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;clipboard-dom-based-xss&quot;&gt;Clipboard DOM-based XSS&lt;&#x2F;h2&gt;

&lt;p&gt;Improper input sanitization in markdown in GitLab CE&#x2F;EE version 13.11 and up allowed an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted input. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.7). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vovohelo&quot;&gt;vovohelofor&lt;&#x2F;a&gt; reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-on-audit-log&quot;&gt;Stored XSS on Audit Log&lt;&#x2F;h2&gt;

&lt;p&gt;Client-Side code injection through Feature Flag name starting with GitLab CE&#x2F;EE 11.9 allows a specially crafted feature flag name to PUT requests on behalf of other users via clicking on a link. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22223&quot;&gt;CVE-2021-22223&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;forks-of-public-projects-by-project-members-could-leak-codebase&quot;&gt;Forks of public projects by project members could leak codebase&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 12.8. Under a special condition it was possible to access data of an internal repository through project fork done by a project member. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-text-rendering&quot;&gt;Improper text rendering&lt;&#x2F;h2&gt;

&lt;p&gt;Improper text rendering while rendering merge requests could be exploited to submit malicious code. This vulnerability affects GitLab CE&#x2F;EE 9.3 and later through 13.11.6, 13.12.6, and 14.0.2. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 4.9). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;html-injection-in-full-name-field&quot;&gt;HTML Injection in full name field&lt;&#x2F;h2&gt;

&lt;p&gt;HTML injection was possible via the full name field before versions 13.11.6, 13.12.6, and 14.0.2 in GitLab CE. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;andor404&quot;&gt;andor404&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-of-user-profile-page&quot;&gt;Denial of service of user profile page&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service in user&#x27;s profile page is found starting with GitLab CE&#x2F;EE 8.0 that allows attacker to reject access to their profile page via using a specially crafted username. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:L&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.5). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;maruthi12&quot;&gt;maruthi12&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-nokogiri&quot;&gt;Update Nokogiri&lt;&#x2F;h2&gt;

&lt;p&gt;Nokogiri has been upgraded to 1.11.4 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost&quot;&gt;Update Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been upgraded to 5.33.5 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 13.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-redis&quot;&gt;Update Redis&lt;&#x2F;h2&gt;

&lt;p&gt;Redis has been upgraded to 6.0.14 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 13.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rdoc&quot;&gt;Update Rdoc&lt;&#x2F;h2&gt;

&lt;p&gt;Rdoc has been upgraded to 6.3.1 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-libxml2&quot;&gt;Update libxml2&lt;&#x2F;h2&gt;

&lt;p&gt;libxml2 has been upgraded to 2.9.11 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rails-gem&quot;&gt;Update Rails gem&lt;&#x2F;h2&gt;

&lt;p&gt;The Rails gem has been upgraded to 6.0.3.7 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 14.0.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/06/24/gitlab-14-0-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/06/24/gitlab-14-0-1-released/</id>
<published>2021-06-24T00:00:00+00:00</published>
<updated>2021-06-24T00:00:00+00:00</updated>
<author>
<name>Amy Phillips</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 14.0.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-0-released&#x2F;&quot;&gt;this month&#x27;s 14.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64080&quot;&gt;Update Geo UI screenshots in docs page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64317&quot;&gt;Update admin docs with new admin area access info&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64330&quot;&gt;Add Helm-2to3.gitlab-ci.yml to Auto DevOps&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64368&quot;&gt;Update docs for new Members page location on GitLab navigation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64397&quot;&gt;DevOps Adoption - ensure displayNamespaceId is included&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64400&quot;&gt;Remove add button from Devops Adoption&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64458&quot;&gt;Geo: Add Terraform Module to datatypes doc&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64525&quot;&gt;Create 14.0 What&#x27;s New entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64536&quot;&gt;Toggle codequality diff annotations flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;64566&quot;&gt;Bump kas to v14.0.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5395&quot;&gt;Exempt unicorn &#x27;svlogd_prefix&#x27; from deprecation check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 14.0 released with a celebration of GitLab 14</title>
<release>14.0</release>
<link href='https://about.gitlab.com/releases/2021/06/22/gitlab-14-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/06/22/gitlab-14-0-released/</id>
<published>2021-06-22T00:00:00+00:00</published>
<updated>2021-06-22T00:00:00+00:00</updated>
<author>
<name>Darren Eastman</name>
</author>
<content type='html'>&lt;p&gt;When we think of everything released in the year since GitLab 13.0, we could not be more proud of our community and our team. This month, we celebrate our release of GitLab 14.0 by first taking a step back.&lt;&#x2F;p&gt;

&lt;p&gt;Together, we’ve made so much progress over the last year that we want to talk about everything it took to get to &lt;a href=&quot;&#x2F;blog&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-modern-devops&#x2F;&quot;&gt;GitLab 14&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We use semantic versioning so a point release, like 14.0, represents everything new in this month. GitLab 14 is the culmination of the past year. Even more than that, GitLab 14 represents the future of GitLab, and the future of DevOps.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 14, teams of all sizes are moving from maintaining DIY DevOps toolchains to adopting modern DevOps. GitLab 14 is a complete DevOps platform with security embedded in its DNA, visibility and insights enabled by its single data store, and a seamless experience and extensible system, so end users and enterprises alike reap the benefits of speed and efficiency.&lt;&#x2F;p&gt;

&lt;p&gt;We’re so excited that we’ve written a post where you can &lt;a href=&quot;&#x2F;blog&#x2F;2021&#x2F;06&#x2F;22&#x2F;gitlab-14-modern-devops&#x2F;&quot;&gt;read more about GitLab 14 and our vision for modern DevOps&lt;&#x2F;a&gt;, and how it enables any team to build and deliver software with velocity, visibility, and trust.&lt;&#x2F;p&gt;

&lt;p&gt;As ever, we are also excited about what’s new this month in 14.0. Read on for our regular highlights from dozens of significant new features and improvements. Along with these exciting new features, there are a few &lt;a href=&quot;&#x2F;blog&#x2F;2021&#x2F;06&#x2F;04&#x2F;gitlab-moving-to-14-breaking-changes&#x2F;&quot;&gt;breaking changes in 14.0&lt;&#x2F;a&gt;. To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page, which includes our 14.1 release kickoff video.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;14_0&#x2F;14_0-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/06/21/gitlab-13-12-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/06/21/gitlab-13-12-5-released/</id>
<published>2021-06-21T00:00:00+00:00</published>
<updated>2021-06-21T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.12.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;this month&#x27;s 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;63344&quot;&gt;Only update required instance ci template when the parameter is present&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;63466&quot;&gt;Fix Password expired error on git fetch via SSH for LDAP user&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;63764&quot;&gt;Advanced Search Settings page does not load if the ES url is unreachable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/06/14/gitlab-13-12-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/06/14/gitlab-13-12-4-released/</id>
<published>2021-06-14T00:00:00+00:00</published>
<updated>2021-06-14T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.12.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;this month&#x27;s 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Free, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62053&quot;&gt;Fix double render in project&#x27;s git URL redirect&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62535&quot;&gt;Fix MR diff compare with previous version&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;63784&quot;&gt;Add alias method usage_ping_enabled?&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5350&quot;&gt;Do not show Praefect deprecation if Praefect is disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5361&quot;&gt;Update Mattermost to 5.34.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/06/07/gitlab-13-12-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/06/07/gitlab-13-12-3-released/</id>
<published>2021-06-07T00:00:00+00:00</published>
<updated>2021-06-07T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.12.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;last month&#x27;s 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62416&quot;&gt;Fix maven &amp;amp; gradle examples in the docs, enabling line-by-line display of test coverage in merge requests out-of-the-box (for java &amp;amp;
kotlin)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62421&quot;&gt;Fix issue with frames not loading in Safari&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62496&quot;&gt;Improve SSH key expiration warning emails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62802&quot;&gt;Add an option to expose &lt;code&gt;description_html&lt;&#x2F;code&gt; in Release API [RUN ALL RSPEC] [RUN AS-IF-FOSS]&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62849&quot;&gt;Fix CSP issues related to captchas&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62961&quot;&gt;Set CSP back to disabled by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;63117&quot;&gt;Fix referrer option passed to Akismet client&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5310&quot;&gt;Fix passing environment variables for migrations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.12.2, 13.11.5, and 13.10.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/</id>
<published>2021-06-01T00:00:00+00:00</published>
<updated>2021-06-01T00:00:00+00:00</updated>
<author>
<name>Michael Henriksen</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.12.2, 13.11.5, and 13.10.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;additional-notes&quot;&gt;Additional notes&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 13.10 the CI Lint API started requiring &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;#authentication&quot;&gt;authentication&lt;&#x2F;a&gt; for GitLab instances where registration is disabled. Starting with this release, the CI Lint API endpoint will also require authentication when registration is limited (for example where an email domain allowlist is configured).&lt;&#x2F;p&gt;

&lt;p&gt;This version also includes a data migration to fix some records with incorrect data that causes 2FA to not be enforced for some users even if they are members of groups that require it. The root cause for the issue was already fixed but some records created before the fix need to be corrected. The migration is a background migration that will be scheduled in batches of 10,000 users at two minute intervals.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stealing-gitlab-oauth-access-tokens-using-xsleaks-in-safari&quot;&gt;Stealing GitLab OAuth access tokens using XSLeaks in Safari&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-through-recursive-triggered-pipelines&quot;&gt;Denial of service through recursive triggered pipelines&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#unauthenticated-ci-lint-api-may-lead-to-information-disclosure-and-ssrf&quot;&gt;Unauthenticated CI lint API may lead to information disclosure and SSRF&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#server-side-dos-through-rendering-crafted-markdown-documents&quot;&gt;Server-side DoS through rendering crafted Markdown documents&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#issue-and-merge-request-length-limit-is-not-being-enforced&quot;&gt;Issue and merge request length limit is not being enforced&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#insufficient-expired-password-validation&quot;&gt;Insufficient Expired Password Validation&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#xss-in-blob-viewer-of-notebooks&quot;&gt;XSS in blob viewer of notebooks&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#logging-of-sensitive-information&quot;&gt;Logging of Sensitive Information&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#on-call-rotation-information-exposed-when-removing-a-member&quot;&gt;On-call rotation information exposed when removing a member&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#spoofing-commit-author-for-signed-commits&quot;&gt;Spoofing commit author for signed commits&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;stealing-gitlab-oauth-access-tokens-using-xsleaks-in-safari&quot;&gt;Stealing GitLab OAuth access tokens using XSLeaks in Safari&lt;&#x2F;h2&gt;

&lt;p&gt;A cross-site leak vulnerability in the OAuth flow of all versions of GitLab CE&#x2F;EE since 7.10 allowed an attacker to leak an OAuth access token by getting the victim to visit a malicious page with Safari. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 8.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22213&quot;&gt;CVE-2021-22213&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks hubblebubble for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-through-recursive-triggered-pipelines&quot;&gt;Denial of service through recursive triggered pipelines&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service vulnerability in GitLab CE&#x2F;EE affecting all versions since 11.8 allows an attacker to create a recursive pipeline relationship and exhaust resources. This is a high severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 7.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22181&quot;&gt;CVE-2021-22181&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-ci-lint-api-may-lead-to-information-disclosure-and-ssrf&quot;&gt;Unauthenticated CI lint API may lead to information disclosure and SSRF&lt;&#x2F;h2&gt;

&lt;p&gt;When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE&#x2F;EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22214&quot;&gt;CVE-2021-22214&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;myster?type=user&quot;&gt;@myster&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;server-side-dos-through-rendering-crafted-markdown-documents&quot;&gt;Server-side DoS through rendering crafted Markdown documents&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service vulnerability in all versions of GitLab CE&#x2F;EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a specially crafted issue or merge request. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22217&quot;&gt;CVE-2021-22217&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks phli for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-and-merge-request-length-limit-is-not-being-enforced&quot;&gt;Issue and merge request length limit is not being enforced&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service vulnerability in all versions of GitLab CE&#x2F;EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a very long issue or merge request description. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:H&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22216&quot;&gt;CVE-2021-22216&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insufficient-expired-password-validation&quot;&gt;Insufficient Expired Password Validation&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.9.0 before 13.10.5, all versions starting from 13.11.0 before 13.11.5, all versions starting from 13.12.0 before 13.12.2. Insufficient expired password validation in various operations allow user to maintain limited access after their password expired. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22221&quot;&gt;CVE-2021-22221&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-blob-viewer-of-notebooks&quot;&gt;XSS in blob viewer of notebooks&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 13.10. GitLab was vulnerable to a stored XSS in blob viewer of notebooks. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22220&quot;&gt;CVE-2021-22220&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks (@yvvdwf)[https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf] for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;logging-of-sensitive-information&quot;&gt;Logging of Sensitive Information&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab CE&#x2F;EE since version 9.5 allows a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking. This is a medium severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.4). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22219&quot;&gt;CVE-2021-22219&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team https:&#x2F;&#x2F;gitlab.com&#x2F;dcouture.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;on-call-rotation-information-exposed-when-removing-a-member&quot;&gt;On-call rotation information exposed when removing a member&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure vulnerability in GitLab EE versions 13.11 and later allowed a project owner to leak information about the members&#x27; on-call rotations in other projects. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 2.7). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22215&quot;&gt;CVE-2021-22215&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;spoofing-commit-author-for-signed-commits&quot;&gt;Spoofing commit author for signed commits&lt;&#x2F;h2&gt;

&lt;p&gt;All versions of GitLab CE&#x2F;EE starting with 12.8 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits. This is a low severity issue (&lt;code&gt;CVSS:3.0&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.6). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22218&quot;&gt;CVE-2021-22218&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks subbotin for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enable-qsh-verification-for-atlassian-connect&quot;&gt;Enable qsh verification for Atlassian Connect&lt;&#x2F;h2&gt;

&lt;p&gt;qsh verification has been enabled for Atlassian Connect to address a breaking change in the Atlassian Connect API.&lt;&#x2F;p&gt;

&lt;p&gt;If you are using Jira Connect with a self-managed instance you need to update to these latest security releases before June 7th. If you are on GitLab.com, you do not need to do anything. For more details see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;328267&quot;&gt;this GitLab issue&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-bindata-dependency&quot;&gt;Update bindata dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on bindata has been upgraded to 2.4.10 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-grafana-dependency&quot;&gt;Update grafana dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on Grafana has been upgraded to 7.5.4 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 13.11, 13.10 and 13.9.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive release notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;security release RSS feed&lt;&#x2F;a&gt; or our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;all-releases.xml&quot;&gt;RSS feed for all releases&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.12.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/05/25/gitlab-13-12-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/05/25/gitlab-13-12-1-released/</id>
<published>2021-05-25T00:00:00+00:00</published>
<updated>2021-05-25T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.12.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;05&#x2F;22&#x2F;gitlab-13-12-released&#x2F;&quot;&gt;this month&#x27;s 13.12 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62061&quot;&gt;Add deprecation notice for implicit grant flow&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62276&quot;&gt;Fix pipeline security tab scanner filter not working&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62341&quot;&gt;Fix the Create new cluster feature&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;62408&quot;&gt;Handle nil Content-Type in Service Desk emails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.12 released with On-Demand DAST and Deployment Frequency Chart</title>
<release>13.12</release>
<link href='https://about.gitlab.com/releases/2021/05/22/gitlab-13-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/05/22/gitlab-13-12-released/</id>
<published>2021-05-22T00:00:00+00:00</published>
<updated>2021-05-22T00:00:00+00:00</updated>
<author>
<name>Mark Wood</name>
</author>
<content type='html'>&lt;p&gt;This month, we are excited to introduce usability and pipeline management improvements that strive to make your teams more productive, updates to make your deployments more secure, and insights to make your DevOps adoption more mature. These are just a few highlights from the &lt;strong&gt;44 improvements&lt;&#x2F;strong&gt; in this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;helping-you-manage-security-before-it-manages-you&quot;&gt;Helping you manage security before it manages you&lt;&#x2F;h2&gt;

&lt;p&gt;To ensure your production environment is always secure, &lt;a href=&quot;#on-demand-dast-ga-launch&quot;&gt;On-demand DAST scanning&lt;&#x2F;a&gt; is now generally available for all GitLab Ultimate customers. These on-demand scans will allow you to scan an already deployed application or API in any of your configured environments outside of a CI&#x2F;CD pipeline i.e., without requiring any code changes or merge requests to start a scan.&lt;&#x2F;p&gt;

&lt;p&gt;The &lt;a href=&quot;#semgrep-sast-analyzer-for-javascript-typescript-and-python&quot;&gt;Semgrep SAST analyzer&lt;&#x2F;a&gt; for JavaScript, TypeScript, and Python is also generally available. Semgrep&#x27;s flexible rule syntax is ideal for streamlining the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;sast&#x2F;#customize-rulesets&quot;&gt;GitLab Custom Rulesets&lt;&#x2F;a&gt; feature for extending and modifying detection rules, a popular request from GitLab SAST customers. It also allows GitLab customers access to Semgrep&#x27;s community rules. Thanks to the community contribution from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;proletarius101&quot;&gt;@proletarius101&lt;&#x2F;a&gt;, we are also extending the &lt;a href=&quot;#mobile-application-binary-scanning-support&quot;&gt;Mobile Application Security Testing&lt;&#x2F;a&gt; to support &lt;code&gt;.ipa&lt;&#x2F;code&gt; (iOS) and &lt;code&gt;.apk&lt;&#x2F;code&gt; (Android) binary files, in addition to Xcode projects and Android manifest files that are already supported.&lt;&#x2F;p&gt;

&lt;p&gt;Many customers integrate their existing scanners into GitLab to benefit from a unified view. The Project Vulnerability Report now gives you the ability to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;229661&quot;&gt;filter by scanner and vendor&lt;&#x2F;a&gt;, allowing you to filter scan results for only third-party scanners or for all scanners including those from GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Application Security is a key focus area for GitLab for this year and your feedback is important to us. As the preference of web application development shifts rapidly towards building JavaScript-heavy and single-page applications, we have identified a need for a purpose built tool that provides more application testing coverage than a traditional proxy based crawler. We are inviting GitLab Ultimate customers to a public beta for a &lt;a href=&quot;#new-browser-based-crawler-for-dast-in-open-beta&quot;&gt;new browser-based crawler for DAST&lt;&#x2F;a&gt; which is expected to provide significantly better security testing coverage for these modern applications compared to our current proxy-based crawler.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;easier-pipeline-management-for-enhanced-usability&quot;&gt;Easier pipeline management for enhanced usability&lt;&#x2F;h2&gt;

&lt;p&gt;Pipelines are at the heart of our customers&#x27; CI&#x2F;CD success, and we want to make it easier to use for new and experienced users of GitLab. The pipeline editor will now come with a collapsible &lt;a href=&quot;#useful-gitlab-cicd-information-in-the-pipeline-editor&quot;&gt;panel of guided instructions&lt;&#x2F;a&gt; that will help new CI&#x2F;CD users create their first pipeline in a breeze.&lt;&#x2F;p&gt;

&lt;p&gt;For experienced CI&#x2F;CD users that require more flexibility in creating their pipelines, we are now supporting &lt;a href=&quot;#support-wildcards-when-including-yaml-cicd-configuration-files&quot;&gt;wildcards in the &lt;code&gt;include:&lt;&#x2F;code&gt; keyword&lt;&#x2F;a&gt; that will help you break your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file into multiple smaller files to improve reusability and readability. We also introduced the ability to &lt;a href=&quot;#support-variables-in-cicd-pipeline-workflowrules&quot;&gt;define variables within rules&lt;&#x2F;a&gt;, giving you the flexibility to set pipeline variables when certain conditions are met. Defining complex pipelines means there could be dependencies between jobs. The pipeline graph now &lt;a href=&quot;#show-job-dependencies-in-the-pipeline-graph&quot;&gt;shows dependencies between jobs&lt;&#x2F;a&gt;, which is helpful to visually track and understand the expected order in which the jobs will be run.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insights-to-improve-your-devops-maturity&quot;&gt;Insights to improve your DevOps maturity&lt;&#x2F;h2&gt;

&lt;p&gt;You cannot fix what you cannot measure. In that spirit, we are continuing to natively support DORA4 metrics. We are happy to announce the introduction of a &lt;a href=&quot;#group-level-deployment-frequency-cicd-chart&quot;&gt;group-level deployment frequency chart&lt;&#x2F;a&gt;, which will help you understand the efficiency of your deployments over time, find bottlenecks, and focus on improvement areas that span across your projects and teams.&lt;&#x2F;p&gt;

&lt;p&gt;Value stream analytics help you identify inefficiencies and identify the root cause of those inefficiencies in your workflow. In 13.12, we have introduced &lt;a href=&quot;#view-and-sort-stage-items-in-a-value-stream&quot;&gt;pagination and sorting of workflow items&lt;&#x2F;a&gt;, which allows you to easily visualize and sort items in a specific stage to pinpoint bottlenecks. The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;group&#x2F;value_stream_analytics&#x2F;#days-to-completion-chart&quot;&gt;Days to Completion chart&lt;&#x2F;a&gt; has been updated to show the &lt;a href=&quot;#view-average-time-to-complete-workflow-items&quot;&gt;average time to completion&lt;&#x2F;a&gt;, which helps identify meaningful trends over time.&lt;&#x2F;p&gt;

&lt;p&gt;In this release, thanks to the community contribution from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;leetickett&quot;&gt;@leetickett&lt;&#x2F;a&gt;, we introduced the ability to view a &lt;a href=&quot;#time-tracking-reports-for-issues-and-merge-requests&quot;&gt;time tracking report&lt;&#x2F;a&gt; within an individual issue or merge request to provide visibility into how much time each contributor spent.&lt;&#x2F;p&gt;

&lt;p&gt;For many of our customers, merge requests are the central space for collaboration. We have introduced the ability to see &lt;a href=&quot;#code-quality-violation-notices-in-mr-diffs&quot;&gt;code quality violations&lt;&#x2F;a&gt; and &lt;a href=&quot;#failed-test-screenshots-in-test-report&quot;&gt;screenshots of failed tests&lt;&#x2F;a&gt; within the merge request to give you necessary context as a part of your normal workflow within GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-so-much-more&quot;&gt;And so much more!&lt;&#x2F;h2&gt;

&lt;p&gt;We continue to invest in improving the product usability in every release. Some of our favorite quality of life improvements in 13.12 include:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#users-group-counts-now-displayed-in-admin-area&quot;&gt;Users&#x27; group counts now displayed in Admin Area&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#elastic-stack-cluster-integration&quot;&gt;Bring your own Elastic Stack&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#create-incidents-via-api&quot;&gt;Create incidents via API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#warn-administrator-when-removing-an-on-call-user&quot;&gt;Warn administrator when removing an on-call user&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#deleting-deploy-keys-will-inform-the-user-if-in-use&quot;&gt;Deleting deploy keys will inform the user if in use&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Read on for more features, performance enhancements and changes! To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page and our &lt;a href=&quot;https:&#x2F;&#x2F;youtube.com&#x2F;playlist?list=PL05JrBw4t0Krdajp3voZbcFVXk3O8JpPO&quot;&gt;14.0 release kickoff video&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_12&#x2F;13_12-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.11.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/05/14/gitlab-13-11-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/05/14/gitlab-13-11-4-released/</id>
<published>2021-05-14T00:00:00+00:00</published>
<updated>2021-05-14T00:00:00+00:00</updated>
<author>
<name>Henri Philipps</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.11.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;04&#x2F;22&#x2F;gitlab-13-11-released&#x2F;&quot;&gt;this month&#x27;s 13.11 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;60794&quot;&gt;Fix N+1 SQL queries in PipelinesController#show&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;61638&quot;&gt;Omit trailing slash when proxying pre-authorized routes with no suffix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;61641&quot;&gt;Omit trailing slash when checking allowed requests in the read-only middleware&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.11.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/04/30/gitlab-13-11-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/04/30/gitlab-13-11-3-released/</id>
<published>2021-04-30T00:00:00+00:00</published>
<updated>2021-04-30T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.11.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;04&#x2F;22&#x2F;gitlab-13-11-released&#x2F;&quot;&gt;this month&#x27;s 13.11 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59775&quot;&gt;Fix broken build job for Auto DevOps&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;60354&quot;&gt;Fix Instance-level Project Integration Management page for GitLab FOSS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.11.2, 13.10.4, and 13.9.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/04/28/security-release-gitlab-13-11-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/04/28/security-release-gitlab-13-11-2-released/</id>
<published>2021-04-28T00:00:00+00:00</published>
<updated>2021-04-28T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.11.2, 13.10.4, and 13.9.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#read_api-scoped-tokens-can-execute-mutations&quot;&gt;Read API scoped tokens can execute mutations&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#pull-mirror-credentials-are-exposed&quot;&gt;Pull mirror credentials are exposed&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#denial-of-service-when-querying-repository-branches-api&quot;&gt;Denial of Service when querying repository branches API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#non-owners-can-set-system_note_timestamp-when-creating--updating-issues&quot;&gt;Non-owners can set system_note_timestamp when creating &#x2F; updating issues&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#deploytoken-will-impersonate-a-user-with-the-same-id-when-using-dependency-proxy&quot;&gt;DeployToken will impersonate a User with the same ID when using Dependency Proxy&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-Python-dependency&quot;&gt;Update Python dependency&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency Update - critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-Redis-dependency&quot;&gt;Update Redis dependency&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency Update - high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-carrierwave-gem&quot;&gt;Update carrierwave gem&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency Update - high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#update-Mermaid-npm-package&quot;&gt;Update Mermaid npm package&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency Update - high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;read-api-scoped-tokens-can-execute-mutations&quot;&gt;Read API scoped tokens can execute mutations&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.8. GitLab was not properly validating authorisation tokens which resulted in GraphQL mutation being executed. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22209&quot;&gt;CVE-2021-22209&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pull-mirror-credentials-were-exposed&quot;&gt;Pull mirror credentials were exposed&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 11.6. Pull mirror credentials were exposed and could allow other maintainers to view the credentials in plain-text. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.8). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22206&quot;&gt;CVE-2021-22206&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jlneel&quot;&gt;jlneel&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-when-querying-repository-branches-api&quot;&gt;Denial of Service when querying repository branches API&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.2. When querying the repository branches through API, GitLab was ignoring a query parameter and returning a considerable amount of results. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22210&quot;&gt;CVE-2021-22210&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;non-owners-can-set-system_note_timestamp-when-creating--updating-issues&quot;&gt;Non-owners can set system_note_timestamp when creating &#x2F; updating issues&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting versions prior to 13.5. Improper permission check could allow the change of timestamp for issue creation or update. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22208&quot;&gt;CVE-2021-22208&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deploytoken-will-impersonate-a-user-with-the-same-id-when-using-dependency-proxy&quot;&gt;DeployToken will impersonate a User with the same ID when using Dependency Proxy&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.7. GitLab Dependency Proxy, under certain circumstances, can impersonate a user resulting in possibly incorrect access handling. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22211&quot;&gt;CVE-2021-22211&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-python-dependency&quot;&gt;Update Python dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on Python has been upgraded to 3.7.10 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects Omnibus versions 12.0 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-redis-dependency&quot;&gt;Update Redis dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on Redis has been upgraded to 6.0.12 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 12.7 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-carrierwave-gem&quot;&gt;Update carrierwave gem&lt;&#x2F;h2&gt;

&lt;p&gt;The carrierwave gem has been upgraded to 1.3.2 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mermaid-npm-package&quot;&gt;Update Mermaid npm package&lt;&#x2F;h2&gt;

&lt;p&gt;The Mermaid npm package has been upgraded to 8.9.2 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 13.9 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.11.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/04/23/gitlab-13-11-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/04/23/gitlab-13-11-1-released/</id>
<published>2021-04-23T00:00:00+00:00</published>
<updated>2021-04-23T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.11.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;04&#x2F;22&#x2F;gitlab-13-11-released&#x2F;&quot;&gt;this month&#x27;s 13.11 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59121&quot;&gt;Change unsubscribe language for email campaign&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59199&quot;&gt;Remove legacy storage key from notification check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59475&quot;&gt;Documentation about Pages Deployment migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59661&quot;&gt;Fix DAST_AUTH_VERIFICATION_URL docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59674&quot;&gt;Fix Geo replication for incident metrics uploads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59680&quot;&gt;Fix zero count of vulnerability severity count&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59692&quot;&gt;Add docs about project upload API size enforcement&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59764&quot;&gt;Fix Rake command for Pages deploys to object storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;59945&quot;&gt;Change search string that does not return results&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5181&quot;&gt;Bump gitlab-exporter to 10.2.0 (fixes Puma crash)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5184&quot;&gt;Update git vendor to gitlab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.11 released with Kubernetes Agent and Pipeline Compliance</title>
<release>13.11</release>
<link href='https://about.gitlab.com/releases/2021/04/22/gitlab-13-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/04/22/gitlab-13-11-released/</id>
<published>2021-04-22T00:00:00+00:00</published>
<updated>2021-04-22T00:00:00+00:00</updated>
<author>
<name>Sarah Waldner</name>
</author>
<content type='html'>&lt;p&gt;On this Earth Day we are thinking about growth. Our customers are scaling their DevOps practices and with growth comes the need for even greater efficiencies and automated controls. The &lt;a href=&quot;#gitlab-agent-for-kubernetes-available-on-gitlabcom&quot;&gt;GitLab Agent for Kubernetes&lt;&#x2F;a&gt; is now available on GitLab.com to help you benefit from fast, pull-based deployments to your cluster, while GitLab.com manages the necessary server-side components of the Agent. &lt;a href=&quot;#compliance-pipeline-configurations&quot;&gt;Compliant Pipeline Configurations&lt;&#x2F;a&gt; let you define enforceable pipelines that will run for any project assigned a corresponding compliance framework, even &lt;a href=&quot;#create-custom-compliance-framework-labels&quot;&gt;custom ones&lt;&#x2F;a&gt;. We also have a host of features to improve pipeline efficiency and measurement, to provide &lt;a href=&quot;#on-call-schedule-management&quot;&gt;On-call Scheduling&lt;&#x2F;a&gt;, and even more security enhancements. These are just a few of the 50+ significant new features and improvements in this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;controls-to-help-you-grow-safely-and-efficiently&quot;&gt;Controls to help you grow safely and efficiently&lt;&#x2F;h2&gt;

&lt;p&gt;Controls can keep your automation on track as you grow and scale while simplifying compliance efforts. The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;clusters&#x2F;agent&#x2F;&quot;&gt;GitLab Agent for Kubernetes&lt;&#x2F;a&gt; is core to GitLab&#x27;s Kubernetes integrations and is &lt;a href=&quot;#gitlab-kubernetes-agent-available-on-gitlabcom&quot;&gt;now available on GitLab.com&lt;&#x2F;a&gt;. The Agent-based integration supports pull-based deployments which are preferred by security and quickly becoming a popular method for Kubernetes deployment practices. The agent also supports Network Security policy integration and alerts which enables fine-tuned RBAC controls within your clusters. &lt;a href=&quot;#compliance-pipeline-configurations&quot;&gt;Compliant Pipeline Configurations&lt;&#x2F;a&gt; let you enforce a higher degree of separation of duties and reduce your business risks by defining enforceable pipelines that will run for any project assigned a corresponding compliance framework. At the same time, &lt;a href=&quot;#create-custom-compliance-framework-labels&quot;&gt;Custom Compliance Framework Labels&lt;&#x2F;a&gt; allow you to use your own requirements beyond the usual ones like PCI, HIPPA and such. The new &lt;a href=&quot;#re-authenticate-for-gitlab-administration-with-admin-mode&quot;&gt;Admin Mode&lt;&#x2F;a&gt; increases security and control of your GitLab instance by requiring admin users to reverify their credentials before running administrative commands. Audit reports are easier now too with a new &lt;a href=&quot;#export-a-user-access-report&quot;&gt;export&lt;&#x2F;a&gt; feature in your self-managed GitLab instance to see, all in one place, what groups, subgroups, and projects users have access to.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;speedier-pipelines&quot;&gt;Speedier pipelines&lt;&#x2F;h2&gt;

&lt;p&gt;“Speedy, reliable pipelines” is one of our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;ops&#x2F;#speedy-reliable-pipelines&quot;&gt;core product themes&lt;&#x2F;a&gt;, and we’ve delivered on that promise this month with a host of pipeline improvements.&lt;&#x2F;p&gt;

&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipeline_editor&#x2F;&quot;&gt;Pipeline Editor&lt;&#x2F;a&gt; helps you get to work even faster and stay more productive once you begin. The new &lt;a href=&quot;#create-initial-configuration-file-from-the-pipeline-editor&quot;&gt;Empty State&lt;&#x2F;a&gt; enhancement will allow new users to begin working with the pipeline editor on a new, blank pipeline file without having to create a config file first. The ability to configure &lt;a href=&quot;#use-multiple-caches-in-the-same-job&quot;&gt;multiple cache keys in a single job&lt;&#x2F;a&gt; will help you increase your pipeline performance and you can measure these improvements from the CI&#x2F;CD dashboard, where a &lt;a href=&quot;#track-dora-4-lead-time-for-changes-metric&quot;&gt;new DORA 4 graph&lt;&#x2F;a&gt; will show lead time for changes via time for code to be committed and deployed to production. As a related note, metrics on &lt;a href=&quot;#devops-adoption-metrics-available-at-the-group-level&quot;&gt;DevOps Adoption&lt;&#x2F;a&gt; are now available at the group level allowing users to understand how GitLab&#x27;s DevOps capabilities are being adopted.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;securing-your-software-supply-chain&quot;&gt;Securing your software supply chain&lt;&#x2F;h2&gt;

&lt;p&gt;Security pros will be happy to see the addition of the &lt;a href=&quot;#gitlab--semgrep-upgrading-sast-for-the-future&quot;&gt;Semgrep flexible rule syntax&lt;&#x2F;a&gt; to extend and modify custom detection rules, a popular request from GitLab SAST customers. We&#x27;ve also added support for &lt;a href=&quot;#support-for-custom-ca-certs-when-using-the-release-cli&quot;&gt;custom certificates&lt;&#x2F;a&gt; and &lt;a href=&quot;#ssh-key-expiration-email-notification&quot;&gt;email alerts for key expirations&lt;&#x2F;a&gt;. You can now improve your security posture by &lt;a href=&quot;#saml-enforcement-for-git-activity&quot;&gt;enforcing SAML for Git activity&lt;&#x2F;a&gt;. The new &lt;a href=&quot;#on-call-schedule-management&quot;&gt;On-call Schedule Management&lt;&#x2F;a&gt; routes alerts received in GitLab to the on-call engineer in the schedule for that project. This will be particularly helpful as we mature our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;govern&#x2F;&quot;&gt;security alerts in the future&lt;&#x2F;a&gt;, providing a valuable incident management capability with end-to-end visibility across the entire DevOps process.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for more features, performance enhancements and changes! To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page and our &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=5mTdhCuh9-I&quot;&gt;13.12 release kickoff&lt;&#x2F;a&gt; video.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_11&#x2F;13_11-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 13.10.3, 13.9.6, and 13.8.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/04/14/security-release-gitlab-13-10-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/04/14/security-release-gitlab-13-10-3-released/</id>
<published>2021-04-14T00:00:00+00:00</published>
<updated>2021-04-14T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.10.3, 13.9.6, and 13.8.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc secu
rity releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, t
he issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the
latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Remote-code-execution-when-uploading-specially-crafted-image-files&quot;&gt;Remote code execution when uploading specially crafted image files&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Update-Rexml&quot;&gt;Update Rexml&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency update - critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;remote-code-execution-when-uploading-specially-crafted-image-files&quot;&gt;Remote code execution when uploading specially crafted image files&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 11.9. GitLab was not properly validating image files that is passed to a file parser which resulted in a remote command execution. This is a critical severity issue (&lt;code&gt;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 9.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22205&quot;&gt;CVE-2021-22205&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rexml&quot;&gt;Update Rexml&lt;&#x2F;h2&gt;

&lt;p&gt;The Rexml ruby gem was upgraded to version 3.2.5 in order to mitigate &lt;a href=&quot;https:&#x2F;&#x2F;www.ruby-lang.org&#x2F;en&#x2F;news&#x2F;2021&#x2F;04&#x2F;05&#x2F;xml-round-trip-vulnerability-in-rexml-cve-2021-28965&#x2F;&quot;&gt;CVE-2021-28965&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 7.12 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.10.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/04/01/gitlab-13-10-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/04/01/gitlab-13-10-2-released/</id>
<published>2021-04-01T00:00:00+00:00</published>
<updated>2021-04-01T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.10.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;03&#x2F;22&#x2F;gitlab-13-10-released&#x2F;&quot;&gt;this month&#x27;s 13.10 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56860&quot;&gt;Fixes the old emoji menu showing a undefined category&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56332&quot;&gt;Added frequently used emojis to new picker&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;55169&quot;&gt;Improve performance for composer v2 clients&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56725&quot;&gt;Epic boards documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56965&quot;&gt;Remove incorrect and misleading statement in SAST documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56972&quot;&gt;Document configuring external KAS with GitLab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;57119&quot;&gt;Create 13.10 What&#x27;s New entry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;57146&quot;&gt;Remove admin mode entry from What&#x27;s New&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56971&quot;&gt;Fix Deploy Keys text in What&#x27;s New&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;57404&quot;&gt;Fix epic boards tier in docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;57479&quot;&gt;Fixed rendering of the image blobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;57903&quot;&gt;Revert &quot;Fix long polling to default to 50 s instead of 50 ns&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5123&quot;&gt;Update gitlab-org&#x2F;gitlab-exporter from 10.0.0 to 10.1.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.10.1, 13.9.5, and 13.8.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/03/31/security-release-gitlab-13-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/03/31/security-release-gitlab-13-10-1-released/</id>
<published>2021-03-31T00:00:00+00:00</published>
<updated>2021-03-31T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.10.1, 13.9.5, and 13.8.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#arbitrary-file-read-during-project-import&quot;&gt;Arbitrary File Read During Project Import&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#kroki-arbitrary-file-readwrite&quot;&gt;Kroki Arbitrary File Read&#x2F;Write&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-cross-site-scripting-in-merge-requests&quot;&gt;Stored Cross-Site-Scripting in merge requests&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#access-data-of-an-internal-project-through-a-public-project-fork-as-an-anonymous-user&quot;&gt;Access data of an internal project through a public project fork as an anonymous user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#incident-metric-images-can-be-deleted-by-any-user&quot;&gt;Incident metric images can be deleted by any user&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#infinite-loop-when-a-user-access-a-merge-request&quot;&gt;Infinite Loop When a User Access a Merge Request&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#stored-xss-in-scoped-labels&quot;&gt;Stored XSS in scoped labels&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#admin-csrf-in-system-hooks-execution-through-api&quot;&gt;Admin CSRF in System Hooks Execution Through API&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;low&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Update-OpenSSL-dependency&quot;&gt;Update OpenSSL dependency&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency update - high&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#Update-PostgreSQL-dependency&quot;&gt;Update PostgreSQL dependency&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;Dependency update - medium&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;arbitrary-file-read-during-project-import&quot;&gt;Arbitrary File Read During Project Import&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.9. A specially crafted import file could read files on the server. This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 9.6). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22201&quot;&gt;CVE-2021-22201&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;saltyyolk&quot;&gt;saltyyolk&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;kroki-arbitrary-file-readwrite&quot;&gt;Kroki Arbitrary File Read&#x2F;Write&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 13.7.9. A specially crafted Wiki page allowed attackers to read arbitrary files on the server. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 7.5). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22203&quot;&gt;CVE-2021-22203&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-cross-site-scripting-in-merge-requests&quot;&gt;Stored Cross-Site-Scripting in merge requests&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.4. It was possible to exploit a stored cross-site-scripting in merge request via a specifically crafted branch name. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 6.3). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22196&quot;&gt;CVE-2021-22196&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;@yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;access-data-of-an-internal-project-through-a-public-project-fork-as-an-anonymous-user&quot;&gt;Access data of an internal project through a public project fork as an anonymous user&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting with 12.6. Under a special condition it was possible to access data of an internal repository through a public project fork as an anonymous user. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.9). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22200&quot;&gt;CVE-2021-22200&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incident-metric-images-can-be-deleted-by-any-user&quot;&gt;Incident metric images can be deleted by any user&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions from 13.8 and above allowing an authenticated user to delete incident metric images of public projects. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22198&quot;&gt;CVE-2021-22198&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;infinite-loop-when-a-user-access-a-merge-request&quot;&gt;Infinite Loop When a User Access a Merge Request&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 10.6 where an infinite loop exist when an authenticated user with specific rights access a MR having source and target branch pointing to each other. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 3.5). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22197&quot;&gt;CVE-2021-22197&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-scoped-labels&quot;&gt;Stored XSS in scoped labels&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 12.9. GitLab was vulnerable to a stored XSS if scoped labels were used. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.5). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22199&quot;&gt;CVE-2021-22199&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;mike12&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;admin-csrf-in-system-hooks-execution-through-api&quot;&gt;Admin CSRF in System Hooks Execution Through API&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all previous versions. If the victim is an admin, it was possible to issue a CSRF in System hooks through the API. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:H&#x2F;UI:R&#x2F;S:U&#x2F;C:N&#x2F;I:L&#x2F;A:N&lt;&#x2F;code&gt;, 2.4). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22202&quot;&gt;CVE-2021-22202&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mishre&quot;&gt;@mishre&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl-dependency&quot;&gt;Update OpenSSL dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on OpenSSL has been upgraded to 1.1.1j in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 13.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-postgresql-dependency&quot;&gt;Update PostgreSQL dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on PostgreSQL 11 and 12 has been upgraded to 11.11 and 12.6 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.10 released with Admin Enhancements and Vulnerability Management</title>
<release>13.10</release>
<link href='https://about.gitlab.com/releases/2021/03/22/gitlab-13-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/03/22/gitlab-13-10-released/</id>
<published>2021-03-22T00:00:00+00:00</published>
<updated>2021-03-22T00:00:00+00:00</updated>
<author>
<name>Christen Dybenko</name>
</author>
<content type='html'>&lt;p&gt;GitLab 13.10 is now available! This month, we’ve focused on scalability and manageability across the product so you can iterate and innovate faster, with greater security and fewer headaches. 13.10 offers administrative enhancements to help scale DevOps in your org, Geo package integrity verification to improve Disaster Recovery, vulnerability management automation to apply efficiency and consistency to security processes, and—as always—a ton of fantastic contributions from the wider community.  These are just a few of the &lt;strong&gt;40+ new features and improvements&lt;&#x2F;strong&gt; in this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;scaling-devops&quot;&gt;Scaling DevOps&lt;&#x2F;h2&gt;

&lt;p&gt;Managing a growing DevOps org is challenging. GitLab 13.10 introduces several new features to automate routine tasks, boost your efficiency, and grow DevOps  within the organization without losing control. We’ve leveled up support for DORA metrics with a new API to &lt;a href=&quot;#dora4-based-lead-time-for-changes&quot;&gt;track lead time for changes (via merge requests)&lt;&#x2F;a&gt; on the project level, as well as &lt;a href=&quot;#group-level-api-support-for-deployment-frequency&quot;&gt;Deployment Frequency metrics via API at the group level&lt;&#x2F;a&gt;, so you can track and identify blockers across a portfolio of projects.&lt;&#x2F;p&gt;

&lt;p&gt;When issues &lt;em&gt;do&lt;&#x2F;em&gt; arise, we&#x27;ve added tools to help you &lt;a href=&quot;#integrate-any-it-alerting-tool-with-gitlab&quot;&gt;integrate and manage alerts from multiple monitoring solutions&lt;&#x2F;a&gt;. 13.10 also enhances disaster recovery (DR) for customers using GitLab Geo by &lt;a href=&quot;#geo-verifies-replicated-package-files&quot;&gt;automatically verifying the data integrity of replicated Package Registries&lt;&#x2F;a&gt; and &lt;a href=&quot;#geo-supports-replicating-group-wikis&quot;&gt;replicating group wikis&lt;&#x2F;a&gt;. And finally, we&#x27;re extremely excited to announce &lt;a href=&quot;#gitlab-runner-for-red-hat-openshift-ga&quot;&gt;General Availability of GitLab Runner Operator on Red Hat OpenShift&lt;&#x2F;a&gt;, bringing GitLab to even more platforms!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;scaling-vulnerability-management&quot;&gt;Scaling Vulnerability Management&lt;&#x2F;h2&gt;
&lt;p&gt;In 13.10, our security team has focused on reducing the overhead of managing and sharing vulnerabilities. &lt;a href=&quot;#vulnerability-bulk-status-updates&quot;&gt;Bulk Status Updates&lt;&#x2F;a&gt; allow security teams to modify the status of multiple vulnerabilities simultaneously. To help you identify and triage relevant information quickly, we&#x27;ve introduced &lt;a href=&quot;#clickable-file-and-line-number-links-on-vulnerability-report&quot;&gt;clickable file and line number links&lt;&#x2F;a&gt; in vulnerability reports that will deep-link you directly to relevant vulnerability details. We&#x27;ve also &lt;a href=&quot;#add-icons-to-the-vulnerability-trends-chart&quot;&gt;enhanced the interactivity of the vulnerability trends chart to make it easier to find and share information.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;wider-community-contribution-highlights&quot;&gt;Wider community contribution highlights&lt;&#x2F;h2&gt;

&lt;p&gt;Every month we receive hundreds of contributions from the wider community, and in addition to &lt;a href=&quot;#mvp&quot;&gt;this month&#x27;s MVP&lt;&#x2F;a&gt;, we&#x27;d like to show our appreciation to a few of our many outstanding contributors.&lt;&#x2F;p&gt;

&lt;p&gt;Ongoing thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;yo&quot;&gt;Yogi&lt;&#x2F;a&gt; for dozens of contributions to 13.10, as well as months of amazingly consistent contributions and throughput. You are an example of &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;values&#x2F;#iteration&quot;&gt;iteration&lt;&#x2F;a&gt; in action, and you continue to tackle challenges with &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;values&#x2F;#boring-solutions&quot;&gt;boring solutions&lt;&#x2F;a&gt; that deliver amazing results!&lt;&#x2F;p&gt;

&lt;p&gt;Thank you, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;quatauta&quot;&gt;Daniel Schömer&lt;&#x2F;a&gt; for your iterations toward a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;56269#current-behavior-no-on-click-on-tap-expandcollapse&quot;&gt;more consistent UX in project settings&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;haasef&quot;&gt;Felix Haase&lt;&#x2F;a&gt; for his work on &lt;a href=&quot;#clone-project-inside-visual-studio-code&quot;&gt;cloning projects from within Visual Studio Code&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;Thank you to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;KevSlashNull&quot;&gt;@KevSlashNull&lt;&#x2F;a&gt; for his work enabling &lt;a href=&quot;#open-project-in-visual-studio-code&quot;&gt;one-click opening of projects in VS Code&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;GitLab is a DevOps platform, and a huge reason for that is you. We&#x27;re a community, and in 13.10 alone we enjoyed &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.biterg.io&#x2F;goto&#x2F;937475d38035f496df3501c9b30af5ef&quot;&gt;over 250 merged wider community contributions&lt;&#x2F;a&gt;. Selecting one MVP wasn&#x27;t easy; thank you all for your professionalism and hard work.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-so-much-more&quot;&gt;And so much more!&lt;&#x2F;h2&gt;

&lt;p&gt;Some of our favorite quality of life improvements in 13.10 include:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;papercuts.gitlab.com&#x2F;?milestone=13.10&quot;&gt;Dozens of quality of life usability improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#search-and-autocomplete-by-full-name-in-comment-mentions&quot;&gt;Search for and autocomplete by full name in mentions in comments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#automatically-retarget-merge-requests&quot;&gt;Automatically retarget merge requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#horizontal-navigation-for-value-stream-analytics&quot;&gt;Horizontal navigation for Value Stream Analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Read on for more features, performance enhancements and changes! To preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page and our &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;cVOkOTkQZ-A&quot;&gt;13.11 release kickoff video&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_10&#x2F;13_10-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 13.9.4, 13.8.6, and 13.7.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/</id>
<published>2021-03-17T00:00:00+00:00</published>
<updated>2021-03-17T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.9.4, 13.8.6, and 13.7.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;table-of-fixes&quot;&gt;Table of Fixes&lt;&#x2F;h2&gt;

&lt;table&gt;
  &lt;thead&gt;
    &lt;tr&gt;
      &lt;th&gt;Title&lt;&#x2F;th&gt;
      &lt;th&gt;Severity&lt;&#x2F;th&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;thead&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;&lt;a href=&quot;#remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options&quot;&gt;Remote code execution via unsafe user-controlled markdown rendering options&lt;&#x2F;a&gt;&lt;&#x2F;td&gt;
      &lt;td&gt;critical&lt;&#x2F;td&gt;
    &lt;&#x2F;tr&gt;
  &lt;&#x2F;tbody&gt;
&lt;&#x2F;table&gt;

&lt;h2 id=&quot;remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options&quot;&gt;Remote code execution via unsafe user-controlled markdown rendering options&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.2 allowing unauthorised authenticated users to execute arbitrary code on the server. This is a critical severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:C&#x2F;C:H&#x2F;I:H&#x2F;A:H&lt;&#x2F;code&gt;, 9.9). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22192&quot;&gt;CVE-2021-22192&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.9.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/03/08/gitlab-13-9-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/03/08/gitlab-13-9-3-released/</id>
<published>2021-03-08T00:00:00+00:00</published>
<updated>2021-03-08T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.9.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;02&#x2F;22&#x2F;gitlab-13-9-released&#x2F;&quot;&gt;this month&#x27;s 13.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;55295&quot;&gt;Upgrade gitlab-shell to v13.17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;55091&quot;&gt;Use new temp index for backfilling artifact expiry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;55665&quot;&gt;Fix disabling of Kroki optional formats&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;55884&quot;&gt;Rename asset_proxy_allowlist column&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;55252&quot;&gt;Document how to disable S3 multi-threaded copying&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.9.2, 13.8.5 and 13.7.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/03/04/security-release-gitlab-13-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/03/04/security-release-gitlab-13-9-2-released/</id>
<published>2021-03-04T00:00:00+00:00</published>
<updated>2021-03-04T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.9.2, 13.8.5 and 13.7.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;jwt-token-leak-via-workhorse&quot;&gt;JWT token leak via Workhorse&lt;&#x2F;h2&gt;

&lt;p&gt;A path traversal vulnerability via the GitLab Workhorse in all versions of GitLab could result in the leakage of a JWT token. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22190&quot;&gt;CVE-2021-22190&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996?type=user&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-wiki-pages&quot;&gt;Stored XSS in wiki pages&lt;&#x2F;h2&gt;

&lt;p&gt;Insufficient input sanitization in wikis in GitLab version 13.8 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted commit to a wiki. It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22185&quot;&gt;CVE-2021-22185&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf?type=user&quot;&gt;@yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-maintainers-are-able-to-use-the-group-cicd-variables-api&quot;&gt;Group Maintainers are able to use the Group CI&#x2F;CD Variables API&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue in GitLab CE&#x2F;EE version 9.4 and up allowed a group maintainer to modify group CI&#x2F;CD variables which should be restricted to group owners. It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22186&quot;&gt;CVE-2021-22186&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to a customer for reporting this vulnerability to the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-storage-of-gitlab-session-keys&quot;&gt;Insecure storage of GitLab session keys&lt;&#x2F;h2&gt;

&lt;p&gt;In all versions of GitLab, marshalled session keys were being stored in Redis. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22194&quot;&gt;CVE-2021-22194&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to a customer for reporting this vulnerability to the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-thrift-gem&quot;&gt;Update thrift gem&lt;&#x2F;h2&gt;

&lt;p&gt;The thrift gem has been upgraded to 0.14.0 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 11.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-swagger-ui-dist-dependency&quot;&gt;Update swagger-ui-dist dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency on swagger-ui-dist has been upgraded to 3.43.0 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;kannthu?type=user&quot;&gt;@kannthu&lt;&#x2F;a&gt; for reporting this through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects versions 13.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.9.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/02/23/gitlab-13-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/02/23/gitlab-13-9-1-released/</id>
<published>2021-02-23T00:00:00+00:00</published>
<updated>2021-02-23T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.9.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;02&#x2F;22&#x2F;gitlab-13-9-released&#x2F;&quot;&gt;this month&#x27;s 13.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54287&quot;&gt;Fix N+1 SQL regression in exporting issues to CSV&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54346&quot;&gt;Fix issue email participants migration version&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54446&quot;&gt;Send SIGINT instead of SIGQUIT to puma&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54492&quot;&gt;Updates authorization for lint&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54568&quot;&gt;Log disk_path instead of path for importer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54614&quot;&gt;Reset templates cache key&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54634&quot;&gt;Restore missing scrollbar on boards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54669&quot;&gt;Fix: keep latest artifacts checkbox shows always disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54671&quot;&gt;Fix &#x27;Open in your IDE&#x27; buttons don’t open the IDE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54736&quot;&gt;Fix Metric tab not showing up on operations page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54868&quot;&gt;Fix S3 object storage failing when endpoint is not specified&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54921&quot;&gt;Fix broken What&#x27;s New image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;54945&quot;&gt;Fix duplicate text in What&#x27;s New&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;5031&quot;&gt;Ensure Marketplace AMIs have licenses embedded&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt; features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.9 released with a Security Alert Dashboard and Maintenance Mode</title>
<release>13.9</release>
<link href='https://about.gitlab.com/releases/2021/02/22/gitlab-13-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/02/22/gitlab-13-9-released/</id>
<published>2021-02-22T00:00:00+00:00</published>
<updated>2021-02-22T00:00:00+00:00</updated>
<author>
<name>Andrew Thomas</name>
</author>
<content type='html'>&lt;p&gt;GitLab 13.9 is now available to strengthen DevSecOps at scale, with a Security Alert Dashboard to triage high priority alerts, Maintenance Mode for unfailing support of distributed teams, better visibility including additional support for DORA metrics, and advanced automation capabilities that will help you deliver “better products, faster.” These are just a few of the &lt;strong&gt;60+ significant new features and improvements&lt;&#x2F;strong&gt; in this release.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;devsecops-at-scale&quot;&gt;DevSecOps at scale&lt;&#x2F;h2&gt;

&lt;p&gt;Keeping a production environment both secure and available are top priorities, but they can be difficult to balance. Our new &lt;a href=&quot;#security-alert-dashboard-for-container-network-policy-alerts&quot;&gt;Security Alert Dashboard&lt;&#x2F;a&gt; will help you balance security and reliability, by discerning between suspicious network activity that needs to be blocked immediately or that only needs further attention, minimizing disruption to users. We&#x27;re also excited to add &lt;a href=&quot;#javascript-and-python-support-for-coverage-guided-fuzz-testing&quot;&gt;JavaScript and Python support for coverage-guided fuzz testing&lt;&#x2F;a&gt;, making it easier to build secure and reliable software, with results piped into your Security Dashboard.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab is built for distributed teams. Our new &lt;a href=&quot;#maintenance-mode&quot;&gt;Maintenance Mode&lt;&#x2F;a&gt; enables read-only availability of your instance during more admin tasks, further reducing downtime. Scale and redundancy in data storage are improved with &lt;a href=&quot;#override-gitaly-cluster-replication-factor-for-specific-repositories&quot;&gt;variable Gitaly replication factors&lt;&#x2F;a&gt;, so you can tune your cluster to your own storage and budget constraints, while also enabling horizontal scaling.&lt;&#x2F;p&gt;

&lt;p&gt;Visibility is another core requirement in scaling DevOps, and &lt;a href=&quot;#release-analytics-at-the-group-level&quot;&gt;Release Analytics at the group level&lt;&#x2F;a&gt; continues to grow our support of DORA metrics, now aggregated for projects in a group. The &lt;a href=&quot;#easily-see-repeat-failed-tests-in-unit-test-reports&quot;&gt;new failed-test counter in Unit Test Reports&lt;&#x2F;a&gt; and a &lt;a href=&quot;#new-merge-request-metric-mean-time-to-merge&quot;&gt;new merge request metric, mean time to merge&lt;&#x2F;a&gt; help you achieve and understand underlying efficiencies.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;automate-your-way-to-better-products-faster&quot;&gt;Automate your way to better products, faster&lt;&#x2F;h2&gt;

&lt;p&gt;If you’re new to DevOps or renewing stalled efforts, an edict to deliver “better products, faster” can sound a little like “doing more, with less;” it may feel counterintuitive. But DevOps is the answer and automation is the key to doing both well.&lt;&#x2F;p&gt;

&lt;p&gt;One sure way to build and test faster is to look for redundancies in configuration. A new function in 13.9 saves you time by enabling &lt;a href=&quot;#select-cicd-configuration-from-any-job-and-reuse-it&quot;&gt;reuse in your pipeline of a CI&#x2F;CD configuration from any job&lt;&#x2F;a&gt;, even if it&#x27;s in another file.&lt;&#x2F;p&gt;

&lt;p&gt;Automating at scale often requires mitigating complexity. When you’ve broken down your pipeline configuration into many files, you’ll like that you can now &lt;a href=&quot;#view-an-expanded-version-of-the-cicd-configuration&quot;&gt;view an expanded version of the configuration&lt;&#x2F;a&gt;. Deployment processes using parent-child or multi-project pipelines can also now use &lt;a href=&quot;#resource-group-for-multi-project-and-parent-child-pipelines&quot;&gt;resource groups to manage concurrency across stages, jobs, and even projects&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;wider-community-contribution-highlights&quot;&gt;Wider community contribution highlights&lt;&#x2F;h2&gt;

&lt;p&gt;We’re thrilled to introduce &lt;a href=&quot;#gpu-and-smart-scheduling-support-for-gitlab-runner&quot;&gt;GPU and smart scheduling support for GitLab Runner&lt;&#x2F;a&gt;, supporting specialized compute workloads like those in machine learning, and contributed by &lt;a href=&quot;#mvp&quot;&gt;this month&#x27;s MVP, Andreas Gravgaard Andersen&lt;&#x2F;a&gt;! Andreas showed awesome perseverance through reviews that spanned 10 months.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to another brilliant contribution, you can now &lt;a href=&quot;#follow-user-activity&quot;&gt;follow other GitLab users’ activity&lt;&#x2F;a&gt;! You might start by following its contributor, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;bufferoverflow&quot;&gt;Roger Meier @bufferoverflow&lt;&#x2F;a&gt; from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;siemens&quot;&gt;Siemens&lt;&#x2F;a&gt;, himself a &lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;GitLab Hall of Famer&lt;&#x2F;a&gt; and sage of Open Source and InnerSource.&lt;&#x2F;p&gt;

&lt;p&gt;Thank you to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;marshall007&quot;&gt;Marshall Cottrell @marshall007 from NASA&lt;&#x2F;a&gt; for &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;cluster-integration&#x2F;gitlab-agent&#x2F;-&#x2F;merge_requests&#x2F;281#note_507445139&quot;&gt;creating a 1-liner installer for the GitLab Agent for Kubernetes&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;1807#note_505567583&quot;&gt;simplifying its configuration&lt;&#x2F;a&gt;, enabling users to get started with the Agent much more easily. Marshall&#x27;s feedback, ideas, and collaboration beyond merged contributions were also called &quot;invaluable.&quot;&lt;&#x2F;p&gt;

&lt;p&gt;Thank you to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;KevSlashNull&quot;&gt;Kev @KevSlashNull&lt;&#x2F;a&gt; of SiegeGG, who &lt;a href=&quot;#vulnerability-report-activity-filter&quot;&gt;added an Activity filter to Vulnerability Reports&lt;&#x2F;a&gt;, helping you drill into precisely the vulnerability list view you need. GitLab&#x27;s own AppSec team are grateful as are many others, for this and Kev&#x27;s many contributions.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab isn&#x27;t only a &lt;a href=&quot;&#x2F;solutions&#x2F;devops-platform&#x2F;&quot;&gt;DevOps platform&lt;&#x2F;a&gt;, or a company, we&#x27;re also a community, and in 13.9 alone we enjoyed an incredible &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.biterg.io&#x2F;goto&#x2F;937475d38035f496df3501c9b30af5ef&quot;&gt;299 merged wider community contributions&lt;&#x2F;a&gt;. Selecting one MVP wasn&#x27;t easy; thank you all for your professionalism and hard work.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-so-much-more&quot;&gt;And so much more!&lt;&#x2F;h2&gt;

&lt;p&gt;Some of our favorite quality of life improvements in 13.9 include:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#create-changelogs-using-the-gitlab-api&quot;&gt;Create changelogs using the GitLab API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#mark-changes-as-viewed-in-merge-requests&quot;&gt;Mark changes as viewed in merge requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#request-a-follow-up-review-from-a-reviewer&quot;&gt;Request a follow-up review from a Reviewer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#create-jira-issues-from-vulnerabilities&quot;&gt;Create Jira issues from Vulnerabilities&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#assign-incidents-to-milestones&quot;&gt;Assign incidents to milestones&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#markdown-links-for-feature-flags&quot;&gt;Markdown links for Feature Flags&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#allow-deploy-keys-to-push-to-protected-branches&quot;&gt;Allow Deploy Keys to push to protected branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Read on for more, and to preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page and our &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=8VolMk8VorM&quot;&gt;13.10 release kickoff video&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_9&#x2F;13_9-cover-image-2.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.8.4, 13.7.7 and 13.6.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/02/11/security-release-gitlab-13-8-4-released/</id>
<published>2021-02-11T00:00:00+00:00</published>
<updated>2021-02-11T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.8.4, 13.7.7 and 13.6.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-certificate-validation-for-fortinet-otp&quot;&gt;Improper Certificate Validation for Fortinet OTP&lt;&#x2F;h2&gt;

&lt;p&gt;Starting with version 13.7 the Gitlab CE&#x2F;EE editions were affected by a security issue related to the validation of the certificates for the Fortinet OTP that could result in authentication issues. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22189&quot;&gt;CVE-2021-22189&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-attack-on-gitlab-shell&quot;&gt;Denial of Service Attack on gitlab-shell&lt;&#x2F;h2&gt;

&lt;p&gt;Potential DoS was identified in gitlab-shell in GitLab CE&#x2F;EE version 12.6.0 or above, which allows an attacker to spike the server resource utilization via gitlab-shell command. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22177&quot;&gt;CVE-2021-22177&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;resource-exhaustion-due-to-pending-jobs&quot;&gt;Resource exhaustion due to pending jobs&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions of Gitlab EE&#x2F;CE before 12.6.7. A potential resource exhaustion issue that allowed running or pending jobs to continue even after project was deleted. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22187&quot;&gt;CVE-2021-22187&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-issue-titles-were-exposed&quot;&gt;Confidential issue titles were exposed&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 13.0. Confidential issue titles in Gitlab were readable by an unauthorised user via branch logs. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22188&quot;&gt;CVE-2021-22188&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;aemirercin?type=user&quot;&gt;@aemirercin&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-allowed-demoted-project-members-to-access-authored-merge-requests&quot;&gt;Improper access control allowed demoted project members to access authored merge requests&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 3.0.1. Improper access control allows demoted project members to access details on authored merge requests. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22176&quot;&gt;CVE-2021-22176&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;muthu_prakash?type=user&quot;&gt;@muthu_prakash&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-allowed-unauthorized-users-to-access-analytic-pages&quot;&gt;Improper access control allowed unauthorized users to access analytic pages&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 13.4. Improper access control allows unauthorized users to access details on analytic pages. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22180&quot;&gt;CVE-2021-22180&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar?type=user&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-ci-lint-api-may-lead-to-information-disclosure-and-ssrf&quot;&gt;Unauthenticated CI lint API may lead to information disclosure and SSRF&lt;&#x2F;h2&gt;

&lt;p&gt;When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22175&quot;&gt;CVE-2021-22175&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;myster?type=user&quot;&gt;@myster&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prometheus-integration-in-gitlab-may-lead-to-ssrf&quot;&gt;Prometheus integration in Gitlab may lead to SSRF&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 13.2. Gitlab was vulnerable to server-side request forgery vulnerability attack due when Prometheus was used. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22178&quot;&gt;CVE-2021-22178&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf?type=user&quot;&gt;@yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.8.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/02/05/gitlab-13-8-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/02/05/gitlab-13-8-3-released/</id>
<published>2021-02-05T00:00:00+00:00</published>
<updated>2021-02-05T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.8.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;01&#x2F;22&#x2F;gitlab-13-8-released&#x2F;&quot;&gt;this month&#x27;s 13.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52253&quot;&gt;Fix Geo replication status for replicables with no data to sync&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52404&quot;&gt;Use the shells background feature to put it into background&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52561&quot;&gt;Revert multipart URL optimization for AWS S3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52656&quot;&gt;Fix regression with old wiki image uploads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;53153&quot;&gt;Wait up to 60 seconds instead of 30 seconds till PIDs should exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52586&quot;&gt;Handle unreachable ES host in settings check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4966&quot;&gt;Ensure the packagecloud binary is available for the raspberry pi release&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4978&quot;&gt;Fix a nil error when workhorse is set to use tcp&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;For multi-node deployments, this version &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.8.2, 13.7.6 and 13.6.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/02/01/security-release-gitlab-13-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/02/01/security-release-gitlab-13-8-2-released/</id>
<published>2021-02-01T00:00:00+00:00</published>
<updated>2021-02-01T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.8.2, 13.7.6 and 13.6.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-merge-request&quot;&gt;Stored XSS in merge request&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 13.7. GitLab was vulnerable to a stored XSS in merge requests. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22182&quot;&gt;CVE-2021-22182&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-epics-pages&quot;&gt;Stored XSS in epic&#x27;s pages&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 11.8. GitLab was vulnerable to a stored XSS in the epics page, which could be exploited with user interactions. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22183&quot;&gt;CVE-2021-22183&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;mike12&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sensitive-graphql-variables-exposed-in-structured-log&quot;&gt;Sensitive GraphQL variables exposed in structured log&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure issue in GitLab 12.0+ allowed a user with access to the server logs to see sensitive information that wasn&#x27;t properly redacted. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:L&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 6.2). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22184&quot;&gt;CVE-2021-22184&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-user-can-see-tag-names-in-private-projects&quot;&gt;Guest user can see tag names in private projects&lt;&#x2F;h2&gt;

&lt;p&gt;Improper authorization in GitLab 12.8+ allows a guest user in a private project to view tag data that should be inaccessible on the releases page. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22172&quot;&gt;CVE-2021-22172&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;izzsec?type=user&quot;&gt;@izzsec&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-error-message&quot;&gt;Information disclosure via error message&lt;&#x2F;h2&gt;

&lt;p&gt;An issue was identified in GitLab EE 13.4 or later which could disclose internal IP address via error messages. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22169&quot;&gt;CVE-2021-22169&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dns-rebinding-protection-bypass&quot;&gt;DNS rebinding protection bypass&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting with 12.2. GitLab was vulnerable to a DNS rebinding protection bypass. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22179&quot;&gt;CVE-2021-22179&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;validate-existence-of-private-project&quot;&gt;Validate existence of private project&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions. Validate the use of a specific name for private project in a group was posible. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22193&quot;&gt;CVE-2021-22193&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;milindpurswani&quot;&gt;milindpurswani&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.8.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/01/26/gitlab-13-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/01/26/gitlab-13-8-1-released/</id>
<published>2021-01-26T00:00:00+00:00</published>
<updated>2021-01-26T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.8.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2021&#x2F;01&#x2F;22&#x2F;gitlab-13-8-released&#x2F;&quot;&gt;this month&#x27;s 13.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52296&quot;&gt;Fix LFS not working with S3 specific-storage settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4952&quot;&gt;Skip the auth settings for pages when access control is not enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52512&quot;&gt;Fix missing setting LDAP servers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51760&quot;&gt;Add notification email event for SAML&#x2F;SCIM&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51761&quot;&gt;Create What&#x27;s New for 13.8&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51821&quot;&gt;Clean up artifact expiry migration problem&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51830&quot;&gt;Resolve &quot;Update Approval Rule documentation&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51979&quot;&gt;Docs: Reviewer approval rules&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52088&quot;&gt;Fix browser performance widget issue body import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51775&quot;&gt;Geo: clarify how to migrate single PostgreSQL to Patroni on secondary node&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52069&quot;&gt;Failsafe access to current user&#x27;s email&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does include new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.7.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/01/25/gitlab-13-7-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/01/25/gitlab-13-7-5-released/</id>
<published>2021-01-25T00:00:00+00:00</published>
<updated>2021-01-25T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.7.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;12&#x2F;22&#x2F;gitlab-13-7-released&#x2F;&quot;&gt;this month&#x27;s 13.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;3002&quot;&gt;Disable ref tx hooks for FetchRemote calls&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50736&quot;&gt;Fix brand_new_project_guidelines not being displayed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4909&quot;&gt;Resolve &quot;The &lt;code&gt;gitlab-ctl patroni failover&lt;&#x2F;code&gt; command does not work&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4919&quot;&gt;Fix https pages settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4929&quot;&gt;Convert external_http pages setting to bool for rails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;52296&quot;&gt;Fix LFS not working with S3 specific-storage settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;51565&quot;&gt;Only use top level groups in devops adoption&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.8 released with a Pipeline Editor and DORA metrics</title>
<release>13.8</release>
<link href='https://about.gitlab.com/releases/2021/01/22/gitlab-13-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/01/22/gitlab-13-8-released/</id>
<published>2021-01-22T00:00:00+00:00</published>
<updated>2021-01-22T00:00:00+00:00</updated>
<author>
<name>Farnoosh Seifoddini</name>
</author>
<content type='html'>&lt;p&gt;Today, we are excited to introduce a dedicated Pipeline Editor, a deployment frequency dashboard, and several quality of life improvements that will make using GitLab every day even more enjoyable. These are just a few highlights from the 50+ improvements in this release.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;the-new-pipeline-editor-makes-cicd-easy-to-use&quot;&gt;The new Pipeline Editor makes CI&#x2F;CD easy to use&lt;&#x2F;h2&gt;

&lt;p&gt;Since its inception, the defining feature of GitLab CI&#x2F;CD has been the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; configuration file. Configuring pipelines as code means you can version control and collaborate on pipelines using the same interfaces you use for your application code. Additionally, GitLab&#x27;s advanced syntax provides a high degree of customization for sophisticated and demanding CI&#x2F;CD use cases. However, all of this power and flexibility comes with a fair bit of complexity. This is why our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;-&#x2F;epics&#x2F;4534&quot;&gt;vision for CI&#x2F;CD&lt;&#x2F;a&gt; is to create a visual pipeline authoring experience, built-in to GitLab, that simplifies the complexity letting you quickly create and edit pipelines while still exposing advanced options when you need them.&lt;&#x2F;p&gt;

&lt;p&gt;Today, we’re pleased to introduce the first iteration of the &lt;a href=&quot;#pipeline-editor&quot;&gt;Pipeline Editor&lt;&#x2F;a&gt;. Starting in 13.8, you&#x27;ll have a dedicated editor designed for CI&#x2F;CD with some enhanced functionality such as built-in &lt;a href=&quot;#ci-lint-tool-in-the-pipeline-editor-page&quot;&gt;linting&lt;&#x2F;a&gt; and &lt;a href=&quot;#cicd-configuration-validation-in-pipeline-editor&quot;&gt;configuration validation&lt;&#x2F;a&gt;. A &lt;a href=&quot;#visualization-of-pipeline-configuration&quot;&gt;pipeline visualizer&lt;&#x2F;a&gt; in the editor will show you what your pipelines will look like before you commit your changes. These capabilities allow new users to get started with GitLab CI&#x2F;CD quickly and make experienced power users more efficient. This is just the beginning of what&#x27;s in store for the Pipeline Editor. We can&#x27;t wait for you to try it out so you can share your feedback, suggestions, and code contributions.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;improve-your-devops-maturity-with-deployment-frequency-metrics&quot;&gt;Improve your DevOps maturity with deployment frequency metrics&lt;&#x2F;h2&gt;

&lt;p&gt;IT leaders and practitioners alike love DevOps. Developers and software engineers love that DevOps makes their job easier while IT leaders love that DevOps makes the business perform better. For several years, &lt;a href=&quot;https:&#x2F;&#x2F;www.devops-research.com&#x2F;research.html&quot;&gt;DORA, the DevOps Research and Assessment firm&lt;&#x2F;a&gt;, has conducted primary research on the impact of DevOps in the enterprise. Their &lt;a href=&quot;https:&#x2F;&#x2F;www.devops-research.com&#x2F;research.html#reports&quot;&gt;published results&lt;&#x2F;a&gt; have shown that DevOps maturity leads to positive business outcomes like happier customers, greater market share, and increased revenue. Four metrics in particular, commonly known as the “DORA 4”, are highly correlated with business performance. These are deployment frequency, lead time for changes, time to restore service, and change failure rate.&lt;&#x2F;p&gt;

&lt;p&gt;We’ve heard from many of you that you want to measure these metrics so that you can improve them. However, instrumenting your systems to capture and report on these metrics can be difficult and time-consuming. We decided to build them into GitLab for you so you can focus on improving your DevOps maturity instead of instrumentation. Starting with GitLab 13.8 you can find &lt;a href=&quot;#deployment-frequency-charts&quot;&gt;deployment frequency charts&lt;&#x2F;a&gt; in your CI&#x2F;CD analytics. This is just the first of the DORA 4 metrics to come to GitLab. Our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;-&#x2F;epics&#x2F;4358&quot;&gt;vision for the coming year&lt;&#x2F;a&gt; will be to add the additional three metrics so you’ll be able to measure and optimize your DevOps practices.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;a-few-small-features-to-improve-your-quality-of-life&quot;&gt;A few small features to improve your quality of life&lt;&#x2F;h2&gt;

&lt;p&gt;As GitLab gets better with every iteration sometimes the most exciting improvements aren’t the big new features, but the small UX improvements that take a tedious task and make it simple and easy. In this release, we’ve shipped several long-asked-for enhancements that we think you’ll enjoy such as the ability to:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#send-an-email-to-an-issue&quot;&gt;Send an email to an issue&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#click-and-drag-multiline-merge-request-comments&quot;&gt;Click and drag to make multi-line comments&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#download-artifacts-directly-from-the-merge-request-widget&quot;&gt;Download artifacts from an MR widget&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#repeat-failed-test-counter&quot;&gt;Identify flaky tests with a repeat failed test counter&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#rebase-quick-action-for-merge-requests&quot;&gt;Rebase an MR branch with a quick action&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;These are just a few of many ways GitLab has been made better in this release. Read on to see more. And, if you&#x27;d like to preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page as well as our &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=NYX-thYThCo&quot;&gt;13.9 release kick-off video&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_8&#x2F;13_8-cover-image-2.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 13.7.4, 13.6.5 and 13.5.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/01/14/critical-security-release-gitlab-13-7-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/01/14/critical-security-release-gitlab-13-7-4-released/</id>
<published>2021-01-14T00:00:00+00:00</published>
<updated>2021-01-14T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.7.4, 13.6.5 and 13.5.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security&#x2F;faq&#x2F;&quot;&gt;security FAQ&lt;&#x2F;a&gt;. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ability-to-steal-a-users-api-access-token-through-gitlab-pages&quot;&gt;Ability to steal a user&#x27;s API access token through GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;A way to bypass the fix released in the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2021&#x2F;01&#x2F;07&#x2F;security-release-gitlab-13-7-2-released&#x2F;#ability-to-steal-a-users-api-access-token-through-gitlab-pages&quot;&gt;previous security release&lt;&#x2F;a&gt; was discovered internally by the GitLab team. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 7.3). We have requested a CVE ID and will update this blog post when it is assigned.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.7.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/01/08/gitlab-13-7-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/01/08/gitlab-13-7-3-released/</id>
<published>2021-01-08T00:00:00+00:00</published>
<updated>2021-01-08T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.7.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;12&#x2F;22&#x2F;gitlab-13-7-released&#x2F;&quot;&gt;this month&#x27;s 13.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50246&quot;&gt;Fix Canary Ingress weight is not reflected on UI immediately&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50262&quot;&gt;Change pages deployments size column to bigint&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50362&quot;&gt;Set registry fields to nullable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50547&quot;&gt;Update Helm 2 version to 2.17.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50800&quot;&gt;Follow-up from &quot;Fix project access token regression&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50806&quot;&gt;Note feature flag for user cap&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;49982&quot;&gt;Job Trace polling solution&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does include new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.7.2, 13.6.4, and 13.5.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2021/01/07/security-release-gitlab-13-7-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2021/01/07/security-release-gitlab-13-7-2-released/</id>
<published>2021-01-07T00:00:00+00:00</published>
<updated>2021-01-07T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.7.2, 13.6.4, and 13.5.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-note&quot;&gt;Upgrade Note&lt;&#x2F;h2&gt;

&lt;p&gt;This release applies a database migration to configure as &lt;code&gt;Confidential&lt;&#x2F;code&gt; all instance-wide OAuth applications that are configured as &lt;code&gt;Trusted&lt;&#x2F;code&gt;. This will require the applications to send the &lt;code&gt;client_secret&lt;&#x2F;code&gt; as part of the OAuth flow, which is a best practice. The change is required to correct one of the issues in this security release. If you have any custom instance-wide applications that are having issues following this migration, it means that you have clients that aren&#x27;t sending the &lt;code&gt;client_secret&lt;&#x2F;code&gt; or are using the implicit flow during the OAuth authentication process. Here is how to solve the problem:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;The preferred way is to make the client send the &lt;code&gt;client_secret&lt;&#x2F;code&gt; using the Authorization Code flow.&lt;&#x2F;li&gt;
  &lt;li&gt;If impossible, or if there&#x27;s no way to keep the &lt;code&gt;client_secret&lt;&#x2F;code&gt; secret, then you can switch the application back to non-confidential. However, we suggest making the application non-trusted as well so that users are required to explicitly authorize the application when it requests access tokens on their behalf without the &lt;code&gt;client_secret&lt;&#x2F;code&gt;.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;ability-to-steal-a-users-api-access-token-through-gitlab-pages&quot;&gt;Ability to steal a user&#x27;s API access token through GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;Insufficient validation of authentication parameters in GitLab Page for GitLab 11.5+. This is a high severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:H&#x2F;I:H&#x2F;A:N&lt;&#x2F;code&gt;, 8.1). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22171&quot;&gt;CVE-2021-22171&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prometheus-denial-of-service-via-http-request-with-custom-method&quot;&gt;Prometheus denial of service via HTTP request with custom method&lt;&#x2F;h2&gt;

&lt;p&gt;An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22166&quot;&gt;CVE-2021-22166&lt;&#x2F;a&gt;.
.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-user-is-able-to-access-private-repository-information-under-specific-conditions&quot;&gt;Unauthorized user is able to access private repository information under specific conditions&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers within a specific project page allows attacker to have temporary read access to a public repository with project features restricted to only members. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:N&#x2F;UI:R&#x2F;S:U&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22167&quot;&gt;CVE-2021-22167&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @anshraj_srivastava for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-in-nuget-api&quot;&gt;Regular expression denial of service in NuGet API&lt;&#x2F;h2&gt;

&lt;p&gt;A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22168&quot;&gt;CVE-2021-22168&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regular-expression-denial-of-service-in-package-uploads&quot;&gt;Regular expression denial of service in package uploads&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.4. The regex used for package names is written in a way that makes execution time have quadratic growth based on the length of the malicious input string. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26414&quot;&gt;CVE-2020-26414&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-curl-dependency&quot;&gt;Update curl dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The curl dependency has been upgraded to 7.74.0 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all GitLab Omnibus versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cve-2019-3881-mitigation&quot;&gt;CVE-2019-3881 mitigation&lt;&#x2F;h2&gt;

&lt;p&gt;A patch has been applied to mitigate CVE-2019-3881 in the bundler dependency.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all GitLab Omnibus versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are &lt;strong&gt;upgraded to the latest version as soon as possible&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.7.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/12/23/gitlab-13-7-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/12/23/gitlab-13-7-1-released/</id>
<published>2020-12-23T00:00:00+00:00</published>
<updated>2020-12-23T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.7.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;12&#x2F;22&#x2F;gitlab-13-7-released&#x2F;&quot;&gt;this month&#x27;s 13.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;47316&quot;&gt;Fix project transfer corrupting shared runners state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50202&quot;&gt;Add roadmap filters to docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50271&quot;&gt;Fix DAST profiles deletion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50333&quot;&gt;Update automation instructions for DB setup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50336&quot;&gt;Improve AWS EKS troubleshooting documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50358&quot;&gt;Fix Redis HLL weekly keys&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50415&quot;&gt;Geo: Fix LFS for location-aware Git URL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;50490&quot;&gt;Fix error for projects without security setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4854&quot;&gt;Ensure patroni and consul remain up during upgrade migrations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;For multi-node deployments, this version &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.7 released with merge request reviewers and automatic rollback upon failure</title>
<release>13.7</release>
<link href='https://about.gitlab.com/releases/2020/12/22/gitlab-13-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/12/22/gitlab-13-7-released/</id>
<published>2020-12-22T00:00:00+00:00</published>
<updated>2020-12-22T00:00:00+00:00</updated>
<author>
<name>Michael Karampalas</name>
</author>
<content type='html'>&lt;p&gt;What a year 2020 has been! We&#x27;re excited to share what&#x27;s new in 13.7 with over &lt;strong&gt;45&lt;&#x2F;strong&gt; features and improvements shipping just in time for the holidays!&lt;&#x2F;p&gt;

&lt;p&gt;On behalf of everyone at GitLab, I want to take a second to thank everyone in our community for your contributions and the positive impact you&#x27;ve made. Without you, GitLab would not be what it is today.&lt;&#x2F;p&gt;

&lt;p&gt;Here&#x27;s to you and all of our team members that helped make 2020 an incredible year despite the adversity and unprecedented times. Please continue staying safe, happy, and healthy this holiday season.&lt;&#x2F;p&gt;

&lt;p&gt;Here&#x27;s what you can look forward to in 13.7:&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enhanced-project-management-for-cross-collaboration&quot;&gt;Enhanced project management for cross-collaboration&lt;&#x2F;h2&gt;

&lt;p&gt;Merge Requests (MRs) are crucial to foster cross-collaboration and can be directly linked to relevant issues, providing a central location to communicate via comments, suggest code changes, perform code reviews, and much more. In this release, we&#x27;ve added &lt;a href=&quot;#reviewers-for-merge-requests&quot;&gt;merge request reviewers&lt;&#x2F;a&gt;, a capability to improve the code review process by making reviews easier and more organized. Now you&#x27;ll be able to quickly find out who&#x27;s involved in the merge request or request a formal review that will send them a notification.&lt;&#x2F;p&gt;

&lt;p&gt;Context switching and manual tasks in your workflow hinder your ability to efficiently collaborate across groups and projects. It means you spend less time developing valuable features and more time managing your projects, which is why the ability to &lt;a href=&quot;#clone-an-issue-with-a-quick-action&quot;&gt;clone issues with quick actions&lt;&#x2F;a&gt; is so valuable for you to streamline agile planning and project management.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;values&#x2F;#collaboration&quot;&gt;Collaborating&lt;&#x2F;a&gt; on projects and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;values&#x2F;#iteration&quot;&gt;iterating&lt;&#x2F;a&gt; rapidly to develop your applications means you need to be able to quickly determine the order of importance of your issues, identify any blockers, and use that information to prioritize what you&#x27;ll work on next. Now, you can &lt;a href=&quot;#sort-issues-by-the-number-of-issues-they-are-blocking&quot;&gt;sort issues by blockers&lt;&#x2F;a&gt; to quickly find out which of your issues are blocking progress for other issues, as well as easily sort by the number of blockers in your issue list.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-release-automation-and-deployment-flexibility&quot;&gt;Improved release automation and deployment flexibility&lt;&#x2F;h2&gt;

&lt;p&gt;You need flexibility to control how you orchestrate, automate, and deploy your applications on a regular basis. Deploying your applications reliably and frequently gets value into the hands of your customers sooner.&lt;&#x2F;p&gt;

&lt;p&gt;To improve how GitLab automates releases, we&#x27;ve added &lt;a href=&quot;#auto-rollback-in-case-of-failure&quot;&gt;automatic rollback in case of failure&lt;&#x2F;a&gt;. This feature automatically reverts an unsuccessful deployment back to the last successful deployment and sends an automatic notification to alert you of the status. You won&#x27;t have to manually make any changes and can be confident that potential problems won&#x27;t cause downtime or intensify while you work towards a fix.&lt;&#x2F;p&gt;

&lt;p&gt;An improvement that goes well with automatic rollback in the event of a failure is the ability to &lt;a href=&quot;#show-deployment-status-on-the-environments-page&quot;&gt;see the deployment status in the Environment page&lt;&#x2F;a&gt;. Now you can easily find deployment statuses and identify what actions you need to take, such as stopping or rolling back a deployment.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve also shipped the first officially supported beta of &lt;a href=&quot;#gitlab-runner-for-red-hat-openshift&quot;&gt;GitLab Runner container on Red Hat OpenShift and our Certified Runner Operator&lt;&#x2F;a&gt; to give you more flexibility over how you release with GitLab. We&#x27;re working to make this generally available soon, so stay tuned for more information in future releases.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;more-reliable-and-efficient-package-and-dependency-management&quot;&gt;More reliable and efficient package and dependency management&lt;&#x2F;h2&gt;

&lt;p&gt;Your workflow depends on a wide variety of programming languages, binaries, integrations, and artifacts that are all important inputs or outputs as a result of your development process. The more efficiently you can manage your packages and dependencies, the less development time goes to waste, and with efficiency in mind, we&#x27;ve added the option to &lt;a href=&quot;#quickly-find-and-view-generic-packages&quot;&gt;quickly find and view generic packages&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve also made improvements to GitLab&#x27;s Dependency Proxy, which, by the way, was made &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;10&#x2F;30&#x2F;minor-breaking-change-dependency-proxy&#x2F;&quot;&gt;available in Core&lt;&#x2F;a&gt; in GitLab 13.6.&lt;&#x2F;p&gt;

&lt;p&gt;You can now &lt;a href=&quot;#avoid-docker-rate-limits-and-speed-up-your-pipelines&quot;&gt;avoid Docker rate-limits and speed up your pipelines with the Dependency Proxy&lt;&#x2F;a&gt; to assure confidence in reliability and improve efficiency when caching your container images hosted on DockerHub.&lt;&#x2F;p&gt;

&lt;p&gt;Another improvement that many of you in the community were anticipating, the &lt;a href=&quot;#use-the-dependency-proxy-with-private-projects&quot;&gt;Dependency Proxy now works with private projects&lt;&#x2F;a&gt; and addresses the limitations that prevented those of you with private projects from taking advantage of this feature.&lt;&#x2F;p&gt;

&lt;p&gt;Last but not least, you&#x27;ll be able to &lt;a href=&quot;#use-pre-defined-variables-with-the-dependency-proxy&quot;&gt;use pre-defined variables with the Dependency Proxy&lt;&#x2F;a&gt; instead of relying on your own defined variables or hard-coding values in your &lt;code&gt;gitlab.ci-yml&lt;&#x2F;code&gt; file. This provides a more scalable and efficient way to get started proxying and caching images.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-more&quot;&gt;And more&lt;&#x2F;h2&gt;

&lt;p&gt;Check out a few other awesome features shipping in 13.7 below:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#import-requirements-from-external-tools&quot;&gt;Import requirements from a CSV file&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#saml-user-provisioning-for-gitlabcom&quot;&gt;SAML user provisioning&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#set-deployment-traffic-weight-via-the-ui&quot;&gt;Set deployment traffic weight via UI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#api-support-for-deployment-frequency&quot;&gt;API support for Deployment Frequency&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;These are just a few highlights out of many new features and performance improvements. If you&#x27;d like to preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;kickoff&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page as well as our &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;bWKdW-s9o9E&quot;&gt;13.8 release kick off video&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_7&#x2F;13_7-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.6.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/12/10/gitlab-13-6-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/12/10/gitlab-13-6-3-released/</id>
<published>2020-12-10T00:00:00+00:00</published>
<updated>2020-12-10T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.6.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;11&#x2F;22&#x2F;gitlab-13-6-released&#x2F;&quot;&gt;this month&#x27;s 13.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48571&quot;&gt;Fix error 500s creating projects concurrently&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48661&quot;&gt;Fix container_registry url for relative urls&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48937&quot;&gt;Resolve Members page 500 error after Invitation sent via API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;49044&quot;&gt;Resolve &quot;&quot;400 Bad Request&quot; during authentication due to password format (length or special chars)&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;49251&quot;&gt;Fix pages object storage bucket&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;49258&quot;&gt;Fix MR rendering issue when user is tool admin&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4778&quot;&gt;Fix Unicorn custom socket not being used by Workhorse&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4825&quot;&gt;Fix image used for SLES 12.5 tag builds&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.6.2, 13.5.5, and 13.4.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/12/07/security-release-gitlab-13-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/12/07/security-release-gitlab-13-6-2-released/</id>
<published>2020-12-07T00:00:00+00:00</published>
<updated>2020-12-07T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.6.2, 13.5.5, and 13.4.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-zoom-meeting-url&quot;&gt;XSS in Zoom Meeting URL&lt;&#x2F;h2&gt;

&lt;p&gt;A XSS vulnerability exists in Gitlab CE&#x2F;EE starting with 12.4 that allows an attacker to perform cross-site scripting to other users via importing a malicious project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:R&#x2F;S:C&#x2F;C:L&#x2F;I:L&#x2F;A:L&lt;&#x2F;code&gt;, 5.5). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26407&quot;&gt;CVE-2020-26407&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;limited-information-disclosure-in-private-profile&quot;&gt;Limited Information Disclosure in Private Profile&lt;&#x2F;h2&gt;

&lt;p&gt;A limited information disclosure vulnerability exists in Gitlab CE&#x2F;EE  starting with 12.2 that allows an attacker to view limited information in user&#x27;s private profile. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26408&quot;&gt;CVE-2020-26408&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;maruthi12&quot;&gt;@maruthi12&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-email-exposed-via-graphql-endpoint&quot;&gt;User email exposed via GraphQL endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL starting in GitLab 13.4 results in user email being unexpectedly visible. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22413&quot;&gt;CVE-2021-22413&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-and-project-membership-potentially-exposed-via-graphql&quot;&gt;Group and project membership potentially exposed via GraphQL&lt;&#x2F;h2&gt;

&lt;p&gt;Information disclosure via GraphQL in GitLab CE&#x2F;EE 13.1 and later exposes private group and project membership. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:N&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.3). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22417&quot;&gt;CVE-2021-22417&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;search-terms-logged-in-search-parameter-in-rails-logs&quot;&gt;Search terms logged in &lt;code&gt;search&lt;&#x2F;code&gt; parameter in rails logs&lt;&#x2F;h2&gt;

&lt;p&gt;Information disclosure in Advanced Search component of GitLab EE starting in 8.4 results in exposure of search terms via Rails logs. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:L&#x2F;AC:H&#x2F;PR:H&#x2F;UI:R&#x2F;S:C&#x2F;C:H&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 5.0). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22416&quot;&gt;CVE-2021-22416&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;un-authorised-access-to-feature-flag-user-list&quot;&gt;Un-authorised access to feature flag user list&lt;&#x2F;h2&gt;

&lt;p&gt;An issue was discovered in Gitlab CE&#x2F;EE versions starting from 13.1 to 13.5 which allowed an un-authorised user to access the user list corresponding to a feature flag in a project. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13357&quot;&gt;CVE-2020-13357&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;a-specific-query-on-the-explore-page-causes-statement-timeouts&quot;&gt;A specific query on the explore page causes statement timeouts&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in all versions of GitLab. Using a specific query name for a project search can cause statement timeouts that can lead to a potential DOS if abused. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26411&quot;&gt;CVE-2020-26411&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exposure-of-starred-projects-on-private-user-profiles&quot;&gt;Exposure of starred projects on private user profiles&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab affecting all versions starting from 12.2 before 13.6.2, all versions starting from 12.2 before 13.5.5, all versions starting from 12.2 before 13.4.7. Information about the starred projects for private user profiles was exposed via the GraphQL API starting in 13.4 and via the REST API starting in 12.2. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 4.3). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22415&quot;&gt;CVE-2021-22415&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;uncontrolled-resource-consumption-in-any-markdown-field-using-mermaid&quot;&gt;Uncontrolled Resource Consumption in any Markdown field using Mermaid&lt;&#x2F;h2&gt;

&lt;p&gt;A DOS vulnerability exists in Gitlab CE&#x2F;EE starting with 10.3 that allows an attacker to trigger uncontrolled resource by bypassing input validation in markdown fields. This is a medium severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:L&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:N&#x2F;I:N&#x2F;A:L&lt;&#x2F;code&gt;, 4.3). It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26409&quot;&gt;CVE-2020-26409&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;misha98857&quot;&gt;misha98857&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;former-group-members-able-to-view-updates-to-confidential-epics&quot;&gt;Former group members able to view updates to confidential epics&lt;&#x2F;h2&gt;

&lt;p&gt;Removed group members were able to use the To-Do functionality to retrieve updated information on confidential epics starting in GitLab EE 13.2. This is a low severity issue (&lt;code&gt;CVSS:3.1&#x2F;AV:N&#x2F;AC:H&#x2F;PR:L&#x2F;UI:N&#x2F;S:U&#x2F;C:L&#x2F;I:N&#x2F;A:N&lt;&#x2F;code&gt;, 3.1). This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2021-22412&quot;&gt;CVE-2021-22412&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-graphicsmagick-dependency&quot;&gt;Update GraphicsMagick dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The GraphicsMagick dependency has been upgraded to 1.3.35 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-gnupg-dependency&quot;&gt;Update GnuPG dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The GnuPG dependency has been upgraded to 2.2.23 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 13.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-libxml-dependency&quot;&gt;Update libxml dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The libxml dependency has been upgraded to 2.9.10 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.6.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/11/23/gitlab-13-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/11/23/gitlab-13-6-1-released/</id>
<published>2020-11-23T00:00:00+00:00</published>
<updated>2020-11-23T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.6.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;11&#x2F;22&#x2F;gitlab-13-6-released&#x2F;&quot;&gt;this month&#x27;s 13.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;47480&quot;&gt;Add documentation for SSE image upload config&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;47992&quot;&gt;Fixes this bug on the group cluster page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48013&quot;&gt;Fix &lt;code&gt;project&lt;&#x2F;code&gt; attribute of &lt;code&gt;StoreScanService&lt;&#x2F;code&gt; class&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48026&quot;&gt;Fixes issue with broken runner installation instructions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48032&quot;&gt;Fix project transfer corrupting shared runners state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48065&quot;&gt;Fix gap on project select dropdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48217&quot;&gt;Resolve &quot;Mentioning users is now very slow&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48247&quot;&gt;Enable alert management for configured http integrations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48252&quot;&gt;Update docs to remove an issue board list and filter issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48257&quot;&gt;Does not track package events on a read-only instance&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48295&quot;&gt;Fix link to correct epic&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;48183&quot;&gt;Re-name Instance Statistics as Usage Trends&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;47735&quot;&gt;Fix tags pages erroring for projects with private pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.6 released with Auto Deploy to EC2 and Usage Trends Dashboard </title>
<release>13.6</release>
<link href='https://about.gitlab.com/releases/2020/11/22/gitlab-13-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/11/22/gitlab-13-6-released/</id>
<published>2020-11-22T00:00:00+00:00</published>
<updated>2020-11-22T00:00:00+00:00</updated>
<author>
<name>James Heimbuck</name>
</author>
<content type='html'>&lt;p&gt;At GitLab, we are focused on improving developer productivity and satisfaction. And GitLab 13.6 has all the right ingredients to help you achieve all that and more! We hope that you find these top features, and the &lt;strong&gt;60+ new features and improvements&lt;&#x2F;strong&gt; packed in this release, useful.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-ease-of-use-and-automation-for-efficiency&quot;&gt;Improved ease of use and automation for efficiency&lt;&#x2F;h2&gt;

&lt;p&gt;To make it easy for you to get started with GitLab CI&#x2F;CD with Amazon Web Services (AWS), Auto DevOps has now been extended to support AWS, so you can now &lt;a href=&quot;#auto-deploy-to-ec2&quot;&gt;Auto-Deploy to Amazon EC2&lt;&#x2F;a&gt; using Auto DevOps without using Kubernetes (as previously required by Auto DevOps).&lt;&#x2F;p&gt;

&lt;p&gt;Docker Hub has enforced rate limits on &lt;code&gt;docker pull&lt;&#x2F;code&gt; requests. We have &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;10&#x2F;30&#x2F;mitigating-the-impact-of-docker-hub-pull-requests-limits&#x2F;&quot;&gt;mitigated the impact&lt;&#x2F;a&gt; for our SaaS and self-managed users and have shared ways to &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;11&#x2F;18&#x2F;docker-hub-rate-limit-monitoring&#x2F;&quot;&gt;monitor the limits with Prometheus&lt;&#x2F;a&gt; in your environments. We want all our users to stay safe with their CI&#x2F;CD pipelines and Kubernetes clusters. We are moving the &lt;a href=&quot;#the-dependency-proxy-is-now-open-source&quot;&gt;Dependency Proxy&lt;&#x2F;a&gt; to Core available for everyone.&lt;&#x2F;p&gt;

&lt;p&gt;Listening to the community’s feedback to have a more descriptive default branch, Group owners now have more flexibility in configuring a custom &lt;a href=&quot;#customize-the-initial-branch-name-for-new-projects-within-a-group&quot;&gt;default initial branch name for new repositories&lt;&#x2F;a&gt; as opposed to the &lt;code&gt;master&lt;&#x2F;code&gt; branch. Speaking of defaults, the Static Site Editor can use a &lt;a href=&quot;#merge-request-templates-for-static-site-editor-changes&quot;&gt;default merge request template&lt;&#x2F;a&gt; across a project, reducing the need to navigate to the merge request after submission to update the description.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-visibility-for-faster-decision-making&quot;&gt;Improved visibility for faster decision making&lt;&#x2F;h2&gt;

&lt;p&gt;You cannot fix what you cannot find. With 13.6, we’ve made improvements to several dashboards and reports to aid you with faster decision making.&lt;&#x2F;p&gt;

&lt;p&gt;With the &lt;a href=&quot;#display-code-quality-severity-ratings&quot;&gt;code quality severity&lt;&#x2F;a&gt; included within the merge request and the &lt;a href=&quot;#generate-html-reports-for-code-quality&quot;&gt;Full Code Quality Report&lt;&#x2F;a&gt;, you can now quickly determine which code quality violations are critical to resolve before merging. Thanks for the community contribution with Code Quality Report, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;vicken.papaya&quot;&gt;Vicken Simonian&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;We’ve made updates to the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;security_dashboard&#x2F;#project-security-dashboard&quot;&gt;Project Security Dashboard&lt;&#x2F;a&gt; to include the &lt;a href=&quot;#pipeline-status-in-project-security-dashboard&quot;&gt;results of the latest run pipeline security scan&lt;&#x2F;a&gt; and also a &lt;a href=&quot;#new-vulnerability-trends-chart&quot;&gt;dynamic vulnerability trend chart&lt;&#x2F;a&gt; to help you stay on top of the real time and historical vulnerability trends. We&#x27;ve also added the &lt;a href=&quot;#coverage-guided-fuzz-testing-artifacts-available-in-merge-request-widget&quot;&gt;fuzz testing results in the merge request&lt;&#x2F;a&gt; along with the other security results and improved the readability of this report by adding the source file name and line number to help you quickly find the exact crash location and fix it.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Self Managed Administrators can &lt;a href=&quot;#visualize-users-projects-groups-issues-mrs-and-pipeline-activity&quot;&gt;now see their organization&#x27;s usage trends&lt;&#x2F;a&gt; for popular features such as users, projects, groups, issues, and pipelines over the last 12 months.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-extensibility-for-a-seamless-workflow&quot;&gt;Improved extensibility for a seamless workflow&lt;&#x2F;h2&gt;

&lt;p&gt;We aim to &lt;a href=&quot;&#x2F;handbook&#x2F;product&#x2F;gitlab-the-product&#x2F;#plays-well-with-others&quot;&gt;play well with other popular tools&lt;&#x2F;a&gt; you may be using in your environment so that you have a seamless experience, even when you use only a few parts of GitLab. With 13.6, to enable easy access and collaboration from within VS Code, we’ve improved our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;#gitlab-workflow---vs-code-extension&quot;&gt;extension with VS Code&lt;&#x2F;a&gt; to &lt;a href=&quot;#insert-gitlab-snippets-directly-in-vs-code&quot;&gt;insert Snippets&lt;&#x2F;a&gt;, view and comment on merge requests and issues directly from VS Code rather than switching to the GitLab interface.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab &lt;a href=&quot;#group-level-management-of-project-integrations&quot;&gt;integrations&lt;&#x2F;a&gt; can now be configured at a group level in addition to instance and project level - helping group owners manage integrations with ease.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-more&quot;&gt;And more&lt;&#x2F;h2&gt;

&lt;p&gt;To enable you to grow beyond the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;10GB per project storage limit&lt;&#x2F;a&gt;, we recently introduced an add-on to &lt;a href=&quot;https:&#x2F;&#x2F;customers.gitlab.com&#x2F;&quot;&gt;purchase additional storage&lt;&#x2F;a&gt; for your group or personal name space. In addition to &lt;a href=&quot;#the-dependency-proxy-is-now-open-source&quot;&gt;Dependency Proxy&lt;&#x2F;a&gt;, we&#x27;ve also moved &lt;a href=&quot;#tracing-has-been-moved-to-core&quot;&gt;Tracing&lt;&#x2F;a&gt; to Core as part of this release.&lt;&#x2F;p&gt;

&lt;p&gt;These are just a few highlights from the many new features and performance improvements described below. If you&#x27;d like to preview what&#x27;s coming in next month’s release, check out our &lt;a href=&quot;&#x2F;upcoming-releases&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page as well as our &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;playlist?list=PL05JrBw4t0KoDQr8x2MaumyU7d8_6icNH&quot;&gt;13.7 release kick off&lt;&#x2F;a&gt; video series where the Product Managers highlight key features coming in the next release.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_6&#x2F;13_6-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.5.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/11/13/gitlab-13-5-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/11/13/gitlab-13-5-4-released/</id>
<published>2020-11-13T00:00:00+00:00</published>
<updated>2020-11-13T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.5.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;10&#x2F;22&#x2F;gitlab-13-5-released&#x2F;&quot;&gt;this month&#x27;s 13.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43874&quot;&gt;Fixes keyboard navigation of labels list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46178&quot;&gt;Hashed Storage: make migration and rollback resilient to exceptions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46761&quot;&gt;Fix compliance framework migration on CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46875&quot;&gt;Resolve &quot;undefined method error after upgrading to 13.5.1&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46637&quot;&gt;Enforce instance-level MR approval settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version upgrade does not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.5.3 and 13.4.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/11/03/gitlab-13-5-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/11/03/gitlab-13-5-3-released/</id>
<published>2020-11-03T00:00:00+00:00</published>
<updated>2020-11-03T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.5.3 and 13.4.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;10&#x2F;22&#x2F;gitlab-13-5-released&#x2F;&quot;&gt;last month&#x27;s 13.5 release&lt;&#x2F;a&gt; and
the &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;09&#x2F;22&#x2F;gitlab-13-4-released&#x2F;&quot;&gt;previous month&#x27;s 13.4 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1346&quot;&gt;13.4.6&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44875&quot;&gt;Use our mirror of Helm stable repo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4636&quot;&gt;Implementation of PITR recovery before promotion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;charts&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;1593&quot;&gt;Fix PG password error when enabling extensions during DB init&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1353&quot;&gt;13.5.3&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;45855&quot;&gt;Add environment variables to override backup&#x2F;restore DB settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46107&quot;&gt;Fix incorrect S3 KMS key id ARN in object storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46209&quot;&gt;Fix cloud native job logs not finalizing with Azure&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46398&quot;&gt;Downgrade vue-router to fix IDE issue with special characters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46466&quot;&gt;Ensure that copy to clipboard button is visible&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46552&quot;&gt;Add ci_new_artifact_file_reader FF again&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;46577&quot;&gt;Enable ci_trace_new_fog_store feature flag by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4636&quot;&gt;Implementation of PITR recovery before promotion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4688&quot;&gt;Set net.core.somaxconn kernel parameter for Puma&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.5.2, 13.4.5, and 13.3.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/11/02/security-release-gitlab-13-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/11/02/security-release-gitlab-13-5-2-released/</id>
<published>2020-11-02T00:00:00+00:00</published>
<updated>2020-11-02T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.5.2, 13.4.5, and 13.3.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-in-lfs-upload&quot;&gt;Path Traversal in LFS Upload&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.14. A path traversal is found in LFS Upload that allows attacker to overwrite certain specific paths on the server. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13355&quot;&gt;CVE-2020-13355&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;saltyyolk&quot;&gt;saltyyolk&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-allows-saving-packages-in-arbitrary-location&quot;&gt;Path traversal allows saving packages in arbitrary location&lt;&#x2F;h2&gt;

&lt;p&gt;Path traversal vulnerability in package upload functionality in GitLab CE&#x2F;EE starting from 12.8 allows an attacker to save packages in arbitrary locations. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26405&quot;&gt;CVE-2020-26405&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;kubernetes-agent-api-leaks-private-repos&quot;&gt;Kubernetes agent API leaks private repos&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability in the internal Kubernetes agent api in GitLab CE&#x2F;EE version 13.3 and above allows unauthorised access to private projects. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13358&quot;&gt;CVE-2020-13358&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;terraform-state-deletion-api-exposes-object-storage-url&quot;&gt;Terraform state deletion API exposes object storage URL&lt;&#x2F;h2&gt;

&lt;p&gt;The Terraform API in GitLab CE&#x2F;EE 12.10 and above exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13359&quot;&gt;CVE-2020-13359&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-error-message-of-build-dependencies&quot;&gt;Stored-XSS in error message of build-dependencies&lt;&#x2F;h2&gt;

&lt;p&gt;A stored XSS in CI Job Log has been discovered in GitLab CE&#x2F;EE 12.4 and above. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13340&quot;&gt;CVE-2020-13340&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;yvvdwf&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-credentials-persisted-on-disk&quot;&gt;Git credentials persisted on disk&lt;&#x2F;h2&gt;

&lt;p&gt;When importing repos via URL, one time use git credentials were persisted beyond the expected time windows in Gitaly 1.79.0 or above. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13353&quot;&gt;CVE-2020-13353&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-denial-of-service-via-container-registry&quot;&gt;Potential Denial of service via container registry&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DOS vulnerability was discovered in GitLab CE&#x2F;EE starting with version 12.6 and above. The container registry name check could cause exponential number of backtracks for certain user supplied values resulting in high CPU usage. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13354&quot;&gt;CVE-2020-13354&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;anyday&quot;&gt;@anyday&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;info-leak-when-group-is-transferred-from-private-to-public-group&quot;&gt;Info leak when group is transferred from private to public group.&lt;&#x2F;h2&gt;

&lt;p&gt;Private group info is leaked leaked in GitLab CE&#x2F;EE version 10.2 and above, when the project is moved from private to public group. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13352&quot;&gt;CVE-2020-13352&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;limited-file-disclosure-via-multipart-bypass&quot;&gt;Limited File Disclosure Via Multipart Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab CE&#x2F;EE affecting all versions starting from 8.8.9. A specially crafted request could bypass Multipart protection and read files in certain specific paths on the server. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13356&quot;&gt;CVE-2020-13356&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;ledz1996&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-user-is-able-to-access-scheduled-pipeline-variables-and-values&quot;&gt;Unauthorized user is able to access scheduled pipeline variables and values&lt;&#x2F;h2&gt;

&lt;p&gt;Insufficient permission checks in scheduled pipeline API in GitLab CE&#x2F;EE 13.0+ allows an attacker to read variable names and values for scheduled pipelines on projects visible to the attacker. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13351&quot;&gt;CVE-2020-13351&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;@vaib25vicky&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;csrf-in-runner-administration-page-allows-an-attacker-to-pauseresume-runners&quot;&gt;CSRF in runner administration page allows an attacker to pause&#x2F;resume runners&lt;&#x2F;h2&gt;

&lt;p&gt;CSRF in runner administration page in all versions of GitLab CE&#x2F;EE allows an attacker who&#x27;s able to target GitLab instance administrators to pause&#x2F;resume runners. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13350&quot;&gt;CVE-2020-13350&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regex-backtracking-attack-in-path-parsing-of-advanced-search-result&quot;&gt;Regex backtracking attack in path parsing of Advanced Search result&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 9.2. A regular expression related to a file path resulted in the Advanced Search feature susceptible to catastrophic backtracking. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13349&quot;&gt;CVE-2020-13349&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-of-required-codeowners-approval&quot;&gt;Bypass of required CODEOWNERS approval&lt;&#x2F;h2&gt;

&lt;p&gt;An issue has been discovered in GitLab EE affecting all versions starting from 11.9. Required CODEOWNERS approval could be bypassed by targeting a branch without the CODEOWNERS file. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13348&quot;&gt;CVE-2020-13348&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sast-ciconfiguration-information-visible-without-permissions&quot;&gt;SAST CiConfiguration information visible without permissions&lt;&#x2F;h2&gt;

&lt;p&gt;Certain SAST CiConfiguration information could be viewed by unauthorized users in GitLab EE starting with 13.3. This information was exposed through GraphQL to non-members of public projects with repository visibility restricted as well as guest members on private projects. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-26406&quot;&gt;CVE-2020-26406&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for reporting this vulnerability through our HackerOne bug bounty program.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.3.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/10/23/gitlab-13-3-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/10/23/gitlab-13-3-8-released/</id>
<published>2020-10-23T00:00:00+00:00</published>
<updated>2020-10-23T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.3.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;08&#x2F;22&#x2F;gitlab-13-3-released&#x2F;&quot;&gt;August&#x27;s 13.3 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42165&quot;&gt;Update object_storage.md to fix the object store connection using iam&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42288&quot;&gt;Make SSH keys publicly accessible&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43091&quot;&gt;Add missing fa- icons for file_type_icon_class&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43936&quot;&gt;Handle 500 error for GraphQL &quot;configureSast&quot; mutation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44875&quot;&gt;Use our mirror of Helm stable repo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41365&quot;&gt;Geo: Fix documentation typo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44172&quot;&gt;Geo: Fix &quot;Project&#x2F;wiki&#x2F;design repo not able to resync after storage move&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.5.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/10/22/gitlab-13-5-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/10/22/gitlab-13-5-1-released/</id>
<published>2020-10-22T00:00:00+00:00</published>
<updated>2020-10-22T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.5.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;10&#x2F;22&#x2F;gitlab-13-5-released&#x2F;&quot;&gt;this month&#x27;s 13.5 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;45448&quot;&gt;Add docs on the inclusion of LFS files in archives&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;45660&quot;&gt;Update GitLab Shell to v13.11.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;45690&quot;&gt;Revert clickable links on logs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4661&quot;&gt;Resolve &quot;QA tests failing after group was explicitly set for repositories_storages&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.5 released with Mobile App Sec, Group Wikis, and more!</title>
<release>13.5</release>
<link href='https://about.gitlab.com/releases/2020/10/22/gitlab-13-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/10/22/gitlab-13-5-released/</id>
<published>2020-10-22T00:00:00+00:00</published>
<updated>2020-10-22T00:00:00+00:00</updated>
<author>
<name>Thao Yeager</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;One of GitLab’s core values is &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;values&#x2F;#collaboration&quot;&gt;collaboration&lt;&#x2F;a&gt; and it&#x27;s a key part of DevOps. This month we have several features aimed at collaboration among your team, across your tools, and with your peers as part of the &lt;strong&gt;60 improvements&lt;&#x2F;strong&gt; packed into this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mobile-application-security-scanning&quot;&gt;Mobile application security scanning&lt;&#x2F;h2&gt;

&lt;p&gt;Community contributions are one of the best kinds of collaboration! One of our customers embraced our security scanning capabilities to &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;solutions&#x2F;dev-sec-ops&#x2F;&quot;&gt;shift left&lt;&#x2F;a&gt; and empower developers to find and fix security flaws, yet they also wanted the same abilities for iOS and Android mobile applications. Using our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;development&#x2F;integrations&#x2F;secure.html&quot;&gt;integration guidance&lt;&#x2F;a&gt;, they brought MobSF into the merge request pipeline and the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;security_dashboard&#x2F;&quot;&gt;security dashboards&lt;&#x2F;a&gt; alongside SAST and all the other &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;&quot;&gt;GitLab security scan&lt;&#x2F;a&gt; results.&lt;&#x2F;p&gt;

&lt;p&gt;For their contribution, Brian Williams and the H-E-B Digital team are this month’s &lt;a href=&quot;#mvp&quot;&gt;MVP&lt;&#x2F;a&gt;. This new Mobile SAST language coverage, combined with our existing &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;coverage_fuzzing&#x2F;&quot;&gt;fuzz testing&lt;&#x2F;a&gt; for Swift and Java projects, now offers a valuable security testing solution for mobile apps.&lt;&#x2F;p&gt;

&lt;p&gt;Giving works both ways. Therefore, we have officially finished &lt;a href=&quot;#feature-flags-made-available-in-all-tiers&quot;&gt;moving Feature flags to core&lt;&#x2F;a&gt;, open-sourcing it for greater community engagement. This completes one more step of our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;03&#x2F;30&#x2F;new-features-to-core&#x2F;&quot;&gt;plan to move 18 features to Core&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-wikis-and-more&quot;&gt;Group wikis and more!&lt;&#x2F;h2&gt;

&lt;p&gt;Groups collaborate in many ways and we now offer a few more ways to do so. A feature long sought after is &lt;a href=&quot;#group-wikis&quot;&gt;Group Wikis&lt;&#x2F;a&gt;, with the most upvotes ever! Now you can have a central point of collaboration for your team at the group level. Accompanying this, you’ll find &lt;a href=&quot;#deep-level-wiki-navigation&quot;&gt;deep-level wiki navigation&lt;&#x2F;a&gt; in the side bar for easier navigation.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to another community contribution, you can now easily launch your &lt;a href=&quot;#launch-gitpod-workspaces-directly-from-gitlab&quot;&gt;Gitpod Workspace&lt;&#x2F;a&gt; directly from the GitLab interface.&lt;&#x2F;p&gt;

&lt;p&gt;A picture is worth a thousand words! During an incident, it can be hard to understand the sequence of events from threaded discussions. With the new &lt;a href=&quot;#timeline-view-for-discussions-on-incidents&quot;&gt;Timeline view for discussions in incidents&lt;&#x2F;a&gt;, you can toggle a timeline view of the discussion.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;snippets-and-templates-aid-sharing&quot;&gt;Snippets and templates aid sharing&lt;&#x2F;h2&gt;

&lt;p&gt;Snippets facilitate code sharing among group members. &lt;a href=&quot;#snippets-with-multiple-files&quot;&gt;Snippets with multiple files&lt;&#x2F;a&gt; is now supported inside a single Snippet, so you can create and share complex Snippets composed of multiple parts. The sky’s the limit!&lt;&#x2F;p&gt;

&lt;p&gt;Templates promote best practices and consistency across teams. This month you&#x27;ll find more templates such as a &lt;a href=&quot;#template-for-deploying-to-aws-ec2&quot;&gt;template for deploying to AWS EC2&lt;&#x2F;a&gt;, a new GitLab CI&#x2F;CD &lt;a href=&quot;#get-started-quickly-with-gitlab-and-terraform&quot;&gt;template for Terraform&lt;&#x2F;a&gt;, and the new &lt;a href=&quot;#sast-configuration-ui-improvements&quot;&gt;SAST configuration UI&lt;&#x2F;a&gt; that enables the GitLab CI&#x2F;CD SAST template for users without CI&#x2F;CD experience.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;collaborating-across-tools&quot;&gt;Collaborating across tools&lt;&#x2F;h2&gt;

&lt;p&gt;At GitLab, we want to &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;product&#x2F;gitlab-the-product&#x2F;#plays-well-with-others&quot;&gt;play well with others&lt;&#x2F;a&gt;. Whether it’s pulling in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;development&#x2F;integrations&#x2F;secure.html&quot;&gt;third-party security scanner results&lt;&#x2F;a&gt;, or integrating with other DevOps tools, we want to meet you where you need us. Now with &lt;a href=&quot;#generic-package-registry&quot;&gt;Generic Package Registry&lt;&#x2F;a&gt;, you can store other binary types in GitLab that are not yet supported via raw package feeds and &lt;a href=&quot;#attach-binary-assets-to-releases&quot;&gt;attach binary assets to releases&lt;&#x2F;a&gt;, enabling release and build teams to effectively work in GitLab no matter what type of binary they are building in CI&#x2F;CD.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;of-course-theres-more&quot;&gt;Of course there&#x27;s more!&lt;&#x2F;h3&gt;

&lt;p&gt;These are just a few highlights from the many new features and performance improvements described below.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;d like to preview what&#x27;s coming in next month’s release, be sure to check out the &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;results?search_query=13.6+release+kick+off&quot;&gt;13.6 release kick off video series&lt;&#x2F;a&gt; where the Product Managers highlight key features coming soon. Our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;upcoming-releases&#x2F;&quot;&gt;Upcoming Releases&lt;&#x2F;a&gt; page is where you can find all of the juicy details of our roadmap. Here, you can comment and upvote existing issues and contribute new ideas!&lt;&#x2F;p&gt;

&lt;!--
Reminder: the final paragraph should include the total number of new features
being released, including bugs, performance improvements, and contributions from
non-DevOps stages like Enablement. All of these should be listed in the release
post, either as headers or bullet points.
--&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_5&#x2F;13_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.4.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/10/15/gitlab-13-4-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/10/15/gitlab-13-4-4-released/</id>
<published>2020-10-15T00:00:00+00:00</published>
<updated>2020-10-15T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.4.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;09&#x2F;22&#x2F;gitlab-13-4-released&#x2F;&quot;&gt;this month&#x27;s 13.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44172&quot;&gt;Geo: Fix &quot;Project&#x2F;wiki&#x2F;design repo not able to resync after storage move&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44593&quot;&gt;Fix rollback of migration that adds temporary index for container scanning findings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44843&quot;&gt;Improve merge error when pre-receive hooks fail in fast-forward merge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4628&quot;&gt;Resolve &quot;gitlab-ctl patroni members results in error with prettytable&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44822&quot;&gt;Fix resolution of Gitlab::AppLogger in EE kerberos_spnego_helper&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.4.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/10/05/gitlab-13-4-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/10/05/gitlab-13-4-3-released/</id>
<published>2020-10-05T00:00:00+00:00</published>
<updated>2020-10-05T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.4.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;09&#x2F;22&#x2F;gitlab-13-4-released&#x2F;&quot;&gt;this month&#x27;s 13.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42784&quot;&gt;Ensure nonexistent routes do not redirect to the 2FA page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42910&quot;&gt;Ensure wikis can be re-enabled after disabling them without an error&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43463&quot;&gt;Limit spam checks to title, description, or confidentiality changes on bot-created issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43487&quot;&gt;Use the correct chart for helm command&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43490&quot;&gt;Docs: Fix example manifest.yaml for Kubernetes Agent&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43532&quot;&gt;Fixes store initialization for Productivity Analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43891&quot;&gt;Do not try to copy weight events when promoting an issue&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;44233&quot;&gt;Fix large backups not working with Azure Blob storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43765&quot;&gt;Geo: Fix scenario where there is a wikis&#x2F;designs with no repository on the primary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43434&quot;&gt;Geo: Permanently enable package_file_registries field&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and for multi-node deployments, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;should not require any downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.4.2, 13.3.7 and 13.2.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/10/01/security-release-13-4-2-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/10/01/security-release-13-4-2-release/</id>
<published>2020-10-01T00:00:00+00:00</published>
<updated>2020-10-01T00:00:00+00:00</updated>
<author>
<name>Ron Chan</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.4.2, 13.3.7 and 13.2.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-denial-of-service-via-update-release-links-api&quot;&gt;Potential Denial Of Service Via Update Release Links API&lt;&#x2F;h2&gt;

&lt;p&gt;A potential DoS vulnerability was discovered in release api, certain user supplied values could rise the CPU usage. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13333&quot;&gt;CVE-2020-13333&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;anyday&quot;&gt;@anyday&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-storage-of-session-key-in-redis&quot;&gt;Insecure Storage of Session Key In Redis&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain condition an unauthorised user could read the Redis keys and use to obtain a valid session. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13344&quot;&gt;CVE-2020-13344&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;rabbitfang&quot;&gt;@rabbitfang&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-expiration-date-validation&quot;&gt;Improper Access Expiration Date Validation&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for users to access projects with an expired access date. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13332&quot;&gt;CVE-2020-13332&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;henonoah&quot;&gt;@henonoah&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.11.0-rc6+ and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-multiple-pages&quot;&gt;Cross-Site Scripting in Multiple Pages&lt;&#x2F;h2&gt;

&lt;p&gt;A reflected cross-site scripting was discovred in different pages. This issue is now mitigated in the latest release and  is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13345&quot;&gt;CVE-2020-13345&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-users-can-view-custom-project-template&quot;&gt;Unauthorized Users Can View Custom Project Template&lt;&#x2F;h2&gt;

&lt;p&gt;An unauthorised user was able to view private custom project template. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13343&quot;&gt;CVE-2020-13343&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-svg-image-preview&quot;&gt;Cross-Site Scripting in SVG Image Preview&lt;&#x2F;h2&gt;

&lt;p&gt;A stored cross-site scripting was found in SVG image preview. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13339&quot;&gt;CVE-2020-13339&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;aryan2808&quot;&gt;@aryan2808&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 12.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incomplete-handling-in-account-deletion&quot;&gt;Incomplete Handling in Account Deletion&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that there was insufficient check before account deletion which allowed an account to be deleted while being the owner of a group. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13335&quot;&gt;CVE-2020-13335&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;brdoors3&quot;&gt;@brdoors3&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 7.12 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insufficient-rate-limiting-at-re-sending-confirmation-email&quot;&gt;Insufficient Rate Limiting at Re-Sending Confirmation Email&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that there was insufficient rate-limiting at re-sending confirmatil email. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13342&quot;&gt;CVE-2020-13341&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;yuanchenlu&quot;&gt;@yuanchenlu&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 10.1.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-type-check-in-graphql&quot;&gt;Improper Type Check in GraphQL&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that due to an improper type check in GraphQL users with developer role were able to perform unauthorised actions. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13341&quot;&gt;CVE-2020-13341&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;ledz1996&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;to-dos-are-not-redacted-when-membership-changes&quot;&gt;To-dos Are Not Redacted When Membership Changes&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that after membership changes were applied, the to-do list was not redacted properly. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13346&quot;&gt;CVE-2020-13346&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;vaib25vicky&quot;&gt;@vaib25vicky&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-users-can-modify-confidentiality-attribute&quot;&gt;Guest users can modify confidentiality attribute&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that improper authorization checks allows a non-member of a project&#x2F;group to change the confidentiality attribute of issue via mutation GraphQL query. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13334&quot;&gt;CVE-2020-13334&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xwintermute&quot;&gt;@0xwintermute&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;command-injection-on-runner-host&quot;&gt;Command injection on runner host&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that improper validation of authorization configuration allowed arbitary command execution on windows runner host. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13347&quot;&gt;CVE-2020-13347&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ajxchapman&quot;&gt;@ajxchapman&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab Runner 12.0.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-runner-configuration-in-kubernetes-environments&quot;&gt;Insecure Runner Configuration in Kubernetes Environments&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed a security issue in GitLab Runner configuration used with Kubernetes environments that could be used to perform a MitM(Man in the Middle) attack. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13327&quot;&gt;CVE-2020-13327&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab Runner 13.2, 13.3, 13.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.4.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/09/24/gitlab-13-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/09/24/gitlab-13-4-1-released/</id>
<published>2020-09-24T00:00:00+00:00</published>
<updated>2020-09-24T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.4.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;09&#x2F;22&#x2F;gitlab-13-4-released&#x2F;&quot;&gt;this month&#x27;s 13.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42623&quot;&gt;Revert required encryption on CI runner tokens&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42655&quot;&gt;Fix missing VSA request parameters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;42848&quot;&gt;Notification icons: Render empty string for &quot;custom&quot; setting&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43091&quot;&gt;Add missing fa- icons for file_type_icon_class&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;43059&quot;&gt;Allow Unleash Clients to Request Feature Flags for Private Repositories&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.4 released with Vault for CI variables and Kubernetes Agent</title>
<release>13.4</release>
<link href='https://about.gitlab.com/releases/2020/09/22/gitlab-13-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/09/22/gitlab-13-4-released/</id>
<published>2020-09-22T00:00:00+00:00</published>
<updated>2020-09-22T00:00:00+00:00</updated>
<author>
<name>Eric Schurter</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;h2 id=&quot;gitlab-134-released-with-vault-for-ci-variables-kubernetes-agent-and-security-center-and-were-bringing-feature-flags-to-starter&quot;&gt;GitLab 13.4 released with Vault for CI variables, Kubernetes Agent, and Security Center… and we’re bringing feature flags to Starter!&lt;&#x2F;h2&gt;

&lt;p&gt;At GitLab, we are always focusing on how to help your team reduce risk, increase their efficiency, and accelerate their delivery speed with a platform you love. This month, we’re bringing all sorts of goodness that expands visibility into security, lowers vulnerabilities, improves efficiency, makes the user experience better, and helps your team deploy even faster. We hope that you find these top features, and the &lt;strong&gt;53 other new features&lt;&#x2F;strong&gt; packed in this release, useful.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;expanded-security-capabilities&quot;&gt;Expanded security capabilities&lt;&#x2F;h2&gt;

&lt;p&gt;True to form, this month’s release adds several capabilities to your GitLab DevSecOps kit. First, &lt;a href=&quot;#use-hashicorp-vault-secrets-in-ci-jobs&quot;&gt;secrets stored in HashiCorp Vault can now be injected into CI&#x2F;CD jobs&lt;&#x2F;a&gt; as part of the build and deploy process. Next, organizations who want to maintain a separation of code deployment duties can &lt;a href=&quot;#grant-users-deployment-permissions-without-code-access&quot;&gt;promote specific users with Reporter access to the role of Deployer&lt;&#x2F;a&gt;. The Deployer role follows the principle of least privilege access, allowing them to approve merge requests and deploy code to protected environments without requiring access to modify the code itself. Another way you can reduce risk is by using the new &lt;a href=&quot;#introducing-the-gitlab-agent-for-kubernetes&quot;&gt;GitLab Agent for Kubernetes&lt;&#x2F;a&gt;. Operators can deploy to their Kubernetes clusters from GitLab without the need to open their cluster to the entire Internet. We are also introducing automatic versioning support for new Terraform state files with &lt;a href=&quot;#gitlab-managed-terraform-state&quot;&gt;GitLab Managed Terraform state&lt;&#x2F;a&gt; to support compliance and debugging needs. Last but not least, the Instance Security Dashboard has evolved into the &lt;a href=&quot;#security-center&quot;&gt;GitLab Security Center&lt;&#x2F;a&gt; featuring Vulnerability Reporting and Settings.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-ux--efficiency&quot;&gt;Better UX &amp;amp; efficiency&lt;&#x2F;h2&gt;

&lt;p&gt;We’ve improved our global search capabilities with &lt;a href=&quot;#quick-navigation-using-the-search-bar&quot;&gt;quick navigation from the search bar&lt;&#x2F;a&gt; to quickly jump to recent issues, groups, projects, settings, and Help topics. We&#x27;re excited about &lt;a href=&quot;#simple-redirect-configuration-file-for-gitlab-pages&quot;&gt;GitLab Pages Redirects&lt;&#x2F;a&gt; for redirecting individual pages and directories within a site, which makes users more efficient at deploying pages sites. And for those who have been wishing for enhanced deployment information, this release enables you to &lt;a href=&quot;#track-environments-at-scale-with-the-environments-dashboard&quot;&gt;manage hundreds of supported project deployments from the Environments dashboard&lt;&#x2F;a&gt;. Tada! 🎉&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-source-contribution-highlights&quot;&gt;Open source contribution highlights&lt;&#x2F;h2&gt;

&lt;p&gt;We’re introducing &lt;a href=&quot;#inline-code-coverage-remarks-inside-mr-diffs&quot;&gt;inline code coverage remarks inside MR diffs&lt;&#x2F;a&gt;, (contributed by &lt;a href=&quot;#mvp&quot;&gt;this month&#x27;s MVP, Fabio Huser&lt;&#x2F;a&gt;!), providing developers a visual representation of code coverage in the Merge Request diff when doing a review. Knowing whether modified code is covered by a unit test helps speed up code reviews and time to merge and deploy a feature. We have &lt;a href=&quot;#feature-flags-made-available-in-gitlab-starter&quot;&gt;moved feature flags to Starter&lt;&#x2F;a&gt; and plan to move &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;212318&quot;&gt;feature flags to Core in 13.5&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;!--
Suggestion: describe each feature briefly in just a few words, using
anchors to link to their headings (use the relative path). The intro is supposed
to be eyes-catching, so &quot;be happy&quot; about it, describe them enthusiastically.
Focus on what are the advantages on having each of them. For some guidance,
look at the intros of past release posts.
--&gt;

&lt;h3 id=&quot;but-wait-wait-theres-more&quot;&gt;But wait, wait… there’s more!&lt;&#x2F;h3&gt;

&lt;p&gt;As usual, we have way too little space, but still lots and lots of new things we packed into 13.4 to tell you about. Here are a few more of them:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#list-and-revoke-personal-access-tokens-via-api&quot;&gt;List and revoke Personal Access Tokens via API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#revoke-pats-for-self-managed-credential-inventory&quot;&gt;Revoke PATs for self-managed credential inventory&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#child-pipelines-can-now-trigger-their-own-child-pipelines&quot;&gt;Child pipelines can now trigger their own child pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#mark-a-to-do-as-done-in-the-design-view&quot;&gt;Mark a to-do as Done in the Design View&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#gitlab-runner-134&quot;&gt;GitLab Runner 13.4 released&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#gitlab-chart-improvements&quot;&gt;GitLab chart improvements&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#smartcard-authentication-support-for-gitlab-helm-chart&quot;&gt;Smartcard authentication support for GitLab Helm chart&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;If you&#x27;d like to preview what&#x27;s coming in next month’s release, be sure to check out our 13.5 &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Zp7_PNRxMxU&quot;&gt;kickoff video&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;!--
Reminder: the final paragraph should include the total number of new features
being released, including bugs, performance improvements, and contributions from
non-DevOps stages like Enablement. All of these should be listed in the release
post, either as headers or bullet points.
--&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_4&#x2F;13-4-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/09/14/gitlab-13-3-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/09/14/gitlab-13-3-6-released/</id>
<published>2020-09-14T00:00:00+00:00</published>
<updated>2020-09-14T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.3.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;08&#x2F;22&#x2F;gitlab-13-3-released&#x2F;&quot;&gt;this month&#x27;s 13.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40956&quot;&gt;More verbose error message when creating extension&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41404&quot;&gt;Fixes Auto DevOps multiple hosts with comma and space split&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41582&quot;&gt;Enable secret detection in MR Widget&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41773&quot;&gt;Atomically create table and its partitions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41801&quot;&gt;Use &#x27;read&#x27; method to get request body in Conan&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.3.5, 13.2.9 and 13.1.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/09/04/gitlab-13-3-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/09/04/gitlab-13-3-5-released/</id>
<published>2020-09-04T00:00:00+00:00</published>
<updated>2020-09-04T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 13.3.5, 13.2.9 and 13.1.11 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These versions are resolving a high severity functionality bug from &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;09&#x2F;02&#x2F;security-release-gitlab-13-3-3-released&#x2F;&quot;&gt;earlier security release&lt;&#x2F;a&gt;, as well as a number of other earlier regressions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;gitlab-1335&quot;&gt;GitLab 13.3.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41327&quot;&gt;Update the 2FA user check to use timestamps&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;39901&quot;&gt;Coerce string object storage options to booleans&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40310&quot;&gt;Fix Jira importer user mapping limit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40730&quot;&gt;Fix auto-deploy-image external chart dependencies&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40789&quot;&gt;Fix ActiveRecord::IrreversibleOrderError during restore from backup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40821&quot;&gt;Fix wrong caching logic in ProcessRefChangesService&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4528&quot;&gt;Do not set default values for deprecated fdw settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40935&quot;&gt;Add path helper method for vulnerability todo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;gitlab-1329&quot;&gt;GitLab 13.2.9&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41327&quot;&gt;Update the 2FA user check to use timestamps&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40789&quot;&gt;Fix ActiveRecord::IrreversibleOrderError during restore from backup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4477&quot;&gt;Update deprecated os messages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4501&quot;&gt;Add rhel 8 to helper and selinux files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;39295&quot;&gt;Geo - Create repository updated events when mirrors are updated&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;2497&quot;&gt;Fix hanging info&#x2F;refs cache when error occurs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;gitlab-13111&quot;&gt;GitLab 13.1.11&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;41327&quot;&gt;Update the 2FA user check to use timestamps&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40789&quot;&gt;Fix ActiveRecord::IrreversibleOrderError during restore from backup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;39295&quot;&gt;Geo - Create repository updated events when mirrors are updated&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;2497&quot;&gt;Fix hanging info&#x2F;refs cache when error occurs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.3.4, 13.2.8, and 13.1.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/</id>
<published>2020-09-02T00:00:00+00:00</published>
<updated>2020-09-02T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;h2 id=&quot;attention&quot;&gt;Attention&lt;&#x2F;h2&gt;

&lt;p&gt;Versions 13.3.3, 13.2.7, and 13.1.9 were improperly packaged and did not contain
the security fixes outlined below. We&#x27;ve released 13.3.4, 13.2.8, and 13.1.10 to
correct the packaging error. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;delivery&#x2F;-&#x2F;issues&#x2F;1176&quot;&gt;#1176&lt;&#x2F;a&gt; for
details and corrective actions on the packaging error.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;Today we are releasing versions 13.3.4, 13.2.8 and 13.1.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;vendor-cross-account-assume-role-attack&quot;&gt;Vendor Cross-Account Assume-Role Attack&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab EKS integration was vulnerable to a cross-account assume role attack which could allow privileged access and possibly AWS account takeover. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13318&quot;&gt;CVE-2020-13318&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-on-the-vulnerability-page&quot;&gt;Stored XSS on the Vulnerability Page&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was vulnerable to a stored XSS on the standalone vulnerability page. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13301&quot;&gt;CVE-2020-13301&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;outdated-job-token-can-be-reused-to-access-unauthorized-resources&quot;&gt;Outdated Job Token Can Be Reused to Access Unauthorized Resources&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was not validating that job tokens were associated with running jobs. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13284&quot;&gt;CVE-2020-13284&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;file-disclosure-via-workhorse-file-upload-bypass&quot;&gt;File Disclosure Via Workhorse File Upload Bypass&lt;&#x2F;h2&gt;
&lt;p&gt;Conan package upload functionality was not properly validating the supplied parameters, which resulted the limited files disclosure. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13298&quot;&gt;CVE-2020-13298&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-maintainer-can-edit-group-badge&quot;&gt;Unauthorized Maintainer Can Edit Group Badge&lt;&#x2F;h2&gt;
&lt;p&gt;An unauthorized project maintainer could edit the subgroup badges due to the lack of authorization control. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13313&quot;&gt;CVE-2020-13313&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-within-wiki-functionality&quot;&gt;Denial of Service Within Wiki Functionality&lt;&#x2F;h2&gt;
&lt;p&gt;An internal investigation revealed that GitLab&#x27;s Wiki was vulnerable to a parser attack that prohibits anyone from accessing the Wiki functionality through the user interface. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13311&quot;&gt;CVE-2020-13311&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all GitLab versions prior 13.0.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-in-vulnerable-to-brute-force-attacks&quot;&gt;Sign-in Vulnerable to Brute-force Attacks&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was vulnerable to brute-force attacks due to an improper handling of sign-in parameters. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13289&quot;&gt;CVE-2020-13289&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;invalidated-session-allows-account-access-with-an-old-password&quot;&gt;Invalidated Session Allows Account Access With an Old Password&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain conditions GitLab was not properly revoking user sessions and allowed a malicious user to access a user account with an old password. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13302&quot;&gt;CVE-2020-13302&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rogov&quot;&gt;rogov&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 7.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-omniauth-endpoint-renders-user-controlled-messages&quot;&gt;GitLab Omniauth Endpoint Renders User Controlled Messages&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab Omniauth endpoint allowed a malicious user to submit content to be displayed back to the user within error messages. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13314&quot;&gt;CVE-2020-13314&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;h33t&quot;&gt;h33t&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 7.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blind-ssrf-through-repository-mirroring&quot;&gt;Blind SSRF Through Repository Mirroring&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was vulnerable to a blind SSRF attack through the repository mirroring feature. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13309&quot;&gt;CVE-2020-13309&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sky003&quot;&gt;sky003&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-through-incorrect-group-permission-verifications&quot;&gt;Information Disclosure Through Incorrect Group Permission Verifications&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was vulnerable to information disclosure by not performing proper verification on permissions for confidential epics. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13287&quot;&gt;CVE-2020-13287&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;no-rate-limit-on-gitlab-webhook-feature&quot;&gt;No Rate Limit on GitLab Webhook Feature&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab Webhook feature could be abused to perform denial of service attacks due to the lack of rate limitation. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13306&quot;&gt;CVE-2020-13306&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;noddyn12&quot;&gt;noddyn12&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-session-revocation-feature-does-not-invalidate-all-sessions&quot;&gt;GitLab Session Revocation Feature Does Not Invalidate All Sessions&lt;&#x2F;h2&gt;
&lt;p&gt;The revocation feature was not revoking all session tokens and one could re-use it to obtain a valid session. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13299&quot;&gt;CVE-2020-13299&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;oauth-authorization-scope-for-an-external-application-can-be-changed-without-user-consent&quot;&gt;OAuth Authorization Scope for an External Application Can Be Changed Without User Consent&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was vulnerable to an OAuth authorization scope change without user consent in the middle of the authorization flow. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13300&quot;&gt;CVE-2020-13300&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks fushbey for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-maintainer-can-delete-repository&quot;&gt;Unauthorized Maintainer Can Delete Repository&lt;&#x2F;h2&gt;
&lt;p&gt;A project Maintainer was able to delete a repository through GraphQL due to insufficient verification of permissions. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13317&quot;&gt;CVE-2020-13317&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-verification-of-deploy-key-leads-to-access-restricted-repository&quot;&gt;Improper Verification of Deploy-Key Leads to Access Restricted Repository&lt;&#x2F;h2&gt;
&lt;p&gt;Due to improper verification of permissions, an unauthorized user can access a private repository within a public project. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13303&quot;&gt;CVE-2020-13303&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disabled-repository-still-accessible-with-a-deploy-token&quot;&gt;Disabled Repository Still Accessible With a Deploy-Token&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was not validating a Deploy-Token and allowed a disabled repository be accessible via a git command line. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13316&quot;&gt;CVE-2020-13316&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;vaib25vicky&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;duplicated-secret-code-generated-by-2-factor-authentication-mechanism&quot;&gt;Duplicated Secret Code Generated by 2 Factor Authentication Mechanism&lt;&#x2F;h2&gt;
&lt;p&gt;Same 2 factor Authentication secret code was generated which resulted an attacker to maintain access under certain conditions. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13304&quot;&gt;CVE-2020-13304&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rgupt&quot;&gt;rgupt&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;lack-of-validation-within-project-invitation-flow&quot;&gt;Lack of Validation Within Project Invitation Flow&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was not invalidating project invitation link upon removing a user from a project. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13305&quot;&gt;CVE-2020-13305&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rgupt&quot;&gt;rgupt&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;current-sessions-not-invalidated-upon-enabling-2-factor-authentication&quot;&gt;Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication&lt;&#x2F;h2&gt;
&lt;p&gt;GitLab was not revoking current user sessions when 2 factor authentication was activated allowing a malicious user to maintain their access. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13307&quot;&gt;CVE-2020-13307&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-19&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-19&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-without-2-factor-authentication-can-be-blocked-accessing-gitlab&quot;&gt;Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab&lt;&#x2F;h2&gt;
&lt;p&gt;A user without 2 factor authentication enabled could be prohibited from accessing GitLab by being invited into a project that had 2 factor authentication inheritance. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13308&quot;&gt;CVE-2020-13308&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks marshall0705 for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-20&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-20&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;lack-of-upper-bound-check-leading-to-possible-denial-of-service&quot;&gt;Lack of Upper Bound Check Leading to Possible Denial of Service&lt;&#x2F;h2&gt;
&lt;p&gt;The profile activity page was not restricting the amount of results one could request, potentially resulting in a denial of service. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13315&quot;&gt;CVE-2020-13315&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;brandonnnn&quot;&gt;brandonnnn&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-21&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 11.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-21&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;2-factor-authentication-for-groups-was-not-enforced-within-api-endpoint&quot;&gt;2 Factor Authentication for Groups Was Not Enforced Within API Endpoint&lt;&#x2F;h2&gt;
&lt;p&gt;When 2 factor authentication was enabled for groups, a malicious user could bypass that restriction by sending a specific query to the API endpoint. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13297&quot;&gt;CVE-2020-13297&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-22&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-22&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-runner-denial-of-service-via-ci-jobs&quot;&gt;GitLab Runner Denial of Service via CI Jobs&lt;&#x2F;h2&gt;
&lt;p&gt;It was possible to make the gitlab-runner process crash by sending malformed queries, resulting in a denial of service. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13310&quot;&gt;CVE-2020-13310&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-23&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab Runner.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-23&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-websocket-extensions-gem&quot;&gt;Update websocket-extensions Gem&lt;&#x2F;h2&gt;
&lt;p&gt;The websocket-extensions gem has been upgraded to 0.1.5. This upgrade includes a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2020-7663&quot;&gt;CVE-2020-7663&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-jquery-dependency&quot;&gt;Update jQuery Dependency&lt;&#x2F;h2&gt;
&lt;p&gt;The jQuery dependency has been upgraded to 3.5 . This upgrade includes a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jquery&#x2F;jquery&#x2F;security&#x2F;advisories&#x2F;GHSA-gxr4-xjj5-5px2&quot;&gt;CVE-2020-11022&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.3.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/08/28/gitlab-13-3-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/28/gitlab-13-3-2-released/</id>
<published>2020-08-28T00:00:00+00:00</published>
<updated>2020-08-28T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.3.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;08&#x2F;22&#x2F;gitlab-13-3-released&#x2F;&quot;&gt;this month&#x27;s 13.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40353&quot;&gt;Prevent accidental group deletion if path rename fails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40412&quot;&gt;Fix create snippet disabled on empty file path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;39894&quot;&gt;Fix race condition in concurrent backups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40451&quot;&gt;Fix exception handling when a concurrent backup fails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;2497&quot;&gt;Fix hanging info refs cache when error occurs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.3.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/08/25/gitlab-13-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/25/gitlab-13-3-1-released/</id>
<published>2020-08-25T00:00:00+00:00</published>
<updated>2020-08-25T00:00:00+00:00</updated>
<author>
<name>Amy Phillips</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.3.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;08&#x2F;22&#x2F;gitlab-13-3-released&#x2F;&quot;&gt;this month&#x27;s 13.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;39654&quot;&gt;Fix a bug with promoting Issues with attachments to Epics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;3966&quot;&gt;Geo: Apply selective sync to container repo updates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;39916&quot;&gt;Geo: Apply selective sync to design repo updates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;40089&quot;&gt;Avoid creating diff position when line-code is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.3 released with coverage-guided fuzz testing and a build matrix for CI&#x2F;CD</title>
<release>13.3</release>
<link href='https://about.gitlab.com/releases/2020/08/22/gitlab-13-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/22/gitlab-13-3-released/</id>
<published>2020-08-22T00:00:00+00:00</published>
<updated>2020-08-22T00:00:00+00:00</updated>
<author>
<name>Kevin Chu</name>
</author>
<content type='html'>&lt;p&gt;DevSecOps helps teams detect and resolve faults and vulnerabilities early in the software development process. In GitLab 13.3, building secure software is easier with fuzz testing in your development workflow. With &lt;strong&gt;coverage-guided fuzz testing&lt;&#x2F;strong&gt; and &lt;strong&gt;on-demand DAST (Dynamic Application Security Testing)&lt;&#x2F;strong&gt;, discovering real-world software vulnerabilities is faster and more efficient. At the same time, releasing code more frequently is made simpler with the new &lt;strong&gt;build matrix for CI&#x2F;CD&lt;&#x2F;strong&gt;. Finally, the &lt;strong&gt;Pod health dashboard&lt;&#x2F;strong&gt; increases Ops&#x27; efficiency by reducing their context switching: all Kubernetes pods health primitives are in the dashboard. We hope that you find these top features, and the &lt;strong&gt;69 new features&lt;&#x2F;strong&gt; packed in this release, useful.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;faster-remediation-find-and-prevent-defects-and-vulnerabilities-earlier&quot;&gt;Faster remediation: Find and prevent defects and vulnerabilities earlier&lt;&#x2F;h2&gt;

&lt;p&gt;With &lt;a href=&quot;#coverage-guided-fuzz-testing-for-go-and-cc-applications&quot;&gt;coverage-guided fuzz testing&lt;&#x2F;a&gt;, it&#x27;s now easier to efficiently surface and solve vulnerabilities in C, C++, and Go. In GitLab 13.3 all our SAST (Static Application Security Testing) analyzers are &lt;a href=&quot;#sast-security-analyzers-available-for-all&quot;&gt;available to everyone&lt;&#x2F;a&gt; and it has never been easier &lt;a href=&quot;#guided-sast-configuration-experience&quot;&gt;to set them up&lt;&#x2F;a&gt;. Finally, &lt;a href=&quot;#on-demand-dast-scans&quot;&gt;running DAST from the GUI&lt;&#x2F;a&gt; is now more convenient. More importantly, security staff can tackle vulnerabilities faster by leveraging the new &lt;a href=&quot;#dast-vulnerability-evidence&quot;&gt;vulnerability evidence&lt;&#x2F;a&gt; included in the DAST output.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;reduce-cycle-time-release-more-frequently&quot;&gt;Reduce cycle time, release more frequently&lt;&#x2F;h2&gt;

&lt;p&gt;Building powerful workflows is now easy with the new &lt;a href=&quot;#create-a-matrix-of-jobs-using-a-simple-syntax&quot;&gt;build matrix&lt;&#x2F;a&gt;: define keys and values once, release and deploy multiple times. Teams can increase velocity by measuring Merge Request throughput now available in the &lt;a href=&quot;#merge-request-analytics&quot;&gt;MR Analytics Dashboard&lt;&#x2F;a&gt;. Also, MR authors can now integrate code faster by acknowledging their code review requests have been answered &lt;a href=&quot;#merge-request-approvals-show-who-participated-in-the-review&quot;&gt;at a glance&lt;&#x2F;a&gt;. This acknowledgment of fulfilled duties by different roles in MRs are now traceable in the &lt;a href=&quot;#compliance-dashboard-shows-more-information&quot;&gt;Compliance Dashboard&lt;&#x2F;a&gt;. Maintainers can also suggest to their contributors a &lt;a href=&quot;#squash-commits-options&quot;&gt;Squash Commit policy&lt;&#x2F;a&gt;. Lastly, rollouts can be more targeted and controlled using the newly named &lt;a href=&quot;#rename-feature-flag-user-strategies&quot;&gt;feature flags strategy called Percentage of Users&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;enable-your-delivery-teams-to-be-more-productive-and-efficient&quot;&gt;Enable your delivery teams to be more productive and efficient&lt;&#x2F;h2&gt;

&lt;p&gt;Software development is mostly about building and distributing packages. To make that easier and with usability in mind, we overhauled the whole &lt;a href=&quot;#improved-presentation-of-package-metadata-and-activity&quot;&gt;Package registry&lt;&#x2F;a&gt; GUI and made it &lt;a href=&quot;#package-registry-now-available-in-core&quot;&gt;available for everyone in Core&lt;&#x2F;a&gt;. Plus, it has never been easier to publish &lt;a href=&quot;#use-ci-job-token-to-publish-nuget-packages&quot;&gt;NuGet packages&lt;&#x2F;a&gt; in an automated way. Once deployed, your teams won&#x27;t need to worry about the health of their systems. All relevant action can be now taken based on information from the &lt;a href=&quot;#kubernetes-pod-health-dashboard&quot;&gt;Pod health dashboard&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;!--
Suggestion: describe each feature briefly in just a few words, using
anchors to link to their headings (use the relative path). The intro is supposed
to be eyes-catching, so &quot;be happy&quot; about it, describe them enthusiastically.
Focus on what are the advantages on having each of them. For some guidance,
look at the intros of past release posts.
--&gt;

&lt;h3 class=&quot;intro-header&quot; id=&quot;it-doesnt-stop-here-there-is-more&quot;&gt;It doesn’t stop here: there is more!&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab is used by companies with thousands of users in teams working synchronously and asynchronously across continents. To do so, we are focused on improving its &lt;a href=&quot;#concurrent-git-repository-backups&quot;&gt;fault tolerance&lt;&#x2F;a&gt; and &lt;a href=&quot;#gitaly-cluster-reference-transactions&quot;&gt;read&#x2F;write operation synchronicity&lt;&#x2F;a&gt; on every release. Overall, we are making &lt;a href=&quot;#geo-is-faster-and-easier-to-maintain&quot;&gt;GitLab lightning fast&lt;&#x2F;a&gt; across the globe.&lt;&#x2F;p&gt;

&lt;p&gt;Here are several other cool features that you should check out:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#drag-and-drop-to-reorder-designs&quot;&gt;&lt;strong&gt;Change the sort order of designs&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#junit-report-improvements&quot;&gt;&lt;strong&gt;JUnit reports are now much easier to read and understand&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#display-strategy-information-on-feature-flags-list-view&quot;&gt;&lt;strong&gt;Feature flag strategy will now show in your feature flag view&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#create-and-manage-it-incidents-in-gitlab&quot;&gt;&lt;strong&gt;Manage IT Incidents&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;If you&#x27;d like to preview what&#x27;s coming in the &lt;em&gt;next&lt;&#x2F;em&gt; release, be sure to check out our 13.4 &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=50fqa7qsI_I&quot;&gt;kickoff video&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;!--
Reminder: the final paragraph should include the total number of new features
being released, including bugs, performance improvements, and contributions from
non-DevOps stages like Enablement. All of these should be listed in the release
post, either as headers or bullet points.
--&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_3&#x2F;13-3-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 13.2.6, 13.1.8, 13.0.14</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/08/18/critical-security-release-gitlab-13-2-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/18/critical-security-release-gitlab-13-2-6-released/</id>
<published>2020-08-18T00:00:00+00:00</published>
<updated>2020-08-18T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Note: due to a packaging problem, our previous release (&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;08&#x2F;18&#x2F;critical-security-release-gitlab-13-2-5-released&#x2F;&quot;&gt;published and communicated earlier today&#x2F;Aug 18&lt;&#x2F;a&gt;) did not include the security fixes mentioned in the accompanying blog post for the GitLab Community Edition package. The new, just released versions of GitLab Enterprise Edition and GitLab Community Edition now contain all the necessary fixes for all versions. Please update all packages immediately.
***&lt;&#x2F;p&gt;

&lt;p&gt;Today we are releasing versions 13.2.6, 13.1.8, 13.0.14 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;deploy-token-access-control&quot;&gt;Deploy Token Access Control&lt;&#x2F;h3&gt;
&lt;p&gt;An authorization issue discovered in the deploy token handling allowed read access to public projects with restricted repositories. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13296&quot;&gt;CVE-2020-13296&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 13.2.5, 13.1.7, 13.0.13</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/08/18/critical-security-release-gitlab-13-2-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/18/critical-security-release-gitlab-13-2-5-released/</id>
<published>2020-08-18T00:00:00+00:00</published>
<updated>2020-08-18T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;h3 id=&quot;update-as-of-1700-utc-august-18-2020-both-our-gitlab-enterprise-edition-and-gitlab-community-edition-versions-contain-all-of-the-fixes-listed-below--the-related-blog-post-with-new-version-numbers-is-here&quot;&gt;Update: As of 17:00 UTC, August 18, 2020 both our GitLab Enterprise Edition and GitLab Community Edition versions contain all of the fixes listed below.  The related blog post with new version numbers is &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;08&#x2F;18&#x2F;critical-security-release-gitlab-13-2-6-released&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;del&gt;&lt;strong&gt;Due to a packaging problem, the GitLab Community Edition packages do not include the security fixes mentioned in this blog post. We are currently working on releasing new versions of both our GitLab Enterprise Edition and GitLab Community Edition, to ensure both contain all the necessary fixes. We will publish a separate blog post when these packages have been published.&lt;&#x2F;strong&gt;&lt;&#x2F;del&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Today we are releasing versions 13.2.5, 13.1.7, 13.0.13 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;deploy-token-access-control&quot;&gt;Deploy Token Access Control&lt;&#x2F;h3&gt;
&lt;p&gt;An authorization issue discovered in the deploy token handling allowed read access to public projects with restricted repositories. This issue is now mitigated in the latest release and is waiting for a CVE ID to be assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.2.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/08/11/gitlab-13-2-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/11/gitlab-13-2-4-released/</id>
<published>2020-08-11T00:00:00+00:00</published>
<updated>2020-08-11T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.2.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;07&#x2F;22&#x2F;gitlab-13-2-released&#x2F;&quot;&gt;this month&#x27;s 13.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37884&quot;&gt;Create issue automatically from Prometheus alert&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;38271&quot;&gt;docs: Fix a typo in realtime feedback CI YAML&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;38556&quot;&gt;Preload all associations in Vulnerability GraphQL API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;38736&quot;&gt;Add decompressed archive size validation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4461&quot;&gt;Fix Geo replication resuming PG query&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.2.3, 13.1.6 and 13.0.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/08/05/gitlab-13-2-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/08/05/gitlab-13-2-3-released/</id>
<published>2020-08-05T00:00:00+00:00</published>
<updated>2020-08-05T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.2.3, 13.1.6 and 13.0.12 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;previously-fixed-in-1291-arbitrary-file-read-when-moving-an-issue&quot;&gt;Previously fixed (in 12.9.1): Arbitrary File Read when Moving an Issue&lt;&#x2F;h2&gt;
&lt;p&gt;Recently, a GitLab user posted a blog about the exploitation of a known vulnerability which has been previously disclosed and assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10977&quot;&gt;CVE-2020-10977&lt;&#x2F;a&gt;. GitLab EE&#x2F;CE 8.5 to 12.9 is vulnerable to a path traversal when moving an issue between projects.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was remediated and patched in the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2020&#x2F;03&#x2F;26&#x2F;security-release-12-dot-9-dot-1-released&#x2F;&quot;&gt;12.9.1 release&lt;&#x2F;a&gt; in March 2020.&lt;&#x2F;p&gt;

&lt;p&gt;We strongly recommend that all users confirm they are running the latest version of GitLab to ensure they are up-to-date with current security releases. Users should update immediately if possible. If upgrading immediately is not possible for some reason, public registration should be disabled.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;memory-exhaustion-via-excessive-logging-of-invite-email-error&quot;&gt;Memory Exhaustion via Excessive Logging of Invite Email Error&lt;&#x2F;h2&gt;
&lt;p&gt;Excessive error logging related to an invitation email being sent to members of a deleted group could potentially cause memory exhaustion on lower resource machines. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13280&quot;&gt;CVE-2020-13280&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-through-project-import-feature&quot;&gt;Denial of Service Through Project Import Feature&lt;&#x2F;h2&gt;
&lt;p&gt;The project import feature did not perform size checks before decompressing data, potentially resulting in a denial of service. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13281&quot;&gt;CVE-2020-13281&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;u3mur4&quot;&gt;@u3mur4&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-controlled-git-configuration-settings-resulting-in-ssrf&quot;&gt;User Controlled Git Configuration Settings Resulting in SSRF&lt;&#x2F;h2&gt;
&lt;p&gt;When importing a repository via URL, the git &lt;code&gt;http.&amp;lt;url&amp;gt;.proxy&lt;&#x2F;code&gt; setting could be changed and lead to server-side request forgery. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13286&quot;&gt;CVE-2020-13286&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 12.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-issue-reference-number-tooltip&quot;&gt;Stored XSS in Issue Reference Number Tooltip&lt;&#x2F;h2&gt;
&lt;p&gt;For some browsers, the tooltip for issue reference numbers could result in stored XSS on mouseover. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13285&quot;&gt;CVE-2020-13285&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;@yvvdwf&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-issues-list-via-milestone-title&quot;&gt;Stored XSS in Issues List via Milestone Title&lt;&#x2F;h2&gt;
&lt;p&gt;The milestone title field can lead to stored XSS when viewed under certain conditions on the issue list. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13283&quot;&gt;CVE-2020-13283&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;@mike12&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-after-group-transfer&quot;&gt;Improper Access Control After Group Transfer&lt;&#x2F;h2&gt;
&lt;p&gt;Members of a parent group silently and unexpectedly maintained their access levels when a subgroup is transferred. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13282&quot;&gt;CVE-2020-13282&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;kryword&quot;&gt;@kryword&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-email-verification-required-for-oauth-flow&quot;&gt;Bypass Email Verification Required for OAuth Flow&lt;&#x2F;h2&gt;
&lt;p&gt;The required email verification for the OAuth authorization code flow could be bypassed, which potentially could affect third party applications that use GitLab as an identity provider. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13292&quot;&gt;CVE-2020-13292&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cache-money&quot;&gt;@cache-money&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confusion-when-using-hexadecimal-branch-names&quot;&gt;Confusion When Using Hexadecimal Branch Names&lt;&#x2F;h2&gt;
&lt;p&gt;Using a branch with a hexadecimal name could override an existing hash. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13293&quot;&gt;CVE-2020-13293&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;retroplasma&quot;&gt;@retroplasma&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insufficient-oauth-revocation&quot;&gt;Insufficient OAuth Revocation&lt;&#x2F;h2&gt;
&lt;p&gt;Access grants were not revoked when a user revoked access to an application. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13294&quot;&gt;CVE-2020-13294&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;benaubin&quot;&gt;@benaubin&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;whitehattushu&quot;&gt;@whitehattushu&lt;&#x2F;a&gt;, and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;lauritz&quot;&gt;@lauritz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 7.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-for-project-sharing&quot;&gt;Improper Access Control for Project Sharing&lt;&#x2F;h2&gt;
&lt;p&gt;Project sharing could temporarily allow too permissive access. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13291&quot;&gt;CVE-2020-13291&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-jobs-page&quot;&gt;Stored XSS in Jobs Page&lt;&#x2F;h2&gt;
&lt;p&gt;A stored XSS was identified in the CI&#x2F;CD Jobs page. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13288&quot;&gt;CVE-2020-13288&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;@mike12&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-of-applications-page&quot;&gt;Improper Access Control of Applications Page&lt;&#x2F;h2&gt;
&lt;p&gt;Users without two-factor authentication set up can still access the &lt;code&gt;&#x2F;profile&#x2F;applications&lt;&#x2F;code&gt; page even when two-factor authentication is required. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13290&quot;&gt;CVE-2020-13290&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;brdoors3&quot;&gt;@brdoors3&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;melar_dev&quot;&gt;@melar_dev&lt;&#x2F;a&gt; for providing additional important details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-into-shared-runner&quot;&gt;SSRF into Shared Runner&lt;&#x2F;h2&gt;
&lt;p&gt;By replacing dockerd with a malicious server, a SSRF was possible into the Shared Runner. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13295&quot;&gt;CVE-2020-13295&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;lucash-dev&quot;&gt;@lucash-dev&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all versions of GitLab Runner.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations of &lt;strong&gt;GitLab Runner&lt;&#x2F;strong&gt; are &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;upgraded&lt;&#x2F;a&gt; to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-kramdown-gem&quot;&gt;Update Kramdown Gem&lt;&#x2F;h2&gt;
&lt;p&gt;The kramdown gem has been upgraded to 2.3.0. This upgrade include a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-14001&quot;&gt;CVE-2020-14001&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 13.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.
To update Gitlab Runner, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;install&#x2F;linux-repository.html#updating-the-runner&quot;&gt;Updating the Runner page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.2.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/30/gitlab-13-2-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/30/gitlab-13-2-2-released/</id>
<published>2020-07-30T00:00:00+00:00</published>
<updated>2020-07-30T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.2.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;07&#x2F;22&#x2F;gitlab-13-2-released&#x2F;&quot;&gt;this month&#x27;s 13.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;36376&quot;&gt;Coerce repository_storages_weighted, removes repository_storages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37472&quot;&gt;Add issue to iteration docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37492&quot;&gt;Fix jira import users startAt parameter&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37944&quot;&gt;Better error message for unconfirmed users when using git&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;38024&quot;&gt;Handle special cases when mass unconfirming users&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4434&quot;&gt;Disable crond if LetsEncrypt disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/24/gitlab-13-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/24/gitlab-13-2-1-released/</id>
<published>2020-07-24T00:00:00+00:00</published>
<updated>2020-07-24T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.2.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;07&#x2F;22&#x2F;gitlab-13-2-released&#x2F;&quot;&gt;this month&#x27;s 13.2
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;36771&quot;&gt;Geo: Fix package file backfill with sync object storage disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37009&quot;&gt;Limit database deprecation notice window&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37090&quot;&gt;Enables diff file-by-file navigation by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37246&quot;&gt;Fix merge request approvals for EE without license&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37354&quot;&gt;Disable security scanner alerts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37435&quot;&gt;DAG visualization FF: Update default to true in HAML&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37494&quot;&gt;Fix local tiller default enabled inconsistency&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37569&quot;&gt;Fix JS error when discussion has no diff_file&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37671&quot;&gt;Resolve &quot;Fix missing path for avatars of bots&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37171&quot;&gt;Resolve &quot;Pasting an image into a comment also uploads design&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37385&quot;&gt;Shorten &quot;enable LFS&quot; message for design management&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;37538&quot;&gt;Add &quot;more information&quot; to Design Management LFS message&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4337&quot;&gt;Make actioncable recipe and control files match new runit requirement&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.1.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/24/gitlab-13-1-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/24/gitlab-13-1-5-released/</id>
<published>2020-07-24T00:00:00+00:00</published>
<updated>2020-07-24T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.1.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;06&#x2F;22&#x2F;gitlab-13-1-released&#x2F;&quot;&gt;last month&#x27;s 13.1
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;36012&quot;&gt;Fix: Geo file downloads can block Sidekiq threads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;36492&quot;&gt;Geo: Fix inaccurate &quot;Synchronization disabled&quot; progress bars&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;36947&quot;&gt;Fix location of k3d install script in QA dockerfile&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4337&quot;&gt;Fix: Sidekiq will now fail to configure if sidekiq_cluster config is used&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4381&quot;&gt;Fix: Implement a version check for docker&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4418&quot;&gt;Use gitlab-depscan script from specific commit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4419&quot;&gt;Make actioncable recipe and control files match new runit requirement&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.2 released with Planning Iterations and Load Performance Testing</title>
<release>13.2</release>
<link href='https://about.gitlab.com/releases/2020/07/22/gitlab-13-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/22/gitlab-13-2-released/</id>
<published>2020-07-22T00:00:00+00:00</published>
<updated>2020-07-22T00:00:00+00:00</updated>
<author>
<name>Justin Farris</name>
</author>
<content type='html'>&lt;p&gt;GitLab 13.2 now helps teams &lt;strong&gt;streamline project planning&lt;&#x2F;strong&gt; with milestone iterations, &lt;strong&gt;collaborate better for faster feedback&lt;&#x2F;strong&gt; with diff changes for wiki pages, and &lt;strong&gt;improve overall performance&#x2F;efficiency&lt;&#x2F;strong&gt; with load performance testing.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header-h3&quot; id=&quot;streamline-agile-project-planning-and-management&quot;&gt;Streamline agile project planning and management&lt;&#x2F;h2&gt;

&lt;p&gt;Managing workflows and planning tasks for different teams can add a significant amount of development disruption to your day. In releasing our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;values&#x2F;#minimal-viable-change-mvc&quot;&gt;Minimal Viable Change (MVC)&lt;&#x2F;a&gt; of &lt;a href=&quot;#assign-issues-to-iterations&quot;&gt;&lt;strong&gt;iterations&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; to break down work into smaller, more manageable, chunks, we&#x27;re lessening this disruption and making project planning easier – with many enhancements to come. If your team leverages Jira for project management, it&#x27;s now easier for you to &lt;a href=&quot;#view-jira-issue-list-in-gitlab&quot;&gt;&lt;strong&gt;view Jira issues in GitLab&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; because we believe that GitLab should &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;product&#x2F;gitlab-the-product&#x2F;#plays-well-with-others&quot;&gt;play well with others&lt;&#x2F;a&gt; and balance integrations with native capabilities. If you&#x27;re using epics to plan and manage large projects, then you can now protect sensitive content with &lt;a href=&quot;#organize-sensitive-work-into-confidential-epics&quot;&gt;&lt;strong&gt;confidential epics&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;. When you need to update several related epics, you can now &lt;a href=&quot;#bulk-edit-the-epic-for-multiple-issues-from-the-issues-list&quot;&gt;&lt;strong&gt;bulk edit epics&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; to reduce your &quot;tab overload&quot; and the number of clicks it takes to update.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;better-collaboration-for-faster-feedback&quot;&gt;Better collaboration for faster feedback&lt;&#x2F;h2&gt;

&lt;p&gt;Clear communication is key to effective collaboration because it enables development teams to get faster feedback on changes before pushing them to production.  The ability to &lt;a href=&quot;#wiki-page-diffs&quot;&gt;&lt;strong&gt;diff changes for wiki pages&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; now makes edit history comparisons between page versions quicker and simpler, similar to viewing files in a repository.  &lt;a href=&quot;#real-time-feedback-for-gitlab-ciyml-in-web-ide&quot;&gt;&lt;strong&gt;Realtime feedback for&lt;&#x2F;strong&gt; &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; &lt;strong&gt;in the Web IDE&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; makes updating your CI pipeline more efficient by enabling realtime linting and autocompletion. Now you don&#x27;t have to remember all of the parameters when configuring your CI pipeline or switch contexts to get the information you need.&lt;&#x2F;p&gt;

&lt;p&gt;Designers are incredibly important members of the team and 13.2 includes great improvements to design management. It&#x27;s now &lt;a href=&quot;#make-it-easier-to-find-designs-on-an-issue&quot;&gt;&lt;strong&gt;easier to find designs in an issue&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; so it takes less time, and the &lt;a href=&quot;#official-gitlab-figma-plugin&quot;&gt;&lt;strong&gt;official GitLab Figma plugin&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; simplifies the process of uploading from Figma to issues on GitLab.com.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;improved-performance-and-efficiency&quot;&gt;Improved performance and efficiency&lt;&#x2F;h2&gt;

&lt;p&gt;13.2 delivers new updates to improve your team&#x27;s efficiency and performance.  You can now take advantage of &lt;a href=&quot;#advanced-global-search-now-available-on-gitlabcom&quot;&gt;&lt;strong&gt;advanced global search on GitLab.com&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;, a capability that improves search relevancy, performance, and allows for group-wide searches across all projects directly in the UI. Application performance is a challenge every development team faces and now &lt;a href=&quot;#load-performance-testing&quot;&gt;&lt;strong&gt;load performance testing&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; in GitLab makes it easy to run custom load tests as part of your CI&#x2F;CD pipelines to better understand how your application will perform under stress.&lt;&#x2F;p&gt;

&lt;p&gt;Nowadays, it seems like everyone is working from home and are &quot;distributed&quot; more than ever. GitLab Geo helps remote teams work more efficiently by using a local GitLab node, and now offers &lt;a href=&quot;#faster-geo-replication-performance-for-projects&quot;&gt;&lt;strong&gt;improved replication performance for projects&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; to ensure local content is fresh. Last but not least, GitLab &lt;a href=&quot;#include-ci-test-results-in-release-evidence&quot;&gt;&lt;strong&gt;includes CI test results within Release Evidence&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; for easy access in the event you need to provide compliance data or a more efficient way to show relevant changes to production during audit.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-much-more&quot;&gt;And much much more!&lt;&#x2F;h3&gt;

&lt;p&gt;There’s never enough space to highlight all the great features in our releases. An important development for package management that&#x27;s worth noting: GitLab now supports the PHP dependency manager, Composer, so you can &lt;a href=&quot;#manage-php-dependencies-with-the-gitlab-composer-repository&quot;&gt;&lt;strong&gt;discover, share, and install PHP dependencies using GitLab&#x27;s Composer Repository with ease&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Here are several other cool features that you should check out:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;#associate-feature-flags-with-related-issues&quot;&gt;&lt;strong&gt;Associate Feature Flags with related issues&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#container-host-monitoring-and-blocking&quot;&gt;&lt;strong&gt;Container Host Monitoring and Blocking&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#gitlab-runner-support-for-linux-on-ibm-z&quot;&gt;&lt;strong&gt;IBM z&#x2F;OS Mainframe support for GitLab Runner&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;#code-quality-merge-request-widget-moved-to-core&quot;&gt;&lt;strong&gt;Code Quality Merge Request widget moved to Core&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;If you&#x27;d like to preview what&#x27;s coming in the &lt;em&gt;next&lt;&#x2F;em&gt; release, be sure to check out our 13.3 &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;wivB1X_N0QQ&quot;&gt;kickoff video&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_2&#x2F;13-2-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.0.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/09/gitlab-13-0-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/09/gitlab-13-0-10-released/</id>
<published>2020-07-09T00:00:00+00:00</published>
<updated>2020-07-09T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.0.10 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;05&#x2F;22&#x2F;gitlab-13-0-released&#x2F;&quot;&gt;May&#x27;s 13.0
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35944&quot;&gt;Fix gitlab:*:check Rake tasks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4373&quot;&gt;Run vacuumdb with 2 commands simultaneously&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35692&quot;&gt;Geo - Does not sync LFS objects from fork networks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.1.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/09/gitlab-13-1-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/09/gitlab-13-1-4-released/</id>
<published>2020-07-09T00:00:00+00:00</published>
<updated>2020-07-09T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.1.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;06&#x2F;22&#x2F;gitlab-13-1-released&#x2F;&quot;&gt;last month&#x27;s 13.1
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35213&quot;&gt;Resolve &quot;Merge request approval button style inadvertently changed&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35309&quot;&gt;Enable code_navigation for feature specs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35393&quot;&gt;Document the doctor:secrets rake task&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35425&quot;&gt;Fix conflict on the migration that adds routes for orphaned projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35814&quot;&gt;Fix existing repository_storages_weighted migrations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35829&quot;&gt;Fix error 500s creating new projects due to empty weights&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35944&quot;&gt;Fix gitlab:*:check Rake tasks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35692&quot;&gt;Geo - Does not sync LFS objects from fork networks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4354&quot;&gt;Ensure we are properly restarting the unicorn service&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4356&quot;&gt;Absolute SSL path should work for postgres recipe&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4373&quot;&gt;Run vacuumdb with 2 commands simultaneously&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitaly&quot;&gt;Gitaly&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;-&#x2F;merge_requests&#x2F;2313&quot;&gt;Add GL_PROJECT_PATH for custom hooks &lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 13.1.3, 13.0.9 and 12.10.14</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/06/critical-security-release-gitlab-13-1-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/06/critical-security-release-gitlab-13-1-3-released/</id>
<published>2020-07-06T00:00:00+00:00</published>
<updated>2020-07-06T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.1.3, 13.0.9 and 12.10.14 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;workhorse-bypass-allows-files-in-tmp-to-be-read-via-maven-repository-apis&quot;&gt;Workhorse bypass allows files in &#x2F;tmp to be read via Maven Repository APIs&lt;&#x2F;h2&gt;
&lt;p&gt;The Maven package upload endpoint could be used to override restrictions and result in the GitLab Workhorse disclosing the existence and contents of files in the &lt;code&gt;&#x2F;tmp&lt;&#x2F;code&gt; directory. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-15525&quot;&gt;CVE-2020-15525&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;maven-package-upload-broken-in-121014&quot;&gt;Maven package upload broken in 12.10.14&lt;&#x2F;h3&gt;
&lt;p&gt;The fix for this security issue caused a regression in the 12.10 code base. Uploading Maven packages no longer works, generating the error &lt;code&gt;400 Bad Request&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;229482&quot;&gt;the issue&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;The GitLab Maven Repository is a Premium feature in GitLab 12.10. Premium and Ultimate customers running GitLab 12.10 who use the Maven Repository feature should upgrade to 13.0.9 or higher.&lt;&#x2F;p&gt;

&lt;p&gt;Our documented upgrade path from 12.10 to 13.x specifies that the last 12.10 patch release should be one of the steps. This is to ensure that any code updates required for upgrading are installed. Customers using the Maven Repository would be advised to use 12.10.13 as the last 12.10 patch release, and upgrade to a 13.0.9 or higher as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.1.2, 13.0.8 and 12.10.13</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</id>
<published>2020-07-01T00:00:00+00:00</published>
<updated>2020-07-01T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.1.2, 13.0.8 and 12.10.13 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-permission-check-on-time-tracking&quot;&gt;Missing Permission Check on Time Tracking&lt;&#x2F;h2&gt;
&lt;p&gt;It was possible to add time spent on a issue without being a project member. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13319&quot;&gt;CVE-2020-13319&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-pypi-files-api&quot;&gt;Cross-Site Scripting in PyPi Files API&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain conditions, requests involving the PyPi files API could result in an XSS vulnerability. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13328&quot;&gt;CVE-2020-13328&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 13.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-authorization-check-on-private-project-security-dashboard&quot;&gt;Insecure Authorization Check on Private Project Security Dashboard&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain conditions, a project member with Guest permissions was allowed to view the project security dashboard.This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13320&quot;&gt;CVE-2020-13320&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vaib25vicky&quot;&gt;@vaib25vicky&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.8 to 13.1.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-references&quot;&gt;Cross-Site Scripting in References&lt;&#x2F;h2&gt;
&lt;p&gt;A stored cross-site scripting vulnerability was discovered when editing references. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13338&quot;&gt;CVE-2020-13338&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 8.10.0 to 13.1.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-group-names&quot;&gt;Cross-Site Scripting in Group Names&lt;&#x2F;h2&gt;
&lt;p&gt;An internal investigation revealed that Group Names could be used to store XSS payloads. TThis issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13337&quot;&gt;CVE-2020-13327&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-blob-viewer&quot;&gt;Cross-Site Scripting in Blob Viewer&lt;&#x2F;h2&gt;
&lt;p&gt;A stored XSS vulnerability was discovered in the blob viewer feature. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13329&quot;&gt;CVE-2020-13329&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;@yvvdwf&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-error-tracking&quot;&gt;Cross-Site Scripting in Error Tracking&lt;&#x2F;h2&gt;
&lt;p&gt;A stored cross-site scripting payload could be injected in the Error Tracking page. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13336&quot;&gt;CVE-2020-13336&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;@mike12&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-authorisation-check-on-creation-and-deletion-of-deploy-tokens&quot;&gt;Insecure Authorisation Check on Creation and Deletion of Deploy Tokens&lt;&#x2F;h2&gt;
&lt;p&gt;An insecure authorization check allowed project members with Maintainer role to create and delete deploy tokens. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13322&quot;&gt;CVE-2020-13322&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-name-format-restiction-bypass&quot;&gt;User Name Format Restiction Bypass&lt;&#x2F;h2&gt;
&lt;p&gt;Username format restrictions could be bypassed allowing for html tags to be added. TThis issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13321&quot;&gt;CVE-2020-13321&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;zseano&quot;&gt;@zseano&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all versions of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-in-issue-comments&quot;&gt;Denial of Service in Issue Comments&lt;&#x2F;h2&gt;
&lt;p&gt;A denial of service vulnerability involving the comments on an issue was discovered. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13325&quot;&gt;CVE-2020-13325&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks @tiradorngpilipinas for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-wiki-pages&quot;&gt;Cross-Site Scripting in Wiki Pages&lt;&#x2F;h2&gt;
&lt;p&gt;A stored cross-site scripting vulnerability was discovered in the Wiki upload feature. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13331&quot;&gt;CVE-2020-13331&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;semsem123&quot;&gt;@semsem123&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.10 and older.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-merge-request-updates-leaked-via-todos&quot;&gt;Private Merge Request Updates Leaked via Todos&lt;&#x2F;h2&gt;
&lt;p&gt;An internal investigation revealed that updates to private merge requests could be disclosed to removed project members. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13323&quot;&gt;CVE-2020-13323&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all versions of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-user-activity-leaked-via-api&quot;&gt;Private User Activity Leaked via API&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain conditions the private activty of an user could be exposed via the API. TThis issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13324&quot;&gt;CVE-2020-13324&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 9.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-bitbucket-import-feature&quot;&gt;Cross-Site Scripting in Bitbucket Import Feature&lt;&#x2F;h2&gt;
&lt;p&gt;A stored XSS vulnerability could be exploited using the Bitbucket project import feature. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13330&quot;&gt;CVE-2020-13330&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;saltyyolk&quot;&gt;@saltyyolk of Chaitin Tech&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab  11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-project-restriction-bypass&quot;&gt;Github Project Restriction Bypass&lt;&#x2F;h2&gt;
&lt;p&gt;It was possible to bypass the restriction of importing projects from Github via the API. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13326&quot;&gt;CVE-2020-13326&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab  11.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-pcre-dependency&quot;&gt;Update PCRE Dependency&lt;&#x2F;h2&gt;
&lt;p&gt;The lippcre in PCRE has been upgraded from 8.42  to 8.44. This upgrade includes a security fix for CVE-2020-14155.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-kaminari-gem&quot;&gt;Update Kaminari Gem&lt;&#x2F;h2&gt;
&lt;p&gt;Using Kaminari before 1.2.1, an attacker could inject arbitrary code into pages with pagination links. This upgrade includes a security fix for CVE-2020-11082.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-xtermjs&quot;&gt;Update Xterm.js&lt;&#x2F;h2&gt;
&lt;p&gt;A remote code execution exists in xterm.js before 3.9.2. This upgrade includes a security fix for CVE-2019-0542.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.0.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/25/gitlab-13-0-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/25/gitlab-13-0-7-released/</id>
<published>2020-06-25T00:00:00+00:00</published>
<updated>2020-06-25T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.0.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;05&#x2F;22&#x2F;gitlab-13-0-released&#x2F;&quot;&gt;last month&#x27;s 13.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;31204&quot;&gt;Group authorization refresh to consider shared groups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33717&quot;&gt;Pass int when getting I18n VSA stage summary title&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33772&quot;&gt;Use ProxyVariableSubstitutionService for variable substitution in alerts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33841&quot;&gt;Fix relative URL root in wiki_base_path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33899&quot;&gt;Adjust wrong column reference for ResetMergeStatus (background job)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4148&quot;&gt;Fix geo timeout issue with pg-upgrade&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4346&quot;&gt;Manually disable copy_file_range() on RedHat kernels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34657&quot;&gt;Fix Auto DevOps Postgresql PVC deletion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34071&quot;&gt;Periodically recompute project authorizations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34923&quot;&gt;Load user before logging git http-requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/25/gitlab-12-10-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/25/gitlab-12-10-12-released/</id>
<published>2020-06-25T00:00:00+00:00</published>
<updated>2020-06-25T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.10.12 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;&quot;&gt;this month&#x27;s 12.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4346&quot;&gt;Manually disable copy_file_range() on RedHat kernels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4148&quot;&gt;Fix geo timeout issue with pg-upgrade&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30508&quot;&gt;Correctly count wiki pages in sidebar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.1.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/24/gitlab-13-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/24/gitlab-13-1-1-released/</id>
<published>2020-06-24T00:00:00+00:00</published>
<updated>2020-06-24T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.1.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;06&#x2F;22&#x2F;gitlab-13-1-released&#x2F;&quot;&gt;this month&#x27;s 13.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34787&quot;&gt;Bump gitlab-mail_room to 0.0.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34923&quot;&gt;Load user before logging git http-requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;35014&quot;&gt;Do not mask key comments for DeployKeys&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34668&quot;&gt;Fix templating vars set from URL in Metrics Dashboards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34071&quot;&gt;Periodically recompute project authorizations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;34775&quot;&gt;Fixes status dropdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4297&quot;&gt;Update to Grafana 7&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4346&quot;&gt;Manually disable copy_file_range() on RedHat kernels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.1 released with Alert Management and Code Quality Enhancements</title>
<release>13.1</release>
<link href='https://about.gitlab.com/releases/2020/06/22/gitlab-13-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/22/gitlab-13-1-released/</id>
<published>2020-06-22T00:00:00+00:00</published>
<updated>2020-06-22T00:00:00+00:00</updated>
<author>
<name>Farnoosh Seifoddini</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;p&gt;GitLab 13.1 is now available, bringing you &lt;strong&gt;expanded alert management&lt;&#x2F;strong&gt;, new tools to help you &lt;strong&gt;track and improve code quality&lt;&#x2F;strong&gt;, and more ways to &lt;strong&gt;keep your code secure and compliant&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;automate-and-expand-alert-management&quot;&gt;Automate and expand Alert Management&lt;&#x2F;h2&gt;

&lt;p&gt;Alerts are essential to application maintenance, but understanding and triaging the range of alerts thrown can dramatically reduce productivity and response time. GitLab’s &lt;a href=&quot;#manage-it-alerts-in-gitlab&quot;&gt;Alert Management&lt;&#x2F;a&gt; aggregates and ranks IT alerts from all of your services to simplify assessment and remediation, increasing productivity and helping you research and address critical issues right away. Key features in 13.1 include &lt;a href=&quot;#assign-gitlab-alerts-to-team-members&quot;&gt;alert assignments&lt;&#x2F;a&gt;, &lt;a href=&quot;#collaborate-on-gitlab-alerts-in-slack&quot;&gt;Slack integration&lt;&#x2F;a&gt;, and &lt;a href=&quot;#create-gitlab-to-dos-when-assigning-alerts&quot;&gt;creating GitLab To-Dos when assigning alerts&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improve-code-quality&quot;&gt;Improve code quality&lt;&#x2F;h2&gt;

&lt;p&gt;Deployment velocity only matters if you’re deploying high quality code. By &lt;a href=&quot;#run-tests-for-modified-files-first&quot;&gt;prioritizing tests on recently modified code&lt;&#x2F;a&gt;, developers can address errors immediately, without running an entire test suite. &lt;a href=&quot;#graph-code-coverage-changes-over-time-for-a-project&quot;&gt;Code coverage tracking over time&lt;&#x2F;a&gt; surfaces quality trends to developers and managers alike, and native &lt;a href=&quot;#code-intelligence&quot;&gt;code intelligence&lt;&#x2F;a&gt; boosts the speed and accuracy of code reviews by integrating reference material directly into GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enhance-and-extend-security-and-compliance&quot;&gt;Enhance and extend security and compliance&lt;&#x2F;h2&gt;

&lt;p&gt;Security matters to everyone, and we&#x27;re committed to lowering the barriers to a fully secure, compliant SDLC. That&#x27;s why we&#x27;re happy to announce that we&#x27;ve migrated &lt;a href=&quot;#rails-sast-analyzer-available-for-all&quot;&gt;Brakeman SAST scanning to Core&lt;&#x2F;a&gt;, allowing every Rails developer—at every product tier—to scan their source code for known vulnerabilities. For compliance-focused organizations, we&#x27;ve released a &lt;a href=&quot;#policy-management-for-container-network-policies&quot;&gt;policy management UI&lt;&#x2F;a&gt; for network container policies,  and we&#x27;ve enabled &lt;a href=&quot;#export-vulnerabilities-list-from-group-security-dashboards&quot;&gt;group-level vulnerability exports&lt;&#x2F;a&gt; to a CSV file for audits or further internal review. In addition, we&#x27;ve made helpful UX improvements to the Security Dashboard, adding &lt;a href=&quot;#filters-persist-on-security-dashboards&quot;&gt;persistent filters&lt;&#x2F;a&gt; and &lt;a href=&quot;#dynamic-issue-status-icons-on-security-dashboards&quot;&gt;issue status icons&lt;&#x2F;a&gt; to help maintain context as you work within the tool.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;These are just a few of the highlights in 13.1. For this release, we also achieved a new milestone in terms of community contribution. For the first time, 
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;-&#x2F;insights&#x2F;#&#x2F;communityContributions&quot;&gt;more than 300 MRs from the wider community&lt;&#x2F;a&gt; were merged during the release period, and we 
appreciate everyone&#x27;s contributions! Read on to learn more about other fantastic productivity improvements, such as &lt;a href=&quot;#accessibility-testing-merge-request-widget&quot;&gt;Accessibility Testing MR Widgets&lt;&#x2F;a&gt;, 
&lt;a href=&quot;#mark-any-design-thread-as-resolved&quot;&gt;Design Thread Resolutions&lt;&#x2F;a&gt;, &lt;a href=&quot;#pipeline-success-after-failure-notification&quot;&gt;Pipeline Success Notifications&lt;&#x2F;a&gt;, and more!&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;d like to preview what&#x27;s coming in the &lt;em&gt;next&lt;&#x2F;em&gt; release, be sure to check out our &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=AYR3sl8c-co&quot;&gt;13.2 kickoff video&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_1&#x2F;13-1-cover-image-alt.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Critical Security Release: 13.0.6, 12.10.11, 12.9.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/10/critical-security-release-13-0-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/10/critical-security-release-13-0-6-released/</id>
<published>2020-06-10T00:00:00+00:00</published>
<updated>2020-06-10T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.0.6, 12.10.11, 12.9.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards.  As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-token-access-control&quot;&gt;CI Token Access Control&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue discovered in the mirroring logic allowed read access to private repositories. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13277&quot;&gt;CVE-2020-13277&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;u3mur4&quot;&gt;@u3mur4&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/04/gitlab-12-10-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/04/gitlab-12-10-10-released/</id>
<published>2020-06-04T00:00:00+00:00</published>
<updated>2020-06-04T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.10.10 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;&quot;&gt;last month&#x27;s 12.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33440&quot;&gt;Fix close issue when user created the issue&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;-&#x2F;merge_requests&#x2F;508&quot;&gt;Disable compression for open archive&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;-&#x2F;merge_requests&#x2F;496&quot;&gt;Fix Content-Length set prior to SendUrl injection&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/04/gitlab-13-0-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/04/gitlab-13-0-5-released/</id>
<published>2020-06-04T00:00:00+00:00</published>
<updated>2020-06-04T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 13.0.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;05&#x2F;22&#x2F;gitlab-13-0-released&#x2F;&quot;&gt;this month&#x27;s 13.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33260&quot;&gt;Fix NoMethodError when reporting exceptions to Sentry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33497&quot;&gt;Fix ambiguous string concatenation on CleanupProjectsWithMissingNamespace&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33647&quot;&gt;Fix multiple issue creation for Generic Alerts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33375&quot;&gt;Fix bug in snippets updating only file_name or content&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;-&#x2F;merge_requests&#x2F;508&quot;&gt;Disable compression for open archive&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;-&#x2F;merge_requests&#x2F;496&quot;&gt;Fix Content-Length set prior to SendUrl injection&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Critical Security Release: 13.0.4, 12.10.9, 12.9.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/06/03/critical-security-release-13-0-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/06/03/critical-security-release-13-0-4-released/</id>
<published>2020-06-03T00:00:00+00:00</published>
<updated>2020-06-03T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.0.4, 12.10.9, 12.9.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards.  As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to  the latest security release for their supported version. You can read more &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-token-access-control&quot;&gt;CI Token Access Control&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue discovered in the CI jobs token handling allowed read access to public projects with restricted repositories. This issue is now mitigated in the latest release and is waiting for a CVE ID to be assigned.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;u3mur4&quot;&gt;@u3mur4&lt;&#x2F;a&gt; and @enumzero for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.6+ and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/05/29/gitlab-12-10-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/29/gitlab-12-10-8-released/</id>
<published>2020-05-29T00:00:00+00:00</published>
<updated>2020-05-29T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.10.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;&quot;&gt;last month&#x27;s 12.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32703&quot;&gt;Resolve &quot;Geo: Design thumbnails are not replicated&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32741&quot;&gt;Fix 404s downloading latest build artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4227&quot;&gt;Fix dbvacuum on pgupgrade&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30710&quot;&gt;Geo: Fix empty synchronisation status when nothing is synchronised&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 13.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/05/29/gitlab-13-0-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/29/gitlab-13-0-3-released/</id>
<published>2020-05-29T00:00:00+00:00</published>
<updated>2020-05-29T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 13.0.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;05&#x2F;22&#x2F;gitlab-13-0-released&#x2F;&quot;&gt;this month&#x27;s 13.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32088&quot;&gt;Suggestion to add more details to DAST_EXCLUDE_RULES variable.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32353&quot;&gt;Add support for including user&#x2F;groups from parent&#x2F;ancestors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32530&quot;&gt;Fixed redirection to project snippets&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32703&quot;&gt;Resolve &quot;Geo: Design thumbnails are not replicated&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32741&quot;&gt;Fix 404s downloading latest build artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32923&quot;&gt;Update deprecated routes in irker integration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32865&quot;&gt;Fix Auto DevOps manual rollout jobs not being allowed to fail&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33062&quot;&gt;Change format of variables parameter in Prometheus proxy API for metrics dashboard&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4239&quot;&gt;Update Ruby to 2.6.6&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4241&quot;&gt;Update Praefect Grafana dashboards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4251&quot;&gt;Fix warning message in nginx&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4264&quot;&gt;Do not run Grafana reset during docker startup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33235&quot;&gt;Fix API performance regression in issues API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33294&quot;&gt;Fix &quot;Close Issue&quot; button by changing target selector&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;33310&quot;&gt;Confirm protected branch before running checks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 13.0.1, 12.10.7, 12.9.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/05/27/security-release-13-0-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/27/security-release-13-0-1-released/</id>
<published>2020-05-27T00:00:00+00:00</published>
<updated>2020-05-27T00:00:00+00:00</updated>
<author>
<name>Juan Broullon</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 13.0.1, 12.10.7, 12.9.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab releases patches for vulnerabilities in dedicated security releases. There are &lt;a href=&quot;&#x2F;security&#x2F;#gitlab-security-releases&quot;&gt;two types of security releases&lt;&#x2F;a&gt;: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. You can see all of our regular and security release blog posts &lt;a href=&quot;&#x2F;releases&#x2F;categories&#x2F;releases&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;. In addition, the issues detailing each vulnerability are made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; 30 days after the release in which they were patched.&lt;&#x2F;p&gt;

&lt;p&gt;We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards.  As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to at least the latest security release for their supported version. You can read more &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;gitlab-instance-security-best-practices&#x2F;&quot;&gt;best practices in securing your GitLab instance&lt;&#x2F;a&gt; in our blog post.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-email-verification-bypass&quot;&gt;User Email Verification Bypass&lt;&#x2F;h2&gt;
&lt;p&gt;A security issue allowed users to bypass the email verification process. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13265&quot;&gt;CVE-2020-13265&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;zapprising&quot;&gt;@zapprising&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;oauth-flow-missing-email-verification-checks&quot;&gt;OAuth Flow Missing Email Verification Checks&lt;&#x2F;h2&gt;
&lt;p&gt;A vulnerability allowed unverified users to use OAuth authorization code flow, which could potentially affect third party applications that use GitLab as an identity provider. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13272&quot;&gt;CVE-2020-13272&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;peet86&quot;&gt;@peet86&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.3+ and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;notification-email-verification-bypass&quot;&gt;Notification Email Verification Bypass&lt;&#x2F;h2&gt;
&lt;p&gt;A vulnerability was identified that allowed users to set an unverified email address as notification email. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13276&quot;&gt;CVE-2020-13276&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rgupt&quot;&gt;@rgupt&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;server-side-request-forgery-in-grafana&quot;&gt;Server-Side Request Forgery in Grafana&lt;&#x2F;h2&gt;
&lt;p&gt;A vulnerability in Grafana allowed unauthenticated users to send HTTP requests to internal network resources and read their responses. Further details are available  &lt;a href=&quot;https:&#x2F;&#x2F;grafana.com&#x2F;blog&#x2F;2020&#x2F;06&#x2F;03&#x2F;grafana-6.7.4-and-7.0.2-released-with-important-security-fix&#x2F;&quot;&gt;on the Grafana blog&lt;&#x2F;a&gt;. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13379&quot;&gt;CVE-2020-13379&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rhynorater&quot;&gt;@rhynorater&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;nnwakelam&quot;&gt;@nnwakelam&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 11.9 and later&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-sign-up-restriction-bypass&quot;&gt;Group Sign-Up Restriction Bypass&lt;&#x2F;h2&gt;
&lt;p&gt;A user with an unverified address within the restricted domain could request access to domain restricted groups. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13275&quot;&gt;CVE-2020-13275&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;izzsec&quot;&gt;@izzsec&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 12.2 and later&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mirror-project-owner-impersonation&quot;&gt;Mirror Project Owner Impersonation&lt;&#x2F;h2&gt;
&lt;p&gt;A security issue related to mirror project deletions could lead to the impersonation of its owner. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13263&quot;&gt;CVE-2020-13263&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please note that the edit project API endpoint has been restricted and only admin users have the ability to set the &lt;code&gt;mirror_user_id&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sky003&quot;&gt;@sky003&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 9.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-permission-check-on-fork-relation-creation&quot;&gt;Missing Permission Check on Fork Relation Creation&lt;&#x2F;h2&gt;
&lt;p&gt;A missing security check allowed guest users to create a fork relation on restricted public projects. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13270&quot;&gt;CVE-2020-13270&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-in-repository-files-api&quot;&gt;Cross-Site Scripting in Repository Files API&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain conditions, requests involving the repository files API could result in an XSS vulnerability. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13271&quot;&gt;CVE-2020-13271&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;kubernetes-cluster-token-disclosure&quot;&gt;Kubernetes Cluster Token Disclosure&lt;&#x2F;h2&gt;
&lt;p&gt;A security issue made the Kubernetes cluster token visible to other group maintainers. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13264&quot;&gt;CVE-2020-13264&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE between 10.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;object-storage-file-enumeration&quot;&gt;Object Storage File Enumeration&lt;&#x2F;h2&gt;
&lt;p&gt;A specially crafted request could be used to confirm the existence of files hosted on object storage services, without disclosing their contents. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13268&quot;&gt;CVE-2020-13268&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ledz1996&quot;&gt;@ledz1996&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-authorization-check-on-project-deploy-keys&quot;&gt;Insecure Authorization Check on Project Deploy Keys&lt;&#x2F;h2&gt;
&lt;p&gt;An insecure authorization check allowed updating permissions of other users&#x27; deploy keys under certain conditions. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13266&quot;&gt;CVE-2020-13266&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab Security Team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-on-metrics-dashboard&quot;&gt;Cross-Site Scripting on Metrics Dashboard&lt;&#x2F;h2&gt;
&lt;p&gt;A Stored Cross-Site Scripting vulnerability allowed the execution on Javascript payloads on the Metrics Dashboard. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13267&quot;&gt;CVE-2020-13267&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-on-custom-dashboards&quot;&gt;Denial of Service on Custom Dashboards&lt;&#x2F;h2&gt;
&lt;p&gt;A security issue enabled denial of service attacks via memory exhaustion. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13273&quot;&gt;CVE-2020-13273&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was discovered internally by the GitLab team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;client-side-code-injection-through-mermaid-markup&quot;&gt;Client-Side Code Injection through Mermaid Markup&lt;&#x2F;h2&gt;
&lt;p&gt;A specially crafted Mermaid payload allowed performing PUT requests on behalf of other users when clicking on a link. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13262&quot;&gt;CVE-2020-13262&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yvvdwf&quot;&gt;@yvvdwf&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-on-static-site-editor&quot;&gt;Cross-Site Scripting on Static Site Editor&lt;&#x2F;h2&gt;
&lt;p&gt;A Reflected Cross-Site Scripting has been discovered on the Static Site Editor. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13269&quot;&gt;CVE-2020-13269&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bull&quot;&gt;@bull&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-amazon-eks-credentials&quot;&gt;Disclosure of Amazon EKS Credentials&lt;&#x2F;h2&gt;
&lt;p&gt;Amazon EKS Credentials were disclosed to other administrators of an instance through HTML source code. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13261&quot;&gt;CVE-2020-13261&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-on-workhorse&quot;&gt;Denial of Service on Workhorse&lt;&#x2F;h2&gt;
&lt;p&gt;A security issue allowed achieving Denial of Service attacks through memory exhaustion by uploading malicious artifacts. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-13274&quot;&gt;CVE-2020-13274&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been discovered internally by the GitLab Team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-ruby&quot;&gt;Update Ruby&lt;&#x2F;h2&gt;
&lt;p&gt;Ruby upgrades to version 2.6.6 have been backported to previous versions of GitLab. This upgrade includes security fixes for &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-8130&quot;&gt;CVE-2020-8130&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 13.0 released with Gitaly Clusters, Epic Hierarchy on Roadmaps, and Auto Deploy to ECS</title>
<release>13.0</release>
<link href='https://about.gitlab.com/releases/2020/05/22/gitlab-13-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/22/gitlab-13-0-released/</id>
<published>2020-05-22T00:00:00+00:00</published>
<updated>2020-05-22T00:00:00+00:00</updated>
<author>
<name>Farnoosh Seifoddini</name>
</author>
<content type='html'>&lt;!--
This is the release blog post file. Add here the introduction only.
All remaining content goes into data&#x2F;release-posts&#x2F;.

**Use the merge request template &quot;Release-Post&quot;, and please set the calendar due
date for each stage (general contributions, review).**

Read through the Release Posts Handbook for more information:
https:&#x2F;&#x2F;about.gitlab.com&#x2F;handbook&#x2F;marketing&#x2F;blog&#x2F;release-posts&#x2F;#introduction
--&gt;

&lt;h2 id=&quot;progress-since-gitlab-120&quot;&gt;Progress since GitLab 12.0&lt;&#x2F;h2&gt;

&lt;p&gt;At this milestone release of 13.0, we’d like to take a moment to reflect. We’ve accomplished so much since our 12.0 release! We&#x27;ve put together a &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;05&#x2F;21&#x2F;version-12-year-in-review&#x2F;&quot;&gt;blog to recap GitLab 12.0 to 12.10&lt;&#x2F;a&gt;. Three favorites from version 12 releases include: &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;#create-and-view-requirements-in-gitlab&quot;&gt;Requirements Management&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;govern&#x2F;&quot;&gt;Container Network Security&lt;&#x2F;a&gt;, and &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2020&#x2F;01&#x2F;22&#x2F;gitlab-12-7-released&#x2F;#parent-child-pipelines&quot;&gt;Parent-child pipelines&lt;&#x2F;a&gt;. In addition to product enhancements, we&#x27;ve embraced &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;press&#x2F;releases&#x2F;2020-04-21-gitLab-ramps-up-channel-and-partner-investment-with-launch-of-a-new-global-partner-program.html&quot;&gt;partnerships&#x2F;integrations&lt;&#x2F;a&gt;, adding &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;development&#x2F;integrations&#x2F;secure.html&quot;&gt;integration guidelines&lt;&#x2F;a&gt; for third-party security scanners, and have grown our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;services&#x2F;catalog&#x2F;&quot;&gt;professional services&lt;&#x2F;a&gt; to help you with things like Jira and Jenkins migrations. Our new channel, &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;playlist?list=PLFGfElNsQthYDx0A_FaNNfUm9NHsK6zED&quot;&gt;Learn@GitLab&lt;&#x2F;a&gt; makes it easy to find many new how-to videos such as &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=e0iQD1qgxZg&amp;amp;list=PLFGfElNsQthYDx0A_FaNNfUm9NHsK6zED&amp;amp;index=10&amp;amp;t=0s&quot;&gt;Getting started with CI&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;iteration-is-the-key-to-resilience&quot;&gt;Iteration is the key to resilience&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab is enabling IT and business teams to adapt, respond, and thrive. &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;02&#x2F;04&#x2F;power-of-iteration&#x2F;&quot;&gt;Iteration&lt;&#x2F;a&gt; is the key. To do so you must collaborate rapidly, optimize for efficiency, and automate processes to handle security and compliance while you focus on delivering business value. GitLab 13.0 can help you iterate quickly and with greater insight. At the same time, access to Git repositories is critical, and we have enhanced our &lt;a href=&quot;#gitaly-cluster-for-high-availability-git-storage&quot;&gt;Gitaly cluster for high availability Git storage&lt;&#x2F;a&gt; to ensure there are always multiple warm replicas ready to take over if an outage occurs.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;rapidly-collaborate-and-respond-across-the-entire-team&quot;&gt;Rapidly collaborate and respond across the entire team&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab builds upon capabilities that help with &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=OFNUjvgm2_4&quot;&gt;collaborative development&lt;&#x2F;a&gt;, reporting, organizing, and managing work. Version control is foundational to collaboration and, with 13.0, we have added &lt;a href=&quot;#versioned-snippets&quot;&gt;version control for snippets&lt;&#x2F;a&gt;. To manage more complex projects, 13.0 allows you to &lt;a href=&quot;#view-epic-hierarchy-on-a-roadmap&quot;&gt;view the epic hierarchy on your roadmap&lt;&#x2F;a&gt;, &lt;a href=&quot;#view-milestones-on-the-roadmap&quot;&gt;view how your epics line up with your various milestones&lt;&#x2F;a&gt;, and &lt;a href=&quot;#update-releases-milestone-in-web-ui&quot;&gt;add a single or multiple milestones to your releases&lt;&#x2F;a&gt; while &lt;a href=&quot;#raise-warning-when-closing-an-issue-with-open-blockers&quot;&gt;alerts upon closing an issue with open blockers&lt;&#x2F;a&gt; help you focus on critical path items.&lt;&#x2F;p&gt;

&lt;p&gt;Designers are an important part of the development team. While working on one of the most popular new features, the &lt;a href=&quot;#dark-theme-in-the-web-ide&quot;&gt;dark themed web IDE&lt;&#x2F;a&gt;, we &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;05&#x2F;20&#x2F;creating-a-dark-ui-for-gitlabs-web-ide&#x2F;index.html&quot;&gt;learned how&lt;&#x2F;a&gt; to pull designers in to collaborate more closely. At the same time, we moved &lt;a href=&quot;#design-management-moved-to-core&quot;&gt;Design Management to core&lt;&#x2F;a&gt; recognizing users who are designing products as individual contributors.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;optimize-for-efficiency&quot;&gt;Optimize for efficiency&lt;&#x2F;h3&gt;

&lt;p&gt;As many businesses strive to be more responsive and efficient, GitLab helps streamline existing software development processes. New features aimed at efficiency include things like &lt;a href=&quot;#auto-deploy-to-ecs&quot;&gt;simplified deployment to Amazon ECS&lt;&#x2F;a&gt; and a new consolidated &lt;a href=&quot;#aggregate-it-alerts-from-external-tools-in-gitlab&quot;&gt;list of alerts&lt;&#x2F;a&gt; that provides a single interface aggregating IT alerts originating from multiple sources. In addition, Terraform users will rejoice. GitLab 13.0 lets you &lt;a href=&quot;#review-summary-of-terraform-plan-in-merge-requests&quot;&gt;review the summary of &lt;code&gt;terraform plan&lt;&#x2F;code&gt; in Merge Requests&lt;&#x2F;a&gt; and &lt;a href=&quot;#gitlab-http-terraform-state-backend&quot;&gt;use GitLab as an HTTP Terraform state backend&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;trust-your-processes-and-dont-sacrifice-security-or-compliance&quot;&gt;Trust your processes and don’t sacrifice security or compliance&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab helps businesses embrace security and compliance controls end-to-end in the software development lifecycle, reducing risk and freeing up resources to focus on business critical needs. Our Application Security Testing capabilities help you &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=UgCHtr-6uG8&amp;amp;list=PLFGfElNsQthYDx0A_FaNNfUm9NHsK6zED&amp;amp;index=2&amp;amp;t=0s&quot;&gt;find and fix security vulnerabilities earlier&lt;&#x2F;a&gt; and for these, GitLab was just named as a &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;resources-report-gartner-magic-quadrant-ast.html&quot;&gt;Niche Player&lt;&#x2F;a&gt; in the 2020 Gartner Magic Quadrant for Application Security Testing. Since Gartner&#x27;s evaluation of 12.4, we have added many new features. In 13.0 alone we&#x27;ve added the ability to &lt;a href=&quot;#rest-api-support-for-dast-scans&quot;&gt;scan REST APIs via DAST&lt;&#x2F;a&gt; and a &lt;a href=&quot;#secret-detection-for-the-full-history-of-a-repository&quot;&gt;full commit history scan for secrets&lt;&#x2F;a&gt; for even greater detection. More importantly, we have rearchitected the way we handle &lt;a href=&quot;#standalone-vulnerability-objects&quot;&gt;vulnerability objects&lt;&#x2F;a&gt;. This enabled the ability to &lt;a href=&quot;#export-vulnerabilities-list-from-project-security-dashboard&quot;&gt;export vulnerabilities from the security dashboard&lt;&#x2F;a&gt; and will unlock many more robust &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;govern&#x2F;threat_insights&#x2F;vulnerability_management&#x2F;&quot;&gt;Vulnerability Management&lt;&#x2F;a&gt; capabilities in the future.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to security scanning, GitLab automates policies and, with 13.0, provides more granular control with new features such as setting a &lt;a href=&quot;#implement-a-deployment-freeze-with-the-freeze-period-api&quot;&gt;deployment freeze with the Freeze Period API&lt;&#x2F;a&gt; to easily prevent an unintended production release during a specified period of time. To simplify audits, you can now &lt;a href=&quot;#filtered-search-for-instance-level-audit-events&quot;&gt;filter search for instance-level audit events&lt;&#x2F;a&gt; as part of a the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;-&#x2F;epics&#x2F;3179&quot;&gt;larger epic&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;looking-ahead&quot;&gt;Looking ahead&lt;&#x2F;h2&gt;

&lt;p&gt;We are excited about our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;upcoming-releases&#x2F;&quot;&gt;upcoming releases&lt;&#x2F;a&gt;, particularly features that will help you:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;Establish a &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;dev&#x2F;#enterprise-compliance&quot;&gt;compliance framework&lt;&#x2F;a&gt; and automatically adopt associated controls and reporting&lt;&#x2F;li&gt;
  &lt;li&gt;Iterate with better insight with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;-&#x2F;epics&#x2F;2966&quot;&gt;A&#x2F;B testing&lt;&#x2F;a&gt; and control via several Feature Flag enhancements (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;35558&quot;&gt;filter feature flags by status&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;34813&quot;&gt;A&#x2F;B testing based on feature flags&lt;&#x2F;a&gt;, and the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;33394&quot;&gt;ability to create feature flag from merge request&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Identify bottlenecks and waste by visually depicting &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;210315&quot;&gt;Value Stream Analytics stages as a flow&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;214729&quot;&gt;Manage policies&lt;&#x2F;a&gt; and let GitLab automate their use, including things like an &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;216074&quot;&gt;out-of-the-box Container Network Policy set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Work within an ecosystem to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;33906&quot;&gt;fuzz test&lt;&#x2F;a&gt; application APIs, and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;28321&quot;&gt;read Vault CI variables&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Want to see the complete list of what’s coming out NEXT month? Our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;upcoming-releases&#x2F;&quot;&gt;roadmap&lt;&#x2F;a&gt; is transparent and always available for you to contribute!&lt;&#x2F;p&gt;

&lt;p&gt;Now, without further ado, check out more fabulous updates in 13.0 below!&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;13_0&#x2F;13-0-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/05/15/gitlab-12-10-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/15/gitlab-12-10-6-released/</id>
<published>2020-05-15T00:00:00+00:00</published>
<updated>2020-05-15T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.10.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;&quot;&gt;this month&#x27;s 12.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;31043&quot;&gt;Remove index by name on ci_pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;31190&quot;&gt;Extract pages_domain_presenter into a helper fixing related bugs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;31252&quot;&gt;GraphQL: ExternallyPaginatedArrayConnection can return incorrect number of items&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;31623&quot;&gt;Update Epics badge in Issues doc&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;32271&quot;&gt;Fix incorrect regex used in FileUploader#extract_dynamic_path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4116&quot;&gt;Fix tracking db revert from pg-upgrade&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4136&quot;&gt;Ignore the PG_VERSION value if database is not enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4154&quot;&gt;Do not set a default value for client side database statement timeout&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4189&quot;&gt;Raise using the proper error format&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4209&quot;&gt;Ensure we only print the postgres upgrade message when pg is enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;31631&quot;&gt;Add instance column to services table if it&#x27;s missing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.5 and 12.9.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/05/13/gitlab-12-10-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/13/gitlab-12-10-5-released/</id>
<published>2020-05-13T00:00:00+00:00</published>
<updated>2020-05-13T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.10.5 and 12.9.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;With the release of GitLab
&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;releases&#x2F;2020&#x2F;04&#x2F;30&#x2F;security-release-12-10-2-released&#x2F;&quot;&gt;12.10.2 and 12.9.5&lt;&#x2F;a&gt;
we fixed a security issue that allowed code owner validations to be bypassed if
a change was pushed through the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;web_ide&#x2F;&quot;&gt;Web IDE&lt;&#x2F;a&gt;
and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;web_editor.html&quot;&gt;File Editor&lt;&#x2F;a&gt;
web interfaces. However, we were notified by customers that fixing that bug
broke a legitimate workflow that was unintentionally made possible by the bug.&lt;&#x2F;p&gt;

&lt;p&gt;To accommodate customers that depended on code owners not explicitly being a
member of the project, such as being in the project&#x27;s parent group or added as
a shared group to the project (see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;32432&quot;&gt;this issue&lt;&#x2F;a&gt;
for the ongoing development), we are adding the &lt;code&gt;skip_web_ui_code_owner_validations&lt;&#x2F;code&gt; feature
flag:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;em&gt;Disable the flag&lt;&#x2F;em&gt; to fix the security issue and apply code owner validations
for changes done through the web interface. This is the default behavior.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; this could break your approval workflow if it relies on code owners
being in the parent group of a project without being in the project itself,
even for changes that are pushed through the &lt;code&gt;git&lt;&#x2F;code&gt; command-line interface.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;em&gt;Enable the flag&lt;&#x2F;em&gt; to allow code owners to be in a parent group without being
in the project explicitly. In this state however, changes pushed through the
Web IDE or File Editor web interfaces will not require code owner validation.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; while the code owner approval requirements can be bypassed, the
author of the merge request does not gain the ability to merge the request if
they weren’t already a maintainer. This does not also grant the ability for
the author of code changes to push their changes using the Web IDE or File
Editor if they did not already have permissions to do so. You may want to
review your project member permissions and protected branch settings to
mitigate any security or compliance issues that may result from enabling this
feature flag.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/05/04/gitlab-12-10-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/05/04/gitlab-12-10-3-released/</id>
<published>2020-05-04T00:00:00+00:00</published>
<updated>2020-05-04T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.10.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;&quot;&gt;this month&#x27;s 12.10 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30812&quot;&gt;Disable schema dumping after migrations in production&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30702&quot;&gt;Fix a CI failure where no jobs can be requested by and assigned to runners based on certain instance settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30696&quot;&gt;Escape branch name on backend&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30442&quot;&gt;Add LFS badge feature flag to RefsController#logs_tree&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30414&quot;&gt;Fix second 500 error with NULL restricted visibility levels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30412&quot;&gt;Fix incorrect commits number in commits list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30340&quot;&gt;Fix errors creating project with active Prometheus service template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30304&quot;&gt;Enable expiring license banner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30269&quot;&gt;Fix CaptureDiffNotePositionService when position is nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30223&quot;&gt;Fix terraform state init failure&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29184&quot;&gt;Move deploy keys section back to repository settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30687&#x2F;diffs&quot;&gt;Update pagination and limits documentation for projects API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30647&quot;&gt;Fixes the file row not showing commits for certain projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;important-notes-on-upgrading&quot;&gt;Important notes on upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.10.2, 12.9.5, 12.8.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/04/30/security-release-12-10-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/04/30/security-release-12-10-2-released/</id>
<published>2020-04-30T00:00:00+00:00</published>
<updated>2020-04-30T00:00:00+00:00</updated>
<author>
<name>Dominic Couture</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.10.2, 12.9.5, 12.8.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-in-nuget-package-registry&quot;&gt;Path Traversal in NuGet Package Registry&lt;&#x2F;h2&gt;
&lt;p&gt;It was possible to use a malicious NuGet package to read any &lt;code&gt;*.nupkg&lt;&#x2F;code&gt; file on the system. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12448&quot;&gt;CVE-2020-12448&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;saltyyolk&quot;&gt;@saltyyolk of Chaitin Tech&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;workhorse-bypass-leads-to-file-disclosure&quot;&gt;Workhorse Bypass Leads to File Disclosure&lt;&#x2F;h2&gt;
&lt;p&gt;A specially crafted request could bypass the GitLab Workhorse and read files in certain specific paths on the server. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12448&quot;&gt;CVE-2020-12448&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 11.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;oauth-application-client-secrets-revealed&quot;&gt;OAuth Application Client Secrets Revealed&lt;&#x2F;h2&gt;
&lt;p&gt;A vulnerability allowed any user to retrieve OAuth application client secrets after authorizing. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10187&quot;&gt;CVE-2020-10187&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;stefansundin&quot;&gt;@stefansundin&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 12.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible. Additionally, the OAuth client secrets should be rotated if your HTTP logs show that the &lt;code&gt;&#x2F;oauth&#x2F;authorized_applications.json&lt;&#x2F;code&gt; path has been accessed.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;code-owners-approval-rules-are-not-updated-for-existing-merge-requests-when-source-branch-changes&quot;&gt;Code Owners Approval Rules Are Not Updated for Existing Merge Requests When Source Branch Changes&lt;&#x2F;h2&gt;
&lt;p&gt;It was possible to bypass code owners approval by committing changes in a specific order. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12449&quot;&gt;CVE-2020-12449&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;nathanielwyliet&quot;&gt;@nathanielwyliet&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;code-owners-protection-not-enforced-from-web-ui&quot;&gt;Code Owners Protection Not Enforced from Web UI&lt;&#x2F;h2&gt;
&lt;p&gt;It was possible to bypass code owners approval by committing changes through the web interface. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12451&quot;&gt;CVE-2020-12451&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;zane.wright&quot;&gt;@zane.wright&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-mirror-passwords-exposed-to-maintainers&quot;&gt;Repository Mirror Passwords Exposed To Maintainers&lt;&#x2F;h2&gt;
&lt;p&gt;When a maintainer deleted a repository mirror, the HTTP response contained the passwords set for the other mirrors on the same repository. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12450&quot;&gt;CVE-2020-12450&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 11.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;admin-audit-log-page-denial-of-service&quot;&gt;Admin Audit Log Page Denial of Service&lt;&#x2F;h2&gt;
&lt;p&gt;A specific API call could make the admin audit log page inaccessible. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12452&quot;&gt;CVE-2020-12452&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 12.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-id-revealed-through-group-api&quot;&gt;Private Project ID Revealed Through Group API&lt;&#x2F;h2&gt;
&lt;p&gt;If a public group contained a private project that was used as a template, its ID was revealed in the group API. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12453&quot;&gt;CVE-2020-12453&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 11.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;elasticsearch-credentials-logged-to-elk&quot;&gt;Elasticsearch Credentials Logged to ELK&lt;&#x2F;h2&gt;
&lt;p&gt;The data logged in ELK after modifying the Elasticsearch integration through the admin setting page contained credentials. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12454&quot;&gt;CVE-2020-12454&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 8.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-personal-access-token-exposed-on-integrations-page&quot;&gt;GitHub Personal Access Token Exposed on Integrations Page&lt;&#x2F;h2&gt;
&lt;p&gt;The GitHub Personal Access Token field was not masked on the integration settings page. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12455&quot;&gt;CVE-2020-12455&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;kylifornication&quot;&gt;@kylifornication&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-nokogiri-dependency-in-gitaly&quot;&gt;Update Nokogiri dependency in Gitaly&lt;&#x2F;h2&gt;
&lt;p&gt;The Nokogiri dependency has been upgraded to 1.10.9 in Gitaly. This upgrade includes a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7595&quot;&gt;CVE-2020-7595&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl-dependency&quot;&gt;Update OpenSSL Dependency&lt;&#x2F;h2&gt;
&lt;p&gt;The OpenSSL dependency has been upgraded from 1.1.1f to 1.1.1g. This upgrade includes a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;secadv&#x2F;20200421.txt&quot;&gt;CVE-2020-1967&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab Omnibus 12.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-git&quot;&gt;Update git&lt;&#x2F;h2&gt;
&lt;p&gt;git has been updated to version 2.24.3. This upgrade includes a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;lore.kernel.org&#x2F;git&#x2F;xmqq4kterq5s.fsf@gitster.c.googlers.com&#x2F;&quot;&gt;CVE-2020-11008&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.10.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/04/24/gitlab-12-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/04/24/gitlab-12-10-1-released/</id>
<published>2020-04-24T00:00:00+00:00</published>
<updated>2020-04-24T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.10.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;04&#x2F;22&#x2F;gitlab-12-10-released&#x2F;&quot;&gt;this month&#x27;s 12.10
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29290&quot;&gt;Move Group Deploy Tokens to new Group-scoped Repository settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29280&quot;&gt;Move project deploy tokens section back to repository settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29711&quot;&gt;Migrate dismissals to vulnerabilities&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29714&quot;&gt;Fix requirements permission documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29738&quot;&gt;Add feature flag for merge_ref_head&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29771&quot;&gt;Fix bug creating project from git push through ssh&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29783&quot;&gt;Fix Web IDE deleting newly added files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29936&quot;&gt;Fix Service Templates missing Active toggle&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30027&quot;&gt;Fix merge requests stuck in checking state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29886&quot;&gt;Fix null dereference in project_import_status&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;30313&quot;&gt;Fix 500 error accessing restricted visibility levels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4118&quot;&gt;Ensure the pg bin files fallback for geo-postgresql&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4138&quot;&gt;Prevent gitlab upgrades from GitLab 11.x&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4146&quot;&gt;Fixes Omnibus package HA pg-upgrade scenario&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4054&quot;&gt;Print a deprecation notice for postgres upgrades if &amp;lt;11&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes one post-deploy migration, but should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.10 released with Requirements Management and   Autoscaling CI on AWS Fargate</title>
<release>12.10</release>
<link href='https://about.gitlab.com/releases/2020/04/22/gitlab-12-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/04/22/gitlab-12-10-released/</id>
<published>2020-04-22T00:00:00+00:00</published>
<updated>2020-04-22T00:00:00+00:00</updated>
<author>
<name>Farnoosh Seifoddini</name>
</author>
<content type='html'>&lt;p&gt;GitLab 12.10 now helps teams &lt;strong&gt;streamline and improve compliance&lt;&#x2F;strong&gt; with requirements management, &lt;strong&gt;reduce cycle time and accelerate software delivery&lt;&#x2F;strong&gt; with CI with auto-scaling on AWS Fargate, and &lt;strong&gt;more efficiently manage a portfolio&lt;&#x2F;strong&gt; of projects with issue and epic health status.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header-h3&quot; id=&quot;compliance-is-easier&quot;&gt;Compliance is easier&lt;&#x2F;h2&gt;

&lt;p&gt;Compliance is a common challenge in most large organizations, where teams and projects need to demonstrate they followed the organization’s processes and procedures, and delivered what was actually &quot;required&quot;. &lt;em&gt;Did the project actually address the business requirements&lt;&#x2F;em&gt; is a common question, and with 12.10, we’re starting to deliver &lt;a href=&quot;#create-and-view-requirements-in-gitlab&quot;&gt;&lt;strong&gt;requirements management&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; as a distinct category in GitLab to help teams define, track, and manage business requirements. Also, demonstrating project and release compliance just got a little easier in GitLab 12.10, as there&#x27;s no longer a need to use scripts to compare &lt;a href=&quot;#compare-release-evidence-over-time&quot;&gt;&lt;strong&gt;release evidence over time&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;, helping teams document and prove that the project is in &quot;compliance&quot;.
The new project &lt;a href=&quot;#compliance-framework-labels-for-projects&quot;&gt;&lt;strong&gt;compliance framework label&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; makes it easy for organizations to indicate that a specific project is required to comply with specific compliance frameworks.
Speaking of compliance frameworks, to help projects that are subject to HIPAA audits and compliance, the new &lt;a href=&quot;#new-hipaa-audit-protocol-project-template&quot;&gt;&lt;strong&gt;HIPAA audit protocol project template&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; gives them a head start.
It&#x27;s also easier to protect your secrets with improved &lt;a href=&quot;#retrieve-cicd-secrets-from-hashicorp-vault&quot;&gt;&lt;strong&gt;HashiCorp Vault Integration&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;, which helps keep your projects compliant with your security policies.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;reduce-cycle-time-and-accelerate-delivery-on-aws&quot;&gt;Reduce Cycle Time and Accelerate Delivery on AWS&lt;&#x2F;h2&gt;

&lt;p&gt;The last thing you need is another bottleneck that potentially slows down delivery and that’s why we’ve supported autoscaling GitLab CI runners for a very, very long time. In GitLab 12.10, we’re extending our autoscaling ability on AWS Fargate to &lt;a href=&quot;#autoscaling-gitlab-ci-jobs-on-aws-fargate&quot;&gt;&lt;strong&gt;auto-scale runners&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; so pipelines can efficiently scale to meet demand. Speaking of AWS, it&#x27;s now faster and easier to configure your application to deploy to AWS with &lt;a href=&quot;#easy-to-configure-aws-deployment-variables&quot;&gt;&lt;strong&gt;predefined AWS deployment variables&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;, where GitLab has added AWS deployment variables and also helps with format validation.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;efficiently-manage-projects&quot;&gt;Efficiently manage projects&lt;&#x2F;h2&gt;

&lt;p&gt;Managing multiple projects and associated issues can be hard to juggle. With all the information there is to track, it&#x27;s hard to know where there might be problems. Now in GitLab 12.10, it’s easy for teams to track and share the &lt;a href=&quot;#epic-and-issue-health-tracking&quot;&gt;&lt;strong&gt;health status&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; of issues so that it’s simple to visualize the overall health of the epic. Additionally, we’re making it easier to &lt;a href=&quot;#import-issues-from-jira-to-gitlab&quot;&gt;&lt;strong&gt;import issues from Jira&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; into GitLab so that teams can spend less time switching between tools and more time focused on building great software.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-much-more&quot;&gt;And much much more!&lt;&#x2F;h3&gt;

&lt;p&gt;There’s never enough space to highlight all the great features in our releases. Here’s a few other cool features that you should check out: &lt;a href=&quot;#build-publish-and-share-python-packages-to-the-gitlab-pypi-repository&quot;&gt;Python PyPI repository&lt;&#x2F;a&gt; and &lt;a href=&quot;#view-issue-and-mr-feed-by-newest-activity-first&quot;&gt;View Issue and MR activity- newest first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;!--
Reminder: the final paragraph should include the total number of new features
being released, including bugs, performance improvements, and contributions from
non-DevOps stages like Enablement. All of these should be listed in the release
post, either as headers or bullet points.


These are just a few highlights from the `A` new and improved features, and `B`
performance improvements described below, and a small selection from the `C`
merge requests made in X.Y. Check out more great updates below, such as...
--&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_10&#x2F;cover-image-12-10.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.9.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/04/20/gitlab-12-9-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/04/20/gitlab-12-9-4-released/</id>
<published>2020-04-20T00:00:00+00:00</published>
<updated>2020-04-20T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.9.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;03&#x2F;22&#x2F;gitlab-12-9-released&#x2F;&quot;&gt;this month&#x27;s 12.9 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26828&quot;&gt;Fix project show file upload not working&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28496&quot;&gt;Fix regression on storage rollback causing repositories to report as 404&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28683&quot;&gt;Fix incorrect regex used in FileUploader#extract_dynamic_path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29111&quot;&gt;Fix Slack notifications when upgrading from old GitLab versions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28712&quot;&gt;Update index_options to fix advanced search queries&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;29026&quot;&gt;Fully qualify id columns for keyset pagination&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28893&quot;&gt;Geo: Fix repository verification on the primary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4102&quot;&gt;Upgrade to Git 2.24.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Critical Security Release: 12.9.3, 12.8.9, and 12.7.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/</id>
<published>2020-04-14T00:00:00+00:00</published>
<updated>2020-04-14T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.9.3, 12.8.9, and 12.7.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;NOTE: The GPG keys used to sign GitLab packages has changed. If you see
errors due to signature verification or GPG errors, be sure to
update these public keys. See &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2020&#x2F;03&#x2F;30&#x2F;gpg-key-for-gitlab-package-repositories-metadata-changing&#x2F;&quot;&gt;this blog post&lt;&#x2F;a&gt;
for more details.&lt;&#x2F;p&gt;

&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;nuget-package-and-file-disclosure-through-gitlab-workhorse&quot;&gt;NuGet Package and File Disclosure through GitLab Workhorse&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that a particular header could be used to override restriction and results in GitLab Workhorse disclosing NuGet packages and files in the &lt;code&gt;&#x2F;tmp&lt;&#x2F;code&gt; directory. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-11505&quot;&gt;CVE-2020-11505&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for also responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;job-artifact-uploads-and-file-disclosure-through-gitlab-workhorse&quot;&gt;Job Artifact Uploads and File Disclosure through GitLab Workhorse&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that a particular header could be used to override restrictions and results in GitLab Workhorse disclosing job artifact uploads and files in the &lt;code&gt;&#x2F;tmp&lt;&#x2F;code&gt; directory. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-11506&quot;&gt;CVE-2020-11506&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;manassehzhou&quot;&gt;@manassehzhou&lt;&#x2F;a&gt; for also responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE&#x2F;CE 10.7.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-membership-following-group-removal&quot;&gt;Incorrect membership following group removal&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that members of a group could still have access after a group is deleted. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-11649&quot;&gt;CVE-2020-11649&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE&#x2F;CE 8.15 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;logging-of-praefect-tokens&quot;&gt;Logging of Praefect tokens&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that Praefect tokens were logged by Gitaly. The issue is now fixed.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 12.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rack-dependency&quot;&gt;Update Rack dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The Rack dependency and its related gems have been upgraded to 2.0.9. This upgrade includes a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-16782&quot;&gt;CVE-2019-16782&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-openssl-dependency&quot;&gt;Update OpenSSL dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The OpenSSL dependency has been upgraded from 1.1.d to 1.1.1f to include those &lt;a href=&quot;https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;changelog.html#openssl-111&quot;&gt;improvements&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.9.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/03/31/gitlab-12-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/31/gitlab-12-9-2-released/</id>
<published>2020-03-31T00:00:00+00:00</published>
<updated>2020-03-31T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.9.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;03&#x2F;22&#x2F;gitlab-12-9-released&#x2F;&quot;&gt;this month&#x27;s 12.9.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27034&quot;&gt;Index issues on sent_notifications&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27538&quot;&gt;Fix Gatsby project template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27547&quot;&gt;Ensure import by URL works after a failed import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27650&quot;&gt;Fix direct access to individual design on deprecated issue route&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27816&quot;&gt;Add issue&#x2F;MR state string to Project Export&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27840&quot;&gt;Support design notes in url generator&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27864&quot;&gt;Resolve GCS job.log stored with Content-Type invalid&#x2F;invalid&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4018&quot;&gt;The GitLab Ultimate AWS marketplace listing name has been changed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4024&quot;&gt;Configure logrotate service for puma&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28258&quot;&gt;Allow parenthesis to be included in group name&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28264&quot;&gt;Disable archive rate limit by default&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28270&quot;&gt;Fix rake gitlab:setup failing on new installs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28241&quot;&gt;Backwards compatible active_users param&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;27481&quot;&gt;Send active users in seat link&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;28416&quot;&gt;Allow Seat Link to be disabled through admin toggle&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;-&#x2F;merge_requests&#x2F;4042&quot;&gt;Add gitlab.rb setting to enable seat_link service&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a new migration adding a new column, and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.9.1, 12.8.8, and 12.7.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/</id>
<published>2020-03-26T00:00:00+00:00</published>
<updated>2020-03-26T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.9.1, 12.8.8, and 12.7.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-file-read-when-moving-an-issue&quot;&gt;Arbitrary File Read when Moving an Issue&lt;&#x2F;h2&gt;
&lt;p&gt;An arbitrary local file read was possible when an moving issues between projects. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10977&quot;&gt;CVE-2020-10977&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 8.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-in-npm-package-registry&quot;&gt;Path Traversal in NPM Package Registry&lt;&#x2F;h2&gt;
&lt;p&gt;The NPM package registry was vulnerable to a path traversal issue. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10953&quot;&gt;CVE-2020-10953&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;saltyyolk&quot;&gt;@saltyyolk&lt;&#x2F;a&gt; of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-on-project-import&quot;&gt;SSRF on Project Import&lt;&#x2F;h2&gt;
&lt;p&gt;An SSRF issue was discovered in the project import note feature. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10956&quot;&gt;CVE-2020-10956&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 8.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;external-users-can-create-personal-snippet&quot;&gt;External Users Can Create Personal Snippet&lt;&#x2F;h2&gt;
&lt;p&gt;Insufficient access verification lead to unauthorized creation of personal snippets through the API by an external user. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12275&quot;&gt;CVE-2020-12275&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks the GitLab team for finding and reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;triggers-decription-can-be-updated-by-other-maintainers-in-project&quot;&gt;Triggers Decription Can be Updated by Other Maintainers in Project&lt;&#x2F;h2&gt;
&lt;p&gt;A maintainer can modify other maintainers&#x27; pipeline trigger descriptions within the same project. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10981&quot;&gt;CVE-2020-10981&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-on-confidential-issues-moved-to-private-programs&quot;&gt;Information Disclosure on Confidential Issues Moved to Private Programs&lt;&#x2F;h2&gt;
&lt;p&gt;Issues opened in a public project and then moved to a private project reveal the private project namespace through Web-UI and GraphQL API. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10978&quot;&gt;CVE-2020-10978&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;0xwintermute&quot;&gt;@0xwintermute&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 8.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-dos-in-repository-archive-download&quot;&gt;Potential DoS in Repository Archive Download&lt;&#x2F;h2&gt;
&lt;p&gt;Repository archives download could be abused to cause large resource consumption on an instance. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10954&quot;&gt;CVE-2020-10954&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks the GitLab team for finding and reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blocked-users-can-still-pullpush-docker-images&quot;&gt;Blocked Users Can Still Pull&#x2F;Push Docker Images&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain circumstances a blocked user still had the ability to pull images from the internal container registry of any projects to which the user had access. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10952&quot;&gt;CVE-2020-10952&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;logan5&quot;&gt;@logan5&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 8.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-mirroring-not-disabled-when-feature-not-activated&quot;&gt;Repository Mirroring not Disabled when Feature not Activated&lt;&#x2F;h2&gt;
&lt;p&gt;A project repository could still be mirrored when the feature was not enabled. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12277&quot;&gt;CVE-2020-12277&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;adam__b&quot;&gt;@adam__b&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;vulnerability-feedback-page-was-leaking-information-on-vulnerabilities&quot;&gt;Vulnerability Feedback Page Was Leaking Information on Vulnerabilities&lt;&#x2F;h2&gt;
&lt;p&gt;The vulnerability feedback page was leaking metadata and comments on vulnerabilities to unauthorized users. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10975&quot;&gt;CVE-2020-10975&lt;&#x2F;a&gt; .&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-vulnerability-in-admin-feature&quot;&gt;Stored XSS Vulnerability in Admin Feature&lt;&#x2F;h2&gt;
&lt;p&gt;A stored XSS vulnerability was discovered in an admin notification feature. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-12276&quot;&gt;CVE-2020-12276&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks the GitLab team for finding and reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 9.5.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upload-feature-allowed-a-user-to-read-unauthorized-exported-files&quot;&gt;Upload Feature Allowed a User to Read Unauthorized Exported Files&lt;&#x2F;h2&gt;
&lt;p&gt;The upload feature was vulnerable to parameter tampering allowing and unauthorized user to read content available under specific folders. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10955&quot;&gt;CVE-2020-10955&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;manassehzhou&quot;&gt;@manassehzhou&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 11.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-users-are-able-to-see-ci-metrics&quot;&gt;Unauthorized Users Are Able to See CI Metrics&lt;&#x2F;h2&gt;
&lt;p&gt;Restricted CI pipelines metrics could be seen by members even if the pipeline was restricted. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10979&quot;&gt;CVE-2020-10979&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 11.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;last-pipeline-status-of-a-merge-request-leaked&quot;&gt;Last Pipeline Status of a Merge Request Leaked&lt;&#x2F;h2&gt;
&lt;p&gt;The last status of a restricted pipeline was returned through a query in the merge request widget. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10976&quot;&gt;CVE-2020-10976&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 8.17 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blind-ssrf-on-fogbugz&quot;&gt;Blind SSRF on FogBugz&lt;&#x2F;h2&gt;
&lt;p&gt;A blind SSRF was discovered in the FogBugz integration. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10980&quot;&gt;CVE-2020-10980&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-nokogiri-dependency&quot;&gt;Update Nokogiri dependency&lt;&#x2F;h2&gt;
&lt;p&gt;The Nokogiri dependency has been upgraded to 1.10.8. This upgrade include a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;advisories&#x2F;GHSA-7553-jr98-vx47&quot;&gt;CVE-2020-7595&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-pcre2-dependency&quot;&gt;Update Pcre2 dependency&lt;&#x2F;h2&gt;
&lt;p&gt;The pcre2 dependency has been upgraded to 10.34. This upgrade include a security fix for &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-20454&quot;&gt;CVE-2019-20454&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects all previous versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-ssh-keys-not-being-added-to-the-authorized_keys-file&quot;&gt;New SSH keys not being added to the &lt;code&gt;authorized_keys&lt;&#x2F;code&gt; file&lt;&#x2F;h2&gt;
&lt;p&gt;A bug in GitLab 12.9.0 prevented new SSH keys from being added to the Git user&#x27;s
&lt;code&gt;authorized_keys&lt;&#x2F;code&gt; file, effectively breaking Git-over-SSH operations for new
users. See issue &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;issues&#x2F;212178&quot;&gt;#212178&lt;&#x2F;a&gt;
for full details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab 12.9.0 only.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;Upgrade to GitLab 12.9.1 or later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.9 released with Vault App, Code Quality Reports and Group Deploy Tokens</title>
<release>12.9</release>
<link href='https://about.gitlab.com/releases/2020/03/22/gitlab-12-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/22/gitlab-12-9-released/</id>
<published>2020-03-22T00:00:00+00:00</published>
<updated>2020-03-22T00:00:00+00:00</updated>
<author>
<name>Larissa Lane</name>
</author>
<content type='html'>&lt;p&gt;GitLab 12.9 is now available to help DevOps leaders achieve &lt;strong&gt;enhanced security&lt;&#x2F;strong&gt; with management of your secrets via HashiCorp Vault managed application, &lt;strong&gt;better visibility&lt;&#x2F;strong&gt; with code quality reports &amp;amp; customizable value stream analytics, and &lt;strong&gt;easier administration&lt;&#x2F;strong&gt; with group deploy tokens and API administration of deploy tokens.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;secure-your-applications-with-secrets-management-and-vulnerability-remediation&quot;&gt;Secure your applications with Secrets Management and Vulnerability Remediation&lt;&#x2F;h2&gt;

&lt;p&gt;Many organizations are centralizing the storage of secrets for infrastructure and applications in external secrets management solutions, including HashiCorp Vault. With GitLab 12.9, we enable users to leverage &lt;a href=&quot;https:&#x2F;&#x2F;www.vaultproject.io&#x2F;&quot;&gt;HashiCorp Vault&lt;&#x2F;a&gt; to securely manage keys, tokens, and other secrets at the project level by installing it as a &lt;a href=&quot;#hashicorp-vault-gitlab-cicd-managed-application&quot;&gt;managed application&lt;&#x2F;a&gt; within a Kubernetes Cluster. For current HashiCorp Vault users, you can follow our Bring Your Own Vault Integration progress in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;-&#x2F;epics&#x2F;2868&quot;&gt;gitlab&amp;amp;2868&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When Container Scanning detects vulnerabilities, GitLab 12.9 can now give &lt;a href=&quot;#suggested-solution-for-container-scanning&quot;&gt;a suggested solution for the vulnerability&lt;&#x2F;a&gt;, when available. You can choose to remediate the vulnerability with a merge request, which will automatically update the packages in the container base image, helping you resolve container security issues swiftly and efficiently.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;better-visibility-with-customizable-value-stream-analytics-and-code-quality-reports&quot;&gt;Better visibility with Customizable Value Stream Analytics and Code Quality Reports&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;solutions&#x2F;value-stream-management&#x2F;&quot;&gt;Value Stream Analytics&lt;&#x2F;a&gt; helps organizations visualize their end-to-end workstream and identify inefficiencies, in order to continuously improve how they deliver value. Previously the lifecycle stages were fixed to the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;DevOps loop&lt;&#x2F;a&gt;, which may not be suitable for everyone, as some teams may follow a different workflow. With GitLab 12.9, you have more control to &lt;a href=&quot;#customizable-value-stream-analytics&quot;&gt;customize the stages&lt;&#x2F;a&gt; to reflect the right metrics for your business. Each new stage can have specific trigger events that define the entry or exit of the stage, allowing you to focus on improvements based on your defined key performance indicators. Be on the lookout for &lt;a href=&quot;&#x2F;direction&#x2F;plan&#x2F;value_stream_management&#x2F;&quot;&gt;more capabilities&lt;&#x2F;a&gt; in our upcoming releases.&lt;&#x2F;p&gt;

&lt;p&gt;Previously, developers used the Code Quality feature in the merge request to understand the impact on quality of the target branch. However, this does not give insight to developers and managers into other code quality issues across the project. With GitLab 12.9, we have introduced a &lt;a href=&quot;#full-code-quality-report&quot;&gt;Full Code Quality Report&lt;&#x2F;a&gt; that summarizes the quality issues across the project.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;improve-efficiencies-with-group-deploy-tokens&quot;&gt;Improve efficiencies with Group Deploy Tokens&lt;&#x2F;h2&gt;

&lt;p&gt;For any organization working with containers, it is critical for their orchestrator to have secure and ongoing access to their container registry. Previously, we introduced &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;deploy_tokens&#x2F;&quot;&gt;Project Deploy Tokens&lt;&#x2F;a&gt; to provide long lived read-only authentication to the registry without being associated with a particular user or having unnecessary access rights.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 12.9, managing deploy tokens in bulk is now more efficient, as we are not only introducing &lt;a href=&quot;#group-deploy-tokens&quot;&gt;deploy tokens at the group level&lt;&#x2F;a&gt; but also APIs to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;deploy_tokens.html&quot;&gt;create, list and revoke deploy tokens&lt;&#x2F;a&gt;. If a specific project requires to use different tokens, project-level deploy tokens override group level deploy tokens.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;There are so many great features in GitLab 12.9, that we couldn&#x27;t possibly highlight them all. A few favorites include &lt;a href=&quot;#web-application-firewall-waf-statistics-reporting&quot;&gt;WAF Statistics Report&lt;&#x2F;a&gt;, &lt;a href=&quot;#group-level-roadmap-now-available-in-premium&quot;&gt;Group level Roadmaps now available in Premium&lt;&#x2F;a&gt;, and &lt;a href=&quot;#log-aggregation-in-core&quot;&gt;Log Aggregation now available in Core&lt;&#x2F;a&gt;! Keep reading below to get details on every feature release.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_9&#x2F;12_9-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.8.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/03/16/gitlab-12-8-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/16/gitlab-12-8-7-released/</id>
<published>2020-03-16T00:00:00+00:00</published>
<updated>2020-03-16T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.8.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;02&#x2F;22&#x2F;gitlab-12-8-released&#x2F;&quot;&gt;this month&#x27;s 12.8 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25876&quot;&gt;Fix&#x2F;x509 signed commit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26387&quot;&gt;Allow packages multipart uploads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 12.8.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/03/11/critical-security-release-gitlab-12-dot-8-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/11/critical-security-release-gitlab-12-dot-8-dot-6-released/</id>
<published>2020-03-11T00:00:00+00:00</published>
<updated>2020-03-11T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.8.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version contains an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;email-confirmation-not-required-on-sign-up&quot;&gt;Email Confirmation Not Required on Sign-up&lt;&#x2F;h2&gt;

&lt;p&gt;With the release of 12.8.0, a soft email confirmation sign-up flow was enabled by default. For instances with sign-up enabled, users were able to sign up and access the instance for a 2 day grace period with an unconfirmed email address, potentially bypassing domain restrictions. The change was reverted and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10535&quot;&gt;CVE-2020-10535&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.8.0 through 12.8.5.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.8.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/03/09/gitlab-12-8-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/09/gitlab-12-8-5-released/</id>
<published>2020-03-09T00:00:00+00:00</published>
<updated>2020-03-09T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.8.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;02&#x2F;22&#x2F;gitlab-12-8-released&#x2F;&quot;&gt;this month&#x27;s 12.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt; Versions 12.8.3 and 12.8.4 were not released due to challenges encountered while preparing the release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25319&quot;&gt;Documentation of logs link in embedded panels&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25715&quot;&gt;Update ImportExportUploader workhorse_local_upload_path&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25799&quot;&gt;Check for existence of last commit sha&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25842&quot;&gt;Fix Web IDE fork modal showing no text&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25877&quot;&gt;Fixes Vue file list for paths with non-ascii characters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25923&quot;&gt;Fix GraphQL tree query erroring when using tags&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26129&quot;&gt;Fixes search for error tracking list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26199&quot;&gt;Disable Marginalia line backtrace in production&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26386&quot;&gt;Send credentials with GraphQL fetch requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26403&quot;&gt;Revert removal of CI status in project dashboards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26524&quot;&gt;Rescue invalid URLs during badge retrieval in asset proxy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;26541&quot;&gt;Remove unnecessary Redis deletes for broadcast messages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25849&quot;&gt;Fixed regression when URL was encoded in a loop&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.8.2, 12.7.7, and 12.6.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/</id>
<published>2020-03-04T00:00:00+00:00</published>
<updated>2020-03-04T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.8.2, 12.7.7, and 12.6.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;directory-traversal-to-arbitrary-file-read&quot;&gt;Directory Traversal to Arbitrary File Read&lt;&#x2F;h2&gt;

&lt;p&gt;A particular endpoint was vulnerable to a directory traversal vulnerability, leading to arbitrary file read. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10086&quot;&gt;CVE-2020-10086&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 10.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;account-takeover-through-expired-link&quot;&gt;Account Takeover Through Expired Link&lt;&#x2F;h2&gt;

&lt;p&gt;A scenario was discovered in which a GitLab account could be taken over through an expired link. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10074&quot;&gt;CVE-2020-10074&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gnux&quot;&gt;@gnux&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 10.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;server-side-request-forgery-through-deprecated-service&quot;&gt;Server Side Request Forgery Through Deprecated Service&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that a particular deprecated service was creating a server side request forgery risk. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10077&quot;&gt;CVE-2020-10077&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 3.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-two-factor-authentication-requirement-bypass&quot;&gt;Group Two-Factor Authentication Requirement Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain conditions where users should have been required to configure two-factor authentication, it was not being required. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10079&quot;&gt;CVE-2020-10079&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 7.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-merge-request-pages&quot;&gt;Stored XSS in Merge Request Pages&lt;&#x2F;h2&gt;

&lt;p&gt;A stored cross-site scripting vulnerability was discovered when displaying merge requests. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10076&quot;&gt;CVE-2020-10076&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;@mike12&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-merge-request-submission-form&quot;&gt;Stored XSS in Merge Request Submission Form&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request submission form was determined to have a stored cross-site scripting vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10078&quot;&gt;CVE-2020-10078&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-file-view&quot;&gt;Stored XSS in File View&lt;&#x2F;h2&gt;

&lt;p&gt;A cross-site scripting vulnerability was found when viewing particular file types. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10091&quot;&gt;CVE-2020-10091&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mike12&quot;&gt;@mike12&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 9.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-grafana-integration&quot;&gt;Stored XSS in Grafana Integration&lt;&#x2F;h2&gt;

&lt;p&gt;A cross-site scripting vulnerability was present in a particular view relating to the Grafana integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10092&quot;&gt;CVE-2020-10092&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;contribution-analytics-exposed-to-non-members&quot;&gt;Contribution Analytics Exposed to Non-members&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for certain non-members to access the Contribution Analytics page of a private group. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10080&quot;&gt;CVE-2020-10080&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-access-control-in-docker-registry-via-deploy-tokens&quot;&gt;Incorrect Access Control in Docker Registry via Deploy Tokens&lt;&#x2F;h2&gt;

&lt;p&gt;The Docker registry was improperly accessible through a particular set of conditions. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-8113&quot;&gt;CVE-2020-8113&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-via-permission-checks&quot;&gt;Denial of Service via Permission Checks&lt;&#x2F;h2&gt;

&lt;p&gt;It was internally discovered that a potential denial of service involving permissions checks could impact a project home page. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10073&quot;&gt;CVE-2020-10073&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.4.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-in-design-for-public-issue&quot;&gt;Denial of Service in Design For Public Issue&lt;&#x2F;h2&gt;

&lt;p&gt;A denial of service vulnerability impacting the designs for public issues was discovered. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10082&quot;&gt;CVE-2020-10082&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-access-control-via-lfs-import&quot;&gt;Incorrect Access Control via LFS Import&lt;&#x2F;h2&gt;

&lt;p&gt;It was internally discovered that the LFS import process could potentially be used to incorrectly access LFS objects not owned by the user. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10081&quot;&gt;CVE-2020-10081&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unescaped-html-in-header&quot;&gt;Unescaped HTML in Header&lt;&#x2F;h2&gt;

&lt;p&gt;A particular error header was potentially susceptible to injection or potentially other vulnerabilities via unescaped input. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10075&quot;&gt;CVE-2020-10075&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-merge-request-titles-leaked-via-widget&quot;&gt;Private Merge Request Titles Leaked via Widget&lt;&#x2F;h2&gt;

&lt;p&gt;A particular view was exposing merge private merge request titles. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10085&quot;&gt;CVE-2020-10085&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.3.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-namespace-exposed-via-vulnerability-feedback-endpoint&quot;&gt;Project Namespace Exposed via Vulnerability Feedback Endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;Sending a specially crafted request to the &lt;code&gt;vulnerability_feedback&lt;&#x2F;code&gt; endpoint could result in the exposure of a private project namespace. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10084&quot;&gt;CVE-2020-10084&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-through-recursive-requests&quot;&gt;Denial of Service Through Recursive Requests&lt;&#x2F;h2&gt;

&lt;p&gt;Using several features to recursively request eachother, it was possible to cause the denial of service of a GitLab instance. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10089&quot;&gt;CVE-2020-10089&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;exem_pt&quot;&gt;@exem_pt&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 8.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-authorization-not-being-updated&quot;&gt;Project Authorization Not Being Updated&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain conditions involving groups, project authorization changes were not being applied. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10083&quot;&gt;CVE-2020-10083&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-permission-level-for-group-invites&quot;&gt;Incorrect Permission Level For Group Invites&lt;&#x2F;h2&gt;

&lt;p&gt;Depending on particular group settings, it was possible for invited groups to be given the incorrect permission level. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10088&quot;&gt;CVE-2020-10088&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;cristian.berner&quot;&gt;Cristian Berner&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 12.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-group-epic-information&quot;&gt;Disclosure of Private Group Epic Information&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain group conditions, group epic information was unintentionally being disclosed. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10090&quot;&gt;CVE-2020-10090&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-19&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-19&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-ip-address-exposed-via-badge-images&quot;&gt;User IP Address Exposed via Badge images&lt;&#x2F;h2&gt;

&lt;p&gt;Badge images were not being proxied, causing mixed content warnings as well as leaking the IP address of the user. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-10087&quot;&gt;CVE-2020-10087&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-20&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-20&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-postgresql-gitlab-omnibus&quot;&gt;Update postgresql (GitLab Omnibus)&lt;&#x2F;h2&gt;

&lt;p&gt;The version of postgresql was updated from 9.6.14 to 9.6.16 and postgresql_new 10.9 and 10.11 to remediate &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2019-10208&quot;&gt;CVE-2019-10208&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-21&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab Omnibus versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-21&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.8.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/02/24/gitlab-12-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/02/24/gitlab-12-8-1-released/</id>
<published>2020-02-24T00:00:00+00:00</published>
<updated>2020-02-24T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.8.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2020&#x2F;02&#x2F;22&#x2F;gitlab-12-8-released&#x2F;&quot;&gt;this month&#x27;s 12.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;23636&quot;&gt;Added technical evaluation issue template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;24690&quot;&gt;Documentation for Pages configuration file&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;24741&quot;&gt;Fixes &#x27;tags&#x27; support in &#x27;default&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;24929&quot;&gt;Doc update monitoring dashboard&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25352&quot;&gt;Fixes markdown layout of incident issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25366&quot;&gt;Update GitLab version for duplicating dashboards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25388&quot;&gt;Fixes query to retrieve Job Artifacts always use the selective sync version on Geo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25399&quot;&gt;Fixes broken chart in Monitor dashboards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25445&quot;&gt;Correctly render GFM in README files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25469&quot;&gt;Fixes unknown action type: &lt;code&gt;setInitialState&lt;&#x2F;code&gt; error on Release edit page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25545&quot;&gt;Add &lt;code&gt;scheduling_type&lt;&#x2F;code&gt; to tags entry with default values&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25594&quot;&gt;Correctly handle hash for README&#x27;s in Vue file listing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;25788&quot;&gt;Fixes upgrade failure in EE displaying license&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.8 released with Log Explorer, NuGet, and Compliance</title>
<release>12.8</release>
<link href='https://about.gitlab.com/releases/2020/02/22/gitlab-12-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/02/22/gitlab-12-8-released/</id>
<published>2020-02-22T00:00:00+00:00</published>
<updated>2020-02-22T00:00:00+00:00</updated>
<author>
<name>Tim Rizzi</name>
</author>
<content type='html'>&lt;p&gt;GitLab 12.8 is here celebrating &quot;one place!&quot; Get one place for your logs, one place for your NuGet packages, and one place for your compliance activity just like GitLab is one place for your entire DevOps lifecycle.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;triage-faster-with-the-new-log-explorer&quot;&gt;Triage faster with the new Log Explorer&lt;&#x2F;h2&gt;

&lt;p&gt;When triaging an incident or validating the status of your service you need to be able to explore Kubernetes Pod Logs from across your entire application. Previously, this was a painful process as you could only see limited logs, couldn&#x27;t go back in time, and didn&#x27;t have search. This was complex and time-consuming enough that it could make using Pod Logs impractical for meaningful analysis and instead limit it to simple troubleshooting use cases.&lt;&#x2F;p&gt;

&lt;p&gt;Now, a new &lt;a href=&quot;#explore-aggregated-logs&quot;&gt;Log Explorer&lt;&#x2F;a&gt; lets you interact with all your logs aggregated into one place. Powerful features including filtering, time picker, and full-text search let you quickly get the information you need. This important milestone moves our &lt;a href=&quot;&#x2F;direction&#x2F;monitor&#x2F;platform-insights&#x2F;&quot;&gt;Logging category&lt;&#x2F;a&gt; from &lt;code&gt;minimal&lt;&#x2F;code&gt; to &lt;code&gt;viable&lt;&#x2F;code&gt;!  To get started, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;clusters&#x2F;applications.html#elastic-stack&quot;&gt;install the Elastic stack&lt;&#x2F;a&gt; on your Kubernetes cluster with just one click using the GitLab Managed app, and your logs will be automatically collected and aggregated.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;efficiently-store-and-share-c-and-net-resources&quot;&gt;Efficiently store and share C# and .NET resources&lt;&#x2F;h2&gt;

&lt;p&gt;Windows has a large, active, and growing development community. While GitLab has already had built-in package management for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;packages&#x2F;conan_repository&#x2F;index.html&quot;&gt;C&#x2F;C++&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;packages&#x2F;maven_repository&#x2F;index.html&quot;&gt;Java&lt;&#x2F;a&gt;, and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;packages&#x2F;npm_registry&#x2F;index.html&quot;&gt;Node.js&lt;&#x2F;a&gt;, teams writing applications in C# and .NET still needed to use tools external to GitLab in order to store and manage their binaries. This meant they were missing out on the &lt;a href=&quot;&#x2F;topics&#x2F;single-application&#x2F;&quot;&gt;benefits of using a single application&lt;&#x2F;a&gt; across their DevOps lifecycle.&lt;&#x2F;p&gt;

&lt;p&gt;Now, GitLab 12.8 gives teams writing code in C# and .NET a built-in &lt;a href=&quot;#build-publish-and-share-packages-to-the-gitlab-nuget-net-repository&quot;&gt;NuGet repository&lt;&#x2F;a&gt; so they have one place to manage and share project binaries both privately and publicly. Developers can now benefit from having their source code, CI&#x2F;CD pipelines, and the resulting packages all in the same application so they can get work done faster with less effort.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;manage-risk-with-the-compliance-dashboard&quot;&gt;Manage risk with the Compliance Dashboard&lt;&#x2F;h2&gt;

&lt;p&gt;Merge requests (MRs) are an elegant and powerful change management tool for keeping a record of changes and approvals. Release teams use MRs to track deployments, and infrastructure teams use MRs to practice &lt;a href=&quot;&#x2F;topics&#x2F;gitops&#x2F;gitops-multicloud-deployments-gitlab&#x2F;&quot;&gt;GitOps&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Additionally, tracking all MR activity can be critical for organizations that have specific company policies that govern their operations in order to adhere to compliance frameworks, such as SOC 2, ISO 27001, GDPR, SOX, HIPAA, or PCI-DSS, and have specific company policies that govern their operations.&lt;&#x2F;p&gt;

&lt;p&gt;Some examples of governing policies are:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;All MRs have a related issue with detailed information about the change(s)&lt;&#x2F;li&gt;
  &lt;li&gt;All MRs are reviewed and approved by someone who isn&#x27;t the author&lt;&#x2F;li&gt;
  &lt;li&gt;All MRs pass QA and security testing&lt;&#x2F;li&gt;
  &lt;li&gt;Any exceptions to the requirements require separate approval.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Previously, GitLab users lacked the necessary tools to effectively manage their GitLab environment&#x27;s change management and compliance. Project-level activity was confined to each project, and there was no easy way to view this information in aggregate at the group level. This lack of control and insight created increased potential for risk, reducing users&#x27; ability to manage compliance within GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We have a &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;govern&#x2F;compliance&quot;&gt;vision for adding robust compliance management&lt;&#x2F;a&gt; to Gitlab. As a first step towards this vision, we&#x27;re starting with a &lt;a href=&quot;#compliance-dashboard&quot;&gt;Compliance Dashboard&lt;&#x2F;a&gt; which provides a view of the most recent merge requests for each project in a Group. With the capabilities available today, you can manage auditing of your code changes for releases and GitOps from one place. Similarly, this makes it easier for compliance-focused organizations to quickly understand which projects might have greater risk and therefore warrant extra attention. Be on the lookout for &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;govern&#x2F;compliance&#x2F;compliance-management&#x2F;#whats-next--why&quot;&gt;more capabilities and improvements&lt;&#x2F;a&gt; in our coming releases.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;These are just a few highlights in 12.8. Check out the other great updates, such as &lt;a href=&quot;#blocking-issue-support&quot;&gt;blocking issues&lt;&#x2F;a&gt;, &lt;a href=&quot;#leverage-policies-to-remove-docker-images&quot;&gt;Docker image expiration policies&lt;&#x2F;a&gt;, and &lt;a href=&quot;#single-level-epics-now-available-in-premium&quot;&gt;Single-level Epics, now available in Premium&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_8&#x2F;12_8-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Critical Security Release: 12.7.6, 12.6.7, and 12.5.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/02/13/critical-security-release-gitlab-12-dot-7-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/02/13/critical-security-release-gitlab-12-dot-7-dot-6-released/</id>
<published>2020-02-13T00:00:00+00:00</published>
<updated>2020-02-13T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.7.6, 12.6.7, and 12.5.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;incorrect-membership-handling-of-group-sharing-feature&quot;&gt;Incorrect membership handling of group sharing feature&lt;&#x2F;h2&gt;

&lt;p&gt;Sharing a group with another group could grant project access to unauthorized users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-8795&quot;&gt;CVE-2020-8795&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.5.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.7.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/01/31/gitlab-12-7-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/31/gitlab-12-7-5-released/</id>
<published>2020-01-31T00:00:00+00:00</published>
<updated>2020-01-31T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.7.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;posts&#x2F;2020-01-22-gitlab-12-7-released.html&quot;&gt;this month&#x27;s 12.7.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;23687&quot;&gt;Restores accidentally deleted project configuration on &#x27;Apply Suggestions&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;23829&quot;&gt;Reverts AWS version bump&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;23955&quot;&gt;Makes &#x27;attr_encrypted&#x27; thread-safe&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;24144&#x2F;&quot;&gt;Fixes applying suggestion with empty custom message&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;23759&quot;&gt;Removes invalid data from &#x27;issue_tracker_data&#x27; table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;24035&quot;&gt;Fixes database permission check for triggers on Amazon RDS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;23885&quot;&gt;Fixes Geo sidebar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;-&#x2F;merge_requests&#x2F;24021&quot;&gt;Fix initialization order issue with Geo database&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a post-migration, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.7.4, 12.6.6, and 12.5.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/01/30/security-release-gitlab-12-7-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/30/security-release-gitlab-12-7-4-released/</id>
<published>2020-01-30T00:00:00+00:00</published>
<updated>2020-01-30T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.7.4, 12.6.6, and 12.5.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-to-arbitrary-file-read&quot;&gt;Path Traversal to Arbitrary File Read&lt;&#x2F;h2&gt;

&lt;p&gt;The dependency proxy was found to have a path traversal vulnerability that if combined with an arbitrary file read vulnerability could potentially result in access to files and user data. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7966&quot;&gt;CVE-2020-7966&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-permissions-not-validated-in-projectexportworker&quot;&gt;User Permissions Not Validated in ProjectExportWorker&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that permissions were not being validated in the ProjectExportWorker for the user scheduling exports. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-8114&quot;&gt;CVE-2020-8114&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-vulnerability-in-file-api&quot;&gt;XSS Vulnerability in File API&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain conditions, requests involving the file API could result in an XSS vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7973&quot;&gt;CVE-2020-7973&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;package-and-file-disclosure-through-gitlab-workhorse&quot;&gt;Package and File Disclosure through GitLab Workhorse&lt;&#x2F;h2&gt;

&lt;p&gt;An internal investigation revealed that a particular header could be used to override restrictions and result in the GitLab Workhorse disclosing packages and files in the &lt;code&gt;&#x2F;tmp&lt;&#x2F;code&gt; directory. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-6833&quot;&gt;CVE-2020-6833&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-vulnerability-in-create-groups&quot;&gt;XSS Vulnerability in Create Groups&lt;&#x2F;h2&gt;

&lt;p&gt;A stored XSS vulnerability was discovered using the create group functionality. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7971&quot;&gt;CVE-2020-7971&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rioncool22&quot;&gt;@rioncool22&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-and-merge-request-activity-counts-exposed&quot;&gt;Issue and Merge Request Activity Counts Exposed&lt;&#x2F;h2&gt;

&lt;p&gt;Despite project settings otherwise, non-members were able to view activity counts of issues and merge requests. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7967&quot;&gt;CVE-2020-7967&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;email-confirmation-bypass-using-api&quot;&gt;Email Confirmation Bypass Using API&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that a certain API endpoint could be used to bypass email verification requirements. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7972&quot;&gt;CVE-2020-7972&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;whitehattushu&quot;&gt;@whitehattushu&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-forked-private-project-source-code&quot;&gt;Disclosure of Forked Private Project Source Code&lt;&#x2F;h2&gt;

&lt;p&gt;Authorization checks were not being applied in some cases for public repositories with merge request visibility set to members only, resulting in source code potentially being disclosed. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7968&quot;&gt;CVE-2020-7968&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-names-exposed-in-graphql-queries&quot;&gt;Private Project Names Exposed in GraphQL queries&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain conditions, particularly crafted GraphQL queries could expose private project names. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7979&quot;&gt;CVE-2020-7979&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-issues-and-merge-requests-via-todos&quot;&gt;Disclosure of Issues and Merge Requests via Todos&lt;&#x2F;h2&gt;

&lt;p&gt;Unexpired Todos could be leveraged to disclose (potentially confidential) issues and merge requests. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7969&quot;&gt;CVE-2020-7969&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-via-asciidoc&quot;&gt;Denial of Service via AsciiDoc&lt;&#x2F;h2&gt;

&lt;p&gt;Certain payloads could result in a denial of service due to abuse of AsciiDoc includes. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7978&quot;&gt;CVE-2020-7978&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;kgadyrka&quot;&gt;@kgadyrka&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;last-pipeline-status-exposed&quot;&gt;Last Pipeline Status Exposed&lt;&#x2F;h2&gt;

&lt;p&gt;Despite restrictions in place, the last pipeline status was visible via the commits API. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7974&quot;&gt;CVE-2020-7974&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-change-of-pipeline-status&quot;&gt;Arbitrary Change of Pipeline Status&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain conditions, a developer of a project can change the pipeline status of a protected branch to any value. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7977&quot;&gt;CVE-2020-7977&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;grafana-token-displayed-in-plaintext&quot;&gt;Grafana Token Displayed in Plaintext&lt;&#x2F;h2&gt;

&lt;p&gt;The Grafana token was displayed in plaintext on the settings page, but is now being masked. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-7976&quot;&gt;CVE-2020-7976&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-excon-gem&quot;&gt;Update excon gem&lt;&#x2F;h2&gt;

&lt;p&gt;The excon gem was updated to address a flaw within that library, identified as &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-16779&quot;&gt;CVE-2019-16779&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 5.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rdoc-gem&quot;&gt;Update rdoc gem&lt;&#x2F;h2&gt;

&lt;p&gt;The rdoc gem was updated, which removed an older version of the jQuery library that had several known security vulnerabilities.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rack-cors-gem&quot;&gt;Update rack-cors gem&lt;&#x2F;h2&gt;

&lt;p&gt;The rack-cors gem was updated to address a vulnerability in that library, &lt;a href=&quot;https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2019-18978&quot;&gt;CVE-2019-18978&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 6.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-rubyzip-gem&quot;&gt;Update rubyzip gem&lt;&#x2F;h2&gt;

&lt;p&gt;The rubyzip gem was updated to address a vulnerability in that library, &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-16892&quot;&gt;CVE-2019-16892&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;apply-january-mattermost-security-updates-gitlab-omnibus&quot;&gt;Apply January Mattermost Security Updates (GitLab Omnibus)&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;mattermost.com&#x2F;blog&#x2F;mattermost-security-update-5-18-1-5-17-3-5-16-5-5-9-8-esr-released&#x2F;&quot;&gt;January Mattermost Security Updates&lt;&#x2F;a&gt; were applied.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.7.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/01/24/gitlab-12-7-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/24/gitlab-12-7-2-released/</id>
<published>2020-01-24T00:00:00+00:00</published>
<updated>2020-01-24T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.7.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;posts&#x2F;2020-01-22-gitlab-12-7-released.html&quot;&gt;this month&#x27;s 12.7.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;Version 12.7.1 was discontinued due to an error in our release tooling.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23310&quot;&gt;Fixes Bitbucket Server importer error handler&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23399&quot;&gt;Reverts expiration time of Acme Order&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23428&quot;&gt;Reverts MR diff redesign which fixes Web IDE visual bugs including file dropdown not showing up&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23621&quot;&gt;Remove invalid data from jira_tracker_data table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23107&quot;&gt;Fixes create&#x2F;delete API calls for approval rules&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23387&quot;&gt;Fixes minimum password length breaking sign-up with SAML&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23545&quot;&gt;Geo: Allow users to sign-out on a read-only instance&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23539&quot;&gt;Remove Geo Designs Feature Flag from Frontend&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;23184&quot;&gt;Fixes Sub-Epic not visible in ancestor Epic&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a post-migration that does not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.7 released with Parent-Child Pipelines and Windows Shared Runners Beta</title>
<release>12.7</release>
<link href='https://about.gitlab.com/releases/2020/01/22/gitlab-12-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/22/gitlab-12-7-released/</id>
<published>2020-01-22T00:00:00+00:00</published>
<updated>2020-01-22T00:00:00+00:00</updated>
<author>
<name>James Ramsay</name>
</author>
<content type='html'>&lt;p&gt;GitLab 12.7 is now available with improvements to make your pipelines and teams more efficient and effective. Automation and pipelines are foundational for effective DevOps teams, and in 12.7 we’re delivering multiple improvements to make you faster and more efficient, including &lt;a href=&quot;#parent-child-pipelines&quot;&gt;Parent-Child Pipelines&lt;&#x2F;a&gt;, &lt;a href=&quot;#pipeline-resource-groups&quot;&gt;Pipeline Resource Groups&lt;&#x2F;a&gt;, and &lt;a href=&quot;#windows-shared-runners-on-gitlabcom-beta&quot;&gt;Windows Shared Runners in beta on GitLab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Because teams manage so much of their work in Merge Requests, &lt;a href=&quot;#code-review-analytics&quot;&gt;Code Review Analytics&lt;&#x2F;a&gt; and &lt;a href=&quot;#display-the-deployment-time-of-a-merge-request&quot;&gt;more informative Merge Request widgets&lt;&#x2F;a&gt; will make it easier to optimize quality and cycle time.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;faster-and-more-efficient-pipelines-and-teams&quot;&gt;&lt;strong&gt;Faster and More Efficient Pipelines and Teams&lt;&#x2F;strong&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;Large, complex pipelines can be both slow to execute and hard to understand. &lt;a href=&quot;#parent-child-pipelines&quot;&gt;Parent-child pipelines&lt;&#x2F;a&gt; will speed things up by allowing separate, child pipelines to run concurrently. By also separating and simplifying visualization and configuration per pipeline, and even allowing shared, reusable configuration, parent-child pipelines are easier to manage and will make both your CI&#x2F;CD and your team more efficient.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;manage-shared-pipeline-resources&quot;&gt;&lt;strong&gt;Manage Shared Pipeline Resources&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;Many organizations have shared environments and resources where they want to prevent multiple changes from being made at the same time. &lt;a href=&quot;#pipeline-resource-groups&quot;&gt;Resource Groups&lt;&#x2F;a&gt; help you limit pipeline concurrency to more efficiently and effectively manage jobs and resources.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;windows-shared-runners-beta&quot;&gt;&lt;strong&gt;Windows Shared Runners Beta&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;Windows developers can now choose to take advantage of &lt;a href=&quot;#windows-shared-runners-on-gitlabcom-beta&quot;&gt;Shared Runners on GitLab.com&lt;&#x2F;a&gt;, instead of or in addition to setting up their own. This beta release enables running CI&#x2F;CD jobs on Windows virtual machines with the added efficiency of a fully-managed, auto-scaling, and secure environment, managed by the GitLab.com team.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;faster-merge-request-management&quot;&gt;&lt;strong&gt;Faster Merge Request Management&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;Timely code review keeps your team shipping. &lt;a href=&quot;#code-review-analytics&quot;&gt;Code Review Analytics&lt;&#x2F;a&gt; will make it easy to find Merge Requests in review that need intervention, helping teams manage their cycle time. &lt;a href=&quot;#display-the-deployment-time-of-a-merge-request&quot;&gt;Improved Merge Request widgets&lt;&#x2F;a&gt; now show when changes have made it to a specific environment, saving time tracking down the latest deploy.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-more&quot;&gt;&lt;strong&gt;And Much More&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;These are just a few highlights from the 45 new and improved features, and 12 performance improvements described below, and a small selection from the 1,593 merge requests made in 12.7. Check out more great updates below, such as &lt;a href=&quot;#automatically-stage-all-changes-in-web-ide&quot;&gt;automatically staging all changes in our Web IDE&lt;&#x2F;a&gt; and &lt;a href=&quot;#share-group-access-with-another-group&quot;&gt;the ability to share group access with another group&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_7&#x2F;12_7-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Critical Security Release: 12.6.4, 12.5.7, and 12.4.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/01/13/critical-security-release-gitlab-12-dot-6-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/13/critical-security-release-gitlab-12-dot-6-dot-4-released/</id>
<published>2020-01-13T00:00:00+00:00</published>
<updated>2020-01-13T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.6.4, 12.5.7, and 12.4.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-objects-exposed-through-project-import&quot;&gt;Private objects exposed through project import&lt;&#x2F;h2&gt;

&lt;p&gt;Using the project import feature, it was possible for someone to obtain issues from private projects. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2020-6832&quot;&gt;CVE-2020-6832&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.6.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/01/09/gitlab-12-6-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/09/gitlab-12-6-3-released/</id>
<published>2020-01-09T00:00:00+00:00</published>
<updated>2020-01-09T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.6.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;12&#x2F;22&#x2F;gitlab-12-6-released&#x2F;&quot;&gt;this month&#x27;s 12.6.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22355&quot;&gt;Disable Prometheus metrics if initialization fails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22378&quot;&gt;Fix bug when exposing non existing artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22388&quot;&gt;Gracefully handle CI lint errors in artifacts section&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22409&quot;&gt;Fix GitLab plugins not working without hooks configured&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22440&quot;&gt;Upgrade json-jwt to v1.11.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22527&quot;&gt;Fixes bug when using slashes on release tags&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22704&quot;&gt;Set default reconnect_attempts of Rails.cache to 1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22633&#x2F;&quot;&gt;Remove unused keyword from EKS provision service&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22560&quot;&gt;Reverts &quot;RBAC permissions for getting knative version&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22021&quot;&gt;Don&#x27;t use cached node objects for geo:set_secondary_as_primary task&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22262&quot;&gt;Fixes exception caused by Merge Trains&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Security Release: 12.6.2, 12.5.6, and 12.4.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2020/01/02/security-release-gitlab-12-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2020/01/02/security-release-gitlab-12-6-2-released/</id>
<published>2020-01-02T00:00:00+00:00</published>
<updated>2020-01-02T00:00:00+00:00</updated>
<author>
<name>Vitor Meireles De Sousa</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.6.2, 12.5.6, and 12.4.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes that were inadvertently not included in our most recent security release. We strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-maintainers-can-updatedelete-group-runners-using-api&quot;&gt;Group Maintainers Can Update&#x2F;Delete Group Runners Using API&lt;&#x2F;h2&gt;
&lt;p&gt;Insufficient access verification lead to unauthorized modification of group runners through the API. This issue is now mitigated in the latest release and is assigned CVE-2019-20144.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;graphql-queries-can-hang-the-application&quot;&gt;GraphQL Queries Can Hang the Application&lt;&#x2F;h2&gt;
&lt;p&gt;Certain GraphQL queries can hang the application due to some server&#x27;s missing parameters in handling time consuming queries. This issue is now mitigated in the latest release and is assigned CVE-2019-20146.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks the GitLab team for finding and reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-users-have-access-to-milestones-of-releases&quot;&gt;Unauthorized Users Have Access to Milestones of Releases&lt;&#x2F;h2&gt;
&lt;p&gt;Under certain circumstances, an unauthenticated user can access a release&#x27;s milestone and issues. This issue is now mitigated in the latest release and is assigned CVE-2019-20143.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 12.6.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-group-name-revealed-through-protected-tags-api&quot;&gt;Private Group Name Revealed Through Protected Tags API&lt;&#x2F;h2&gt;
&lt;p&gt;When a group is removed from a project membership, it was possible for group members to see project namespace changes through the Protected Tags API. This issue is now mitigated in the latest release and is assigned CVE-2019-20147.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 9.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-can-publish-reviews-on-locked-merge-requests&quot;&gt;Users Can Publish Reviews on Locked Merge Requests&lt;&#x2F;h2&gt;
&lt;p&gt;When a merge request was locked, a user was still able to submit a drafted review and publish. This issue is now mitigated in the latest release and is assigned CVE-2019-20145.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rafiem&quot;&gt;@rafiem&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 11.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dos-in-the-issue-and-commit-comments-pages&quot;&gt;DoS in the Issue and Commit Comments Pages&lt;&#x2F;h2&gt;
&lt;p&gt;While adding a comment in the Issue and Commit pages, a malicious user can cause  HTTP 500 code when sending a special message. This issue is now mitigated in the latest release and is assigned CVE-2019-20142.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;dfens&quot;&gt;@dfens&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab CE&#x2F;EE 12.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-name-disclosed-through-unsubscribe-link&quot;&gt;Project Name Disclosed Through Unsubscribe Link&lt;&#x2F;h2&gt;
&lt;p&gt;When an unauthenticated user visits an unsubscribe link, a private project name can be disclosed under certain conditions. This issue is now mitigated in the latest release and is assigned CVE-2019-20148.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 8.13 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-name-disclosed-through-notification-settings&quot;&gt;Private Project Name Disclosed Through Notification Settings&lt;&#x2F;h2&gt;
&lt;p&gt;Under specific conditions an user can view the name of a private project through the notifications settings. This issue is now mitigated in the latest release and is assigned CVE-2020-5197.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;iframe&quot;&gt;@iframe&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;
&lt;p&gt;Affects GitLab EE&#x2F;CE 5.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;
&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;
&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.6.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/12/27/gitlab-12-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/12/27/gitlab-12-6-1-released/</id>
<published>2019-12-27T00:00:00+00:00</published>
<updated>2019-12-27T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.6.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;12&#x2F;22&#x2F;gitlab-12-6-released&#x2F;&quot;&gt;this month&#x27;s 12.6.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22170&quot;&gt;Handle forbidden error when checking for knative&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22189&quot;&gt;Eliminate N+1 queries in PipelinesController#index&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;22258&quot;&gt;Fix stack trace highlight for PHP&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.6 released with Security Scorecard and Release Evidence</title>
<release>12.6</release>
<link href='https://about.gitlab.com/releases/2019/12/22/gitlab-12-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/12/22/gitlab-12-6-released/</id>
<published>2019-12-22T00:00:00+00:00</published>
<updated>2019-12-22T00:00:00+00:00</updated>
<author>
<name>Gabe Weaver</name>
</author>
<content type='html'>&lt;p&gt;A common challenge many development leaders face is having visibility into the overall &lt;a href=&quot;&#x2F;solutions&#x2F;dev-sec-ops&#x2F;&quot;&gt;application security&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;solutions&#x2F;compliance&#x2F;&quot;&gt;compliance&lt;&#x2F;a&gt; status of their projects. This month&#x27;s GitLab release helps you more efficiently monitor the application security and release compliance of your projects.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;security-visibility-with-project-security-status&quot;&gt;&lt;strong&gt;Security Visibility with Project Security Status&lt;&#x2F;strong&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab 12.6, a new &lt;a href=&quot;#quickly-understand-your-at-risk-projects-with-project-security-grades&quot;&gt;Project Security Status panel&lt;&#x2F;a&gt; shows how projects are ranked according to their security profile. This makes it easier for development leaders to quickly understand which projects may have greater risk and therefore might warrant additional attention to address specific issues.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;streamline-audits-with-release-evidence&quot;&gt;&lt;strong&gt;Streamline Audits with Release Evidence&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;Almost every enterprise development team is expected to document and demonstrate that each release complies with their organization’s policies, procedures, and controls. Often it means they have a manual processes to save the documentation so that future audits can review the compliance evidence. GitLab 12.6 makes audits and compliance much easier, with a &lt;a href=&quot;#automated-release-evidence-collection-to-support-audits&quot;&gt;release evidence file&lt;&#x2F;a&gt; in the form of a JSON object that includes links to the milestones and issues that were included in the release, which can help to streamline future audits.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;efficiently-manage-and-share-cc-resources&quot;&gt;&lt;strong&gt;Efficiently Manage and Share C&#x2F;C++ Resources&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;Many teams are actively developing new high performance applications in C and C++ and they need the ability to easily store and manage the compiled files and binaries from their projects.  GitLab 12.6 now helps teams writing code in C and C++ to manage and share both privately and publicly the binaries from their projects with the popular &lt;a href=&quot;#manage-cc-packages-via-conan-within-gitlabs-package-registry&quot;&gt;Conan repository built into GitLab&lt;&#x2F;a&gt;. They can now benefit from having source code, automated GitLab CI pipelines and the resulting packages in the same application which will help improve their overall efficiency and velocity.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-more&quot;&gt;&lt;strong&gt;And Much More&lt;&#x2F;strong&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;These are just a few of the highlights in 12.6. Check out the other great updates, such as &lt;a href=&quot;#dependency-scanning-for-java-gradle-projects&quot;&gt;dependency scanning for Java Gradle projects&lt;&#x2F;a&gt; and &lt;a href=&quot;#maintain-a-consolidated-commit-history-with-squash-and-merge-in-merge-trains&quot;&gt;support for squash-and-merge within Merge Trains&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Also, &lt;a href=&quot;https:&#x2F;&#x2F;www.eventbrite.com&#x2F;e&#x2F;gitlab-commit-2020-san-francisco-tickets-73836706577&quot;&gt;registration is open&lt;&#x2F;a&gt; for the next &lt;a href=&quot;https:&#x2F;&#x2F;www.eventbrite.com&#x2F;e&#x2F;gitlab-commit-2020-san-francisco-tickets-73836706577&quot;&gt;GitLab Commit User Conference&lt;&#x2F;a&gt; in San Francisco, January 14.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_6&#x2F;12_6-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.5.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/12/17/gitlab-12-5-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/12/17/gitlab-12-5-5-released/</id>
<published>2019-12-17T00:00:00+00:00</published>
<updated>2019-12-17T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.5.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;11&#x2F;22&#x2F;gitlab-12-5-released&#x2F;&quot;&gt;this month&#x27;s 12.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20902&quot;&gt;Fix error in updating runner session&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;21501&quot;&gt;Fix Asana integration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;21786&quot;&gt;Upgrade Akismet gem to v3.0.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;3772&quot;&gt;Fix unwanted Grafana resets during upgrades&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;3782&quot;&gt;Fix Let&#x27;s Encrypt challenge errors by bumping acme-client version to 2.0.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.0.12, 12.1.17, and 12.2.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/12/16/gitlab-12-2-12-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/12/16/gitlab-12-2-12-release/</id>
<published>2019-12-16T00:00:00+00:00</published>
<updated>2019-12-16T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.0.12, 12.1.17, and 12.2.12 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;h3 id=&quot;backport&quot;&gt;Backport&lt;&#x2F;h3&gt;
&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;sidekiq-reliable-fetch&#x2F;merge_requests&#x2F;14&quot;&gt;Fix infinite retries of interrupted jobs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;dependency-update&quot;&gt;Dependency Update&lt;&#x2F;h3&gt;

&lt;p&gt;The Git dependency has been upgraded to 2.22.2 in order to apply security fixes
detailed
&lt;a href=&quot;https:&#x2F;&#x2F;raw.githubusercontent.com&#x2F;git&#x2F;git&#x2F;master&#x2F;Documentation&#x2F;RelNotes&#x2F;2.22.2.txt&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19604&quot;&gt;CVE-2019-19604&lt;&#x2F;a&gt;
was identified by the GitLab Security Research team. For more information on
that issue, please visit the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-security&#x2F;disclosures&#x2F;blob&#x2F;master&#x2F;003_git_submodule&#x2F;advisory.md&quot;&gt;GitLab Security Research Advisory&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Critical Security Release: 12.5.4, 12.4.6, and 12.3.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/12/10/critical-security-release-gitlab-12-5-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/12/10/critical-security-release-gitlab-12-5-4-released/</id>
<published>2019-12-10T00:00:00+00:00</published>
<updated>2019-12-10T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.5.4, 12.4.6, and 12.3.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-with-potential-remote-code-execution&quot;&gt;Path traversal with potential remote code execution&lt;&#x2F;h2&gt;

&lt;p&gt;Insufficient parameter sanitization for Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19628&quot;&gt;CVE-2019-19628&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-code-via-elasticsearch-integration&quot;&gt;Disclosure of private code via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;When transferring a public project to a private group, private code would be disclosed via the Group Search API provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19629&quot;&gt;CVE-2019-19629&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible. If you are unable to upgrade, consider &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#disabling-elasticsearch&quot;&gt;disabling Elasticsearch&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-git-dependency&quot;&gt;Update Git dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The Git dependency has been upgraded to 2.22.2 in order to apply security fixes detailed &lt;a href=&quot;https:&#x2F;&#x2F;raw.githubusercontent.com&#x2F;git&#x2F;git&#x2F;master&#x2F;Documentation&#x2F;RelNotes&#x2F;2.22.2.txt&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19604&quot;&gt;CVE-2019-19604&lt;&#x2F;a&gt; was identified by the GitLab Security Research team. For more information on that issue, please visit the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-security&#x2F;disclosures&#x2F;blob&#x2F;master&#x2F;003_git_submodule&#x2F;advisory.md&quot;&gt;GitLab Security Research Advisory&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab Omnibus.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.5.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/12/03/gitlab-12-5-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/12/03/gitlab-12-5-3-released/</id>
<published>2019-12-03T00:00:00+00:00</published>
<updated>2019-12-03T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.5.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;2019&#x2F;11&#x2F;22&#x2F;gitlab-12-5-released&#x2F;&quot;&gt;the 12.5.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20174&quot;&gt;Fix &lt;code&gt;ci_cd_settings&lt;&#x2F;code&gt;, &lt;code&gt;project_feature&lt;&#x2F;code&gt; Import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20320&quot;&gt;Ensure the proj route is correct for error details&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20328&quot;&gt;Update EKS help links&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20434&quot;&gt;Flatten exception details in API and controller logs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20572&quot;&gt;Remove auto height on clone button&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20590&quot;&gt;Fix project creation with templates using &#x2F;projects&#x2F;user&#x2F;:id API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20639&quot;&gt;Set the SHA to be merged from push options&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20668&quot;&gt;Fix Crossplane help link&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20772&quot;&gt;Fix autoscrolling in job logs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20834&quot;&gt;Remove extra index on snippets.project_id&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19583&quot;&gt;Geo - Improve query to determine job artifacts to sync when selective sync is enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20171&quot;&gt;Geo - Update limitations on replication&#x2F;verification&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;20324&quot;&gt;Geo - Does not schedule duplicated jobs while backfilling uploads, LFS objects and job artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a new migration, but should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Security Release: 12.5.2, 12.4.5, and 12.3.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/11/27/security-release-gitlab-12-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/11/27/security-release-gitlab-12-5-2-released/</id>
<published>2019-11-27T00:00:00+00:00</published>
<updated>2019-11-27T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.5.2, 12.4.5, and 12.3.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes that were inadvertently not included in our most recent security release. We strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-access-to-grafana-metrics&quot;&gt;Unauthorized access to grafana metrics&lt;&#x2F;h2&gt;

&lt;p&gt;Grafana metrics were unintentionally being exposed to unauthorized users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19262&quot;&gt;CVE-2019-19262&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;d0xing&quot;&gt;@d0xing&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost-dependency&quot;&gt;Update Mattermost dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The Mattermost dependency has been upgraded to 5.14.5 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 12.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab  Security Release: 12.5.1, 12.4.4, and 12.3.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/11/27/security-release-gitlab-12-5-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/11/27/security-release-gitlab-12-5-1-released/</id>
<published>2019-11-27T00:00:00+00:00</published>
<updated>2019-11-27T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.5.1, 12.4.4, and 12.3.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. If you are unable to upgrade, consider &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#disabling-elasticsearch&quot;&gt;disabling Elasticsearch&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Update&lt;&#x2F;strong&gt; Two fixes for GitLab Omnibus inadvertently did not make it into this release, so we are releasing new minor versions in order to include those changes in all versions of GitLab. We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations be updated to the new versions (12.5.2, 12.4.5, 12.3.8) once they are available.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-with-potential-remote-code-execution&quot;&gt;Path traversal with potential remote code execution&lt;&#x2F;h2&gt;

&lt;p&gt;Improper parameter sanitization for Maven package registry could lead to privilege escalation and remote code execution vulnerabilities under certain conditions. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19088&quot;&gt;CVE-2019-19088&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-objects-exposed-through-project-import&quot;&gt;Private objects exposed through project import&lt;&#x2F;h2&gt;

&lt;p&gt;Using the project import feature, it was possible for someone to obtain issue, merge request, and other data from private projects. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19309&quot;&gt;CVE-2019-19309&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-notes-via-elasticsearch-integration&quot;&gt;Disclosure of notes via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;Private notes would be disclosed via the API of the Group Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19086&quot;&gt;CVE-2019-19086&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.17 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible. If you are unable to upgrade, consider &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#disabling-elasticsearch&quot;&gt;disabling Elasticsearch&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-comments-via-elasticsearch-integration&quot;&gt;Disclosure of comments via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;Comments on restricted public projects could be guessed via the Group Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19087&quot;&gt;CVE-2019-19087&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.17 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible. If you are unable to upgrade, consider &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#disabling-elasticsearch&quot;&gt;disabling Elasticsearch&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dns-rebind-ssrf-in-various-chat-notifications&quot;&gt;DNS Rebind SSRF in various chat notifications&lt;&#x2F;h2&gt;

&lt;p&gt;An internal review identified several situations in which particular chat notifications could be used to perform DNS rebind SSRF attacks. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19261&quot;&gt;CVE-2019-19261&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 6.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-vulnerability-status-in-dependency-list&quot;&gt;Disclosure of vulnerability status in dependency list&lt;&#x2F;h2&gt;

&lt;p&gt;It was internally identified that the vulnerability status of a particular dependency was being displayed to unauthenticated users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19256&quot;&gt;CVE-2019-19256&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-commit-count-in-cycle-analytics&quot;&gt;Disclosure of commit count in Cycle Analytics&lt;&#x2F;h2&gt;

&lt;p&gt;Project members with the Guest access level were erronneously able to see the number of commits in the Cycle Analytics area. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19254&quot;&gt;CVE-2019-19254&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exposure-of-related-branch-names&quot;&gt;Exposure of related branch names&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain circumstances, guests and non-members were able to see branch names. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19257&quot;&gt;CVE-2019-19257&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;tags-pushes-from-blocked-users&quot;&gt;Tags pushes from blocked users&lt;&#x2F;h2&gt;

&lt;p&gt;In some situations, a blocked user was still able to push git tags depsite other git access being revoked. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19263&quot;&gt;CVE-2019-19263&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;branches-and-commits-exposed-to-guest-members-via-integration&quot;&gt;Branches and Commits exposed to Guest members via integration&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that using certain integrations a guest user was able to view branch names and commit messages. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19258&quot;&gt;CVE-2019-19258&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-when-adding-users-to-protected-environments&quot;&gt;IDOR when adding users to protected environments&lt;&#x2F;h2&gt;

&lt;p&gt;Non-project members were unintentionally allowed to be added to protected environments. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19259&quot;&gt;CVE-2019-19259&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;former-project-members-able-to-access-repository-information&quot;&gt;Former project members able to access repository information&lt;&#x2F;h2&gt;

&lt;p&gt;Under specific circumstances, a former project member was still able to access repositories from which their access had been removed. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19260&quot;&gt;CVE-2019-19260&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mclaren650sspider&quot;&gt;@mclaren650sspider&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-access-to-grafana-metrics&quot;&gt;Unauthorized access to grafana metrics&lt;&#x2F;h2&gt;

&lt;p&gt;Grafana metrics were unintentionally being exposed to unauthorized users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19262&quot;&gt;CVE-2019-19262&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;d0xing&quot;&gt;@d0xing&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;todos-created-for-former-project-members&quot;&gt;Todos created for former project members&lt;&#x2F;h2&gt;

&lt;p&gt;Under specific circumstances, a former project member would potentially receive Todos even after being removed from the project. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19255&quot;&gt;CVE-2019-19255&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Jimmy Soh for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-mattermost-dependency&quot;&gt;Update Mattermost dependency&lt;&#x2F;h2&gt;

&lt;p&gt;The Mattermost dependency has been upgraded to 5.14.5 in order to mitigate security concerns.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 12.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-aws-secret-keys-on-certain-admin-pages&quot;&gt;Disclosure of AWS secret keys on certain Admin pages&lt;&#x2F;h2&gt;

&lt;p&gt;Certain Admin pages potentially disclosed AWS secret keys in plain text. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19310&quot;&gt;CVE-2019-19310&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-in-group-and-user-profile-fields&quot;&gt;Stored XSS in Group and User profile fields&lt;&#x2F;h2&gt;

&lt;p&gt;Multiple group and user profile fields were not being sanitized properly and potentially resulting in a stored cross-site scripting vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19311&quot;&gt;CVE-2019-19311&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @constructor2019 for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.14 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;forked-project-information-disclosed-via-project-api&quot;&gt;Forked project information disclosed via Project API&lt;&#x2F;h2&gt;

&lt;p&gt;After a project changed to private, previously forked repositories were still able to get information about the private project through the API. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19312&quot;&gt;CVE-2019-19312&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.14 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-in-the-issue-and-commit-comment-pages&quot;&gt;Denial of Service in the issue and commit comment pages&lt;&#x2F;h2&gt;

&lt;p&gt;Certain characters were making it impossible to create, edit, or view issues and commits. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19313&quot;&gt;CVE-2019-19313&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;dfens&quot;&gt;@dfens&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;tokens-stored-in-plaintext&quot;&gt;Tokens stored in plaintext&lt;&#x2F;h2&gt;

&lt;p&gt;Several tokens that were being stored in plaintext are now being encrypted. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-19314&quot;&gt;CVE-2019-19314&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-19&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-19&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;receive-security-release-notifications&quot;&gt;Receive Security Release Notifications&lt;&#x2F;h2&gt;

&lt;p&gt;To receive security release blog notifications delivered to your inbox, visit our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; page.
To receive security release blog notifications via RSS, subscribe to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;security-releases.xml&quot;&gt;RSS feed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.5 with EKS Cluster Creation &amp; Environments Dashboard</title>
<release>12.5</release>
<link href='https://about.gitlab.com/releases/2019/11/22/gitlab-12-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/11/22/gitlab-12-5-released/</id>
<published>2019-11-22T00:00:00+00:00</published>
<updated>2019-11-22T00:00:00+00:00</updated>
<author>
<name>Patrick Deuley</name>
</author>
<content type='html'>&lt;p&gt;To deliver high-quality software as efficiently as possible, enterprises need to support a wide range of infrastructure,
&lt;a href=&quot;https:&#x2F;&#x2F;medium.com&#x2F;gitlab-magazine&#x2F;multi-cloud-maturity-model-2de185c01dd7&quot;&gt;across multiple clouds&lt;&#x2F;a&gt;. This month’s GitLab 12.5 release makes it even easier to
configure, monitor, and manage projects across a variety of configurations.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;create-and-deploy-to-an-eks-cluster-from-gitlab&quot;&gt;Create and deploy to an EKS cluster from GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;Like 85% of enterprises, &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;blog&#x2F;2019&#x2F;11&#x2F;06&#x2F;gitlab-ci-cd-is-for-multi-cloud&#x2F;&quot;&gt;GitLab believes in multicloud&lt;&#x2F;a&gt;. It’s critical that you can deploy to the cloud of your choice as seamlessly as possible. With that in mind, we’re thrilled to announce that you can now &lt;a href=&quot;#easily-create-and-deploy-to-an-eks-cluster&quot;&gt;create Kubernetes clusters on Amazon’s EKS&lt;&#x2F;a&gt; with a few clicks. The workflow is similar to how easy it is to create a cluster with &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;partners&#x2F;technology-partners&#x2F;google-cloud-platform&#x2F;&quot;&gt;Google’s GKE&lt;&#x2F;a&gt;. Simply select EKS, configure a few cluster options, and GitLab will automatically provision the cluster correctly and prepare it so you can easily deploy your applications to it. GitLab eliminates the need to manually perform the complex task of cluster creation.&lt;&#x2F;p&gt;

&lt;p&gt;This feature is behind a feature flag and enabled in GitLab.com.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;provision-multicloud-managed-services-with-crossplane&quot;&gt;Provision multicloud managed services with Crossplane&lt;&#x2F;h3&gt;

&lt;p&gt;Building on our commitment to operational efficiency, we’re thrilled to announce that &lt;a href=&quot;#crossplane-support-in-gitlab-managed-apps&quot;&gt;Crossplane is integrated and deployable as a GitLab Managed App&lt;&#x2F;a&gt;. Crossplane removes the friction and effort of provisioning and managing cloud service dependencies by allowing admins to declaratively provision and securely consume managed services from the cloud of your choice, including GCP, AWS, and Azure. Integration with Auto DevOps makes spinning up hosted resources on the cloud as simple as declaring a CI variable.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;view-environment-status-at-a-glance&quot;&gt;View environment status at a glance&lt;&#x2F;h3&gt;

&lt;p&gt;You&#x27;re faced with frequent application changes, all making their way toward production. It’s hard to track changes as they flow through your various dev, staging and prod environments. GitLab&#x27;s new &lt;a href=&quot;#environments-dashboard&quot;&gt;Environments Dashboard&lt;&#x2F;a&gt; surfaces that information, providing a single point of access to the status of environments in all groups and projects. This means you can identify and triage problems (for example, “Is an environment not working because code is being deployed, or because it’s actually broken?”) quickly and visually.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h3&gt;

&lt;p&gt;12.5 is a big release, and there’s a lot more to see. Highlights include &lt;a href=&quot;#code-intelligence-powered-by-sourcegraph&quot;&gt;Sourcegraph integration&lt;&#x2F;a&gt; and a host of new security improvements. Read on to get the details!&lt;&#x2F;p&gt;

&lt;p&gt;We’d love to meet you in person. If you&#x27;re coming to AWS re:Invent December 2 - 6, visit us at booth #1620. Also, &lt;a href=&quot;https:&#x2F;&#x2F;www.eventbrite.com&#x2F;e&#x2F;gitlab-commit-2020-san-francisco-tickets-73836706577&quot;&gt;registration&lt;&#x2F;a&gt; is now open for the next &lt;a href=&quot;https:&#x2F;&#x2F;www.eventbrite.com&#x2F;e&#x2F;gitlab-commit-2020-san-francisco-tickets-73836706577&quot;&gt;GitLab Commit User Conference&lt;&#x2F;a&gt; in San Francisco, January 14.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_5&#x2F;12_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.4.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/11/18/gitlab-12-4-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/11/18/gitlab-12-4-3-released/</id>
<published>2019-11-18T00:00:00+00:00</published>
<updated>2019-11-18T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.4.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;11&#x2F;04&#x2F;gitlab-12-4-2-released&#x2F;&quot;&gt;the 12.4.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19397&quot;&gt;Update docs on how to enable partial clones&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19507&quot;&gt;Specify hide dismissed vulnerabilities availability&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19676&quot;&gt;Fix admin welcome illustration not found&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19734&quot;&gt;Fix Bitbucket Cloud importer pull request state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19184&quot;&gt;Only enable protected paths for POST requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19715&quot;&gt;Remove ES parent relation for project snippets&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19230&quot;&gt;Update conan docs to say 12.5&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.4.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/11/04/gitlab-12-4-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/11/04/gitlab-12-4-2-released/</id>
<published>2019-11-04T00:00:00+00:00</published>
<updated>2019-11-04T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.4.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;10&#x2F;22&#x2F;gitlab-12-4-released&#x2F;&quot;&gt;this month&#x27;s 12.4.0
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;18810&quot;&gt;Update feature tier for CI_JOB_TOKEN&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;18847&quot;&gt;Add param to catch fo fix failing SAST job&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;18902&quot;&gt;Increased deactivation threshold to 180 days&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;18908&quot;&gt;Use long_timeout for fetch_internal_remote GRPC&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;18926&quot;&gt;Clarify available feature flags for productivity analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;18948&quot;&gt;Removes old collapsible classes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19025&quot;&gt;Fix feature flag check for productivity analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19053&quot;&gt;Clean up duplicate indexes on ci_trigger_requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19092&quot;&gt;Add extra sentence about registry to AutoDevOps popup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19124&quot;&gt;Fix project imports not working with serialized data&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19148&quot;&gt;Fixes welcome icons not showing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19327&quot;&gt;Fix Prometheus duplicate metrics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19335&quot;&gt;Fix ref switcher not working on Microsoft Edge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19373&quot;&gt;Fix migration to sync issuables with unknown states&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19461&quot;&gt;Extend gRPC timeouts for Rake tasks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;19494&quot;&gt;Resolve &quot;images stopped loading: signed URLs of uploads expire earlier than redirect cache&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.4.1, 12.3.6, and 12.2.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/</id>
<published>2019-10-30T00:00:00+00:00</published>
<updated>2019-10-30T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.4.1, 12.3.6, and 12.2.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;source-branch-of-a-mr-could-be-removed-by-an-unauthorised-user&quot;&gt;Source branch of a MR could be removed by an unauthorised user&lt;&#x2F;h2&gt;

&lt;p&gt;An unauthorised member of the target project could delete the source branch of MR. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18446&quot;&gt;CVE-2019-18446&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.15 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-group-members-could-be-listed&quot;&gt;Private group members could be listed&lt;&#x2F;h2&gt;

&lt;p&gt;An unauthorised user could view the members of a private group. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18447&quot;&gt;CVE-2019-18447&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-system-notes-via-elasticsearch-integration&quot;&gt;Disclosure of System Notes via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;System Notes would be disclosed with the Comments Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18460&quot;&gt;CVE-2019-18460&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 8.8.3 and later&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-comments-via-elasticsearch-integration&quot;&gt;Disclosure of Private Comments via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;Private comments in restricted groups would be disclosed with the Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18456&quot;&gt;CVE-2019-18456&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.17 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confirm-existence-of-private-repositories&quot;&gt;Confirm existence of private repositories&lt;&#x2F;h2&gt;

&lt;p&gt;By using brute-force an unauthorised user could check if a private repository exists. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18448&quot;&gt;CVE-2019-18448&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;brxxn&quot;&gt;@brxxn&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-group-membership-could-be-disclosed&quot;&gt;Private group membership could be disclosed&lt;&#x2F;h2&gt;

&lt;p&gt;Unauthorised users were able to read private groups membership using the autocomplete endpoint. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18449&quot;&gt;CVE-2019-18449&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-project-labels&quot;&gt;Disclosure of Project Labels&lt;&#x2F;h2&gt;

&lt;p&gt;Project labels could be disclosed through the GitLab API to unauthorised users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18450&quot;&gt;CVE-2019-18450&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-project-path-and-labels&quot;&gt;Disclosure of Private Project Path and Labels&lt;&#x2F;h2&gt;

&lt;p&gt;When an issue was moved to a public project from a private one, the associated private labels and the private project namespace would be disclosed through the GitLab API. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18452&quot;&gt;CVE-2019-18452&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;uncontrolled-resource-consumption-due-to-nested-graphql-queries&quot;&gt;Uncontrolled Resource Consumption due to Nested GraphQL Queries&lt;&#x2F;h2&gt;

&lt;p&gt;Nested GraphQL queries could be built so that it resulted a denial of service of the affected page. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18455&quot;&gt;CVE-2019-18455&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;freddd&quot;&gt;@freddd&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-on-comments&quot;&gt;Improper access control on comments&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue discovered allowed a demoted user to add comments via email. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18453&quot;&gt;CVE-2019-18453&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;hx01&quot;&gt;@hx01&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sentry-token-access-control&quot;&gt;Sentry Token Access Control&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue discovered in the Sentry tokens handling that allowed access to a demoted user . The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18457&quot;&gt;CVE-2019-18457&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;authorisation-check-for-project-transfer-option&quot;&gt;Authorisation check for Project Transfer option&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization check needed for transfer projects to another group feature allowed users with developer rights to move projects. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18458&quot;&gt;CVE-2019-18458&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-wiki-pages-using-rdoc&quot;&gt;XSS in Wiki Pages Using RDoc&lt;&#x2F;h2&gt;

&lt;p&gt;The link validation for RDoc wiki pages contained an issue that could get exploited to a persistent XSS vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18454&quot;&gt;CVE-2019-18454&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;untrusted-input-could-be-used-for-internal-redirect&quot;&gt;Untrusted Input could be used for Internal Redirect&lt;&#x2F;h2&gt;

&lt;p&gt;An internal review determined an issue in the InternalRedirect filtering allowing for open redirect attacks. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18451&quot;&gt;CVE-2019-18451&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7.4 and later&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;access-control-for-protected-environments&quot;&gt;Access control for protected environments&lt;&#x2F;h2&gt;

&lt;p&gt;An internal review determined that groups could maintain access to protected environments even after removal. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18459&quot;&gt;CVE-2019-18459&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 to 12.3.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-sub-group-path-disclosure&quot;&gt;Private Sub Group path Disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The private sub group path was disclosed when a sub group epic was added to a public group. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18461&quot;&gt;CVE-2019-18461&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-group-packages-list&quot;&gt;Disclosure of Group Packages List&lt;&#x2F;h2&gt;

&lt;p&gt;An issue was found that allowed an unauthorised user to list the packages of a group. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18463&quot;&gt;CVE-2019-18463&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-repository-name-disclosure&quot;&gt;Private Repository Name Disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;An issue was found that allowed an unauthorised user to confirm the name of a private repository. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-18462&quot;&gt;CVE-2019-18462&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mclaren650sspider&quot;&gt;@mclaren650sspider&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.4 released with improved Merge Request Dependencies and Audit API</title>
<release>12.4</release>
<link href='https://about.gitlab.com/releases/2019/10/22/gitlab-12-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/10/22/gitlab-12-4-released/</id>
<published>2019-10-22T00:00:00+00:00</published>
<updated>2019-10-22T00:00:00+00:00</updated>
<author>
<name>Fabian Zimmer</name>
</author>
<content type='html'>&lt;p&gt;GitLab 12.4 is released with several improvements for governance including an Audit API, Code Owner approvals for Protected Branches, and Access Control for Pages. Merge Request Dependencies help you orchestrate work across teams, while so many more exciting features help you be more efficient and deliver better software faster!&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;merge-request-dependencies&quot;&gt;Merge Request Dependencies&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab can help you improve visibility, collaboration, and productivity. When developers work together to achieve a larger goal, their small changes often need to be merged in a specific sequence to work as intended. To simplify this, &lt;a href=&quot;#merge-request-dependencies&quot;&gt;Merge Request Dependencies&lt;&#x2F;a&gt; allow dependencies to be defined in merge requests, preventing changes from being merged in the wrong order while also improving the visibility of dependencies during code review. This feature was introduced as &lt;em&gt;Cross-Project&lt;&#x2F;em&gt; Merge Request Dependencies in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;08&#x2F;22&#x2F;gitlab-12-2-released&#x2F;#cross-project-merge-request-dependencies&quot;&gt;12.2&lt;&#x2F;a&gt; but has been renamed to &lt;em&gt;Merge Request Dependencies&lt;&#x2F;em&gt;, and expanded to support more types of dependencies. This includes both cross-project and Merge Request Dependencies within &lt;em&gt;the same&lt;&#x2F;em&gt; project.&lt;&#x2F;p&gt;

&lt;p&gt;We recognize governance is important to you. Here are a few of the key features in 12.4 that will make governance easier for you.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;audit-events-api&quot;&gt;Audit Events API&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab helps you achieve end-to-end visibility across your development lifecycle while streamlining processes. To facilitate this, GitLab &lt;a href=&quot;&#x2F;handbook&#x2F;product&#x2F;gitlab-the-product&#x2F;#plays-well-with-others&quot;&gt;plays well with others&lt;&#x2F;a&gt; and, in 12.4, is introducing an API for instance-level audit events. &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;audit_events.html&quot;&gt;Audit Events&lt;&#x2F;a&gt; are a powerful way to better understand adherance to policies. Using the new &lt;a href=&quot;#audit-events-api&quot;&gt;Audit Events API&lt;&#x2F;a&gt;, administrators can obtain events programmatically and better enable powerful alerting and monitoring that meets specific needs.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;pages-access-control-on-gitlabcom&quot;&gt;Pages Access Control on GitLab.com&lt;&#x2F;h3&gt;

&lt;p&gt;Access control for &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;pages&#x2F;&quot;&gt;Pages&lt;&#x2F;a&gt; has been &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-foss&#x2F;issues&#x2F;33422&quot;&gt;available for self-managed&lt;&#x2F;a&gt; but is now &lt;a href=&quot;#access-control-for-pages-is-now-enabled-on-gitlabcom&quot;&gt;available on GitLab.com&lt;&#x2F;a&gt;. It allows an authorized administrator to restrict access to a Pages site or make it available to the public. This is a community contribution that we are very excited to have enabled on GitLab.com!&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;code-owner-approvals-for-protected-branches&quot;&gt;Code Owner Approvals for Protected Branches&lt;&#x2F;h3&gt;

&lt;p&gt;Another feature to aid in governance is the new &lt;a href=&quot;#code-owner-approvals-for-protected-branches&quot;&gt;Code Owner Approvals for Protected Branches&lt;&#x2F;a&gt;. Using merge request approvals to restrict how code is pushed to protected branches is helpful for promoting code quality and implementing compliance controls. However, not all merge requests target stable branches, and not all stable branches need the same controls. In GitLab 12.4, it is possible to prevent directly pushing changes to files or merging changes without the code owner&#x27;s approval for specific branches.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h3&gt;

&lt;p&gt;There are so many great features within GitLab 12.4 that we couldn’t possibly highlight them all. A few favorites include &lt;a href=&quot;#notifications-for-releases&quot;&gt;Notifications for Releases&lt;&#x2F;a&gt;, the ability to &lt;a href=&quot;#view-pod-logs-from-any-environment&quot;&gt;View Pod Logs from Any Environment&lt;&#x2F;a&gt;, and &lt;a href=&quot;#private-project-support-for-online-view-of-html-artifacts&quot;&gt;Private Project Support for Online View of HTML Artifacts&lt;&#x2F;a&gt;. Keep reading below to get details on every feature!&lt;&#x2F;p&gt;

&lt;p&gt;Be sure to catch the &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=YUXeodJgke0&quot;&gt;recap&lt;&#x2F;a&gt; of our first European user conference from October 9th. The next &lt;a href=&quot;https:&#x2F;&#x2F;www.eventbrite.com&#x2F;e&#x2F;gitlab-commit-2020-san-francisco-tickets-73836706577&quot;&gt;GitLab Commit User Conference&lt;&#x2F;a&gt; will be in San Francisco in January. &lt;a href=&quot;https:&#x2F;&#x2F;www.eventbrite.com&#x2F;e&#x2F;gitlab-commit-2020-san-francisco-tickets-73836706577&quot;&gt;Registration&lt;&#x2F;a&gt; is now open.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_4&#x2F;12_4-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 12.3.5, 12.2.8, and 12.1.14</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/10/07/security-release-gitlab-12-dot-3-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/10/07/security-release-gitlab-12-dot-3-dot-5-released/</id>
<published>2019-10-07T00:00:00+00:00</published>
<updated>2019-10-07T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.3.5, 12.2.8, and 12.1.14 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all &lt;strong&gt;GitLab EE&lt;&#x2F;strong&gt; installations &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-merge-requests-and-issues-via-elasticsearch-integration&quot;&gt;Disclosure of Private Merge Requests and Issues via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;Private merge requests and issues would be disclosed with the Group Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15590&quot;&gt;CVE-2019-15590&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.5 and later.
GitLab CE versions are unaffected.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;fixed-geo-not-syncing-new-lfs-files&quot;&gt;Fixed Geo not syncing new LFS files&lt;&#x2F;h2&gt;

&lt;p&gt;We &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues&#x2F;32696&quot;&gt;found a regression&lt;&#x2F;a&gt; in the GitLab Geo code that makes it very likely that any new LFS objects are not synchronized to secondary nodes. This means that these LFS files cannot be pulled from secondary nodes and impacts Disaster Recovery.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.1 and later.
GitLab CE versions are unaffected.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; LFS and Geo are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.3.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/10/03/gitlab-12-dot-3-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/10/03/gitlab-12-dot-3-dot-4-released/</id>
<published>2019-10-03T00:00:00+00:00</published>
<updated>2019-10-03T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.3.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;09&#x2F;22&#x2F;gitlab-12-3-released&#x2F;&quot;&gt;this month&#x27;s 12.3.0
release&lt;&#x2F;a&gt; and its previous patches.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17306&quot;&gt;Fix &quot;cannot merge&quot; icon showing in dropdown when user can merge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17490&quot;&gt;Fix CI detection of GitLab and GitLab FOSS projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17844&quot;&gt;Fix pipelines for merge requests in project exports&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;16674&quot;&gt;Update documentation for License-Check rule&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17556&quot;&gt;Hide All members rule from approvers list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17401&quot;&gt;Service Desk reply emails rejected when project issues set to &quot;Only Project Members&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17633&quot;&gt;Resolve &quot;Geo: LFS not being synced&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 12.3.3, 12.2.7, and 12.1.13</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/10/02/security-release-gitlab-12-dot-3-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/10/02/security-release-gitlab-12-dot-3-dot-3-released/</id>
<published>2019-10-02T00:00:00+00:00</published>
<updated>2019-10-02T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.3.3, 12.2.7, and 12.1.13 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-code-merge-requests-and-commits-via-elasticsearch-integration&quot;&gt;Disclosure of Private Code, Merge Requests and Commits via Elasticsearch integration&lt;&#x2F;h2&gt;

&lt;p&gt;Private code, merge requests and commits would be disclosed with the Group Search feature provided by Elasticsearch integration. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5487&quot;&gt;CVE-2019-5487&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.17 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above &lt;strong&gt;with enabled&lt;&#x2F;strong&gt; Elasticsearch integration are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-container-and-dependency-scanning-reports&quot;&gt;Disclosure of container and dependency scanning reports&lt;&#x2F;h2&gt;

&lt;p&gt;Container and dependency scanning reports were available via the merge request widget even though public pipelines were disabled. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15591&quot;&gt;CVE-2019-15591&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.3.2, 12.2.6, and 12.1.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/</id>
<published>2019-09-30T00:00:00+00:00</published>
<updated>2019-09-30T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.3.2, 12.2.6, and 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;issues?label_name%5B%5D=security&amp;amp;scope=all&amp;amp;state=opened&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-markdown-preview-using-mermaid&quot;&gt;XSS in Markdown Preview Using Mermaid&lt;&#x2F;h2&gt;

&lt;p&gt;The Mermaid plugin was updated in GitLab 12.1 to address an XSS issue in markdown preview. The Mermaid plugin was previously updated in 12.2 and 12.3. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15586&quot;&gt;CVE-2019-15586&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;brainpanic&quot;&gt;@brainpanic&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.1.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-email-verification-using-salesforce-authentication&quot;&gt;Bypass Email Verification using Salesforce Authentication&lt;&#x2F;h2&gt;

&lt;p&gt;The Salesforce login integration could be used by an attacker to create an account that bypassed domain restrictions and email verification requirements. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5486&quot;&gt;CVE-2019-5486&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;account-takeover-using-saml&quot;&gt;Account Takeover using SAML&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab SAML integration had a validation issue that permitted an attacker to takeover another user&#x27;s account. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15585&quot;&gt;CVE-2019-15585&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @mishre for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.12 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;uncontrolled-resource-consumption-in-markdown-using-mermaid&quot;&gt;Uncontrolled Resource Consumption in Markdown using Mermaid&lt;&#x2F;h2&gt;

&lt;p&gt;Markdown fields contained an input validation issue that resulted in a denial of service of the affected page. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15584&quot;&gt;CVE-2019-15584&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;@ryhmnlfj&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-project-path-and-labels&quot;&gt;Disclosure of Private Project Path and Labels&lt;&#x2F;h2&gt;

&lt;p&gt;When an issue was moved to a public project from a private one, the associated private labels and the private project namespace would be disclosed through the GitLab API. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15583&quot;&gt;CVE-2019-15583&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-assignees-via-milestones&quot;&gt;Disclosure of Assignees via Milestones&lt;&#x2F;h2&gt;

&lt;p&gt;The assignee(s) of a confidential issue in a private project would be disclosed to a guest via milestones. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15579&quot;&gt;CVE-2019-15579&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.2.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-project-path-via-unsubscribe-link&quot;&gt;Disclosure of Project Path via Unsubscribe Link&lt;&#x2F;h2&gt;

&lt;p&gt;The path of a private project, that used to be public, would be disclosed in the unsubscribe email link of issues and merge requests. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15578&quot;&gt;CVE-2019-15578&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.4.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-project-milestones-via-groups&quot;&gt;Disclosure of Project Milestones via Groups&lt;&#x2F;h2&gt;

&lt;p&gt;Project milestones would be disclosed via groups browsing. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15577&quot;&gt;CVE-2019-15577&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @uzsunny](https:&#x2F;&#x2F;hackerone.com&#x2F;uzsunnyz?type=user) for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.0.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-system-notes-via-graphql&quot;&gt;Disclosure of Private System Notes via GraphQL&lt;&#x2F;h2&gt;

&lt;p&gt;Private system notes would be disclosed via GraphQL endpoint. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15576&quot;&gt;CVE-2019-15576&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-command-injection-via-api&quot;&gt;GIT Command Injection via API&lt;&#x2F;h2&gt;

&lt;p&gt;GIT command injection was possible via the API through the &lt;code&gt;blobs&lt;&#x2F;code&gt; scope. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15575&quot;&gt;CVE-2019-15575&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; We recommend to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;&#x2F;administration&#x2F;gitaly&#x2F;#rotating-a-gitaly-authentication-token&quot;&gt;rotate the Gitaly authentication token&lt;&#x2F;a&gt; as an extra security measure.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bypass-user-blocking-via-cicd-token&quot;&gt;Bypass User Blocking via CI&#x2F;CD token&lt;&#x2F;h2&gt;

&lt;p&gt;A blocked user would be able to use GIT clone and pull if he had obtained a CI&#x2F;CD token before. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15589&quot;&gt;CVE-2019-15589&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;logan5&quot;&gt;@logan5&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-adding-groups-to-protected-environments&quot;&gt;IDOR Adding Groups to Protected Environments&lt;&#x2F;h2&gt;

&lt;p&gt;An IDOR was discovered that allowed a maintainer to add any private group to a protected environment. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15582&quot;&gt;CVE-2019-15582&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-group-membership-via-merge-request-approval-rules&quot;&gt;Disclosure of Group Membership via Merge Request Approval Rules&lt;&#x2F;h2&gt;

&lt;p&gt;An IDOR was discovered that allowed a project owner or maintainer to see the members of any private group via merge request approval rules. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15581&quot;&gt;CVE-2019-15581&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.13 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-head-pipeline-via-blocking-merge-request-feature&quot;&gt;Disclosure of Head Pipeline via Blocking Merge Request Feature&lt;&#x2F;h2&gt;

&lt;p&gt;When using the blocking merge request feature, it was possible for an unauthenticated user to see the head pipeline data of a public project even though pipeline visibility was restricted. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15580&quot;&gt;CVE-2019-15580&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;grafana-update&quot;&gt;Grafana update&lt;&#x2F;h2&gt;

&lt;p&gt;We have patched Grafana, which is included in the GitLab Omnibus package for CVE-2018-19039.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.3.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/09/24/gitlab-12-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/09/24/gitlab-12-3-1-released/</id>
<published>2019-09-24T00:00:00+00:00</published>
<updated>2019-09-24T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.3.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;09&#x2F;22&#x2F;gitlab-12-3-released&#x2F;&quot;&gt;this month&#x27;s 12.3.0
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17356&quot;&gt;Fix ordering of issue board lists not being persisted.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17406&quot;&gt;Fix error when duplicate users are merged in approvers list.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17466&quot;&gt;Fix bug that caused a merge to show an error message.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17484&quot;&gt;Fix CSS leak in job log.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.3 released with Web Application Firewall and Productivity Analytics</title>
<release>12.3</release>
<link href='https://about.gitlab.com/releases/2019/09/22/gitlab-12-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/09/22/gitlab-12-3-released/</id>
<published>2019-09-22T00:00:00+00:00</published>
<updated>2019-09-22T00:00:00+00:00</updated>
<author>
<name>Kai Armstrong</name>
</author>
<content type='html'>&lt;p&gt;This month&#x27;s release of GitLab 12.3 is especially exciting following an eventful week in which we hosted our first GitLab Users Conference in Brooklyn New York and announced the completion of a &lt;a href=&quot;&#x2F;blog&#x2F;2019&#x2F;09&#x2F;17&#x2F;gitlab-series-e-funding&#x2F;&quot;&gt;$268 million Series E round of fundraising&lt;&#x2F;a&gt;; which will enable us to invest in making all of our DevOps platform offerings, including monitoring, security, and planning, best in class.&lt;&#x2F;p&gt;
&lt;h2 class=&quot;intro-header&quot; id=&quot;web-application-firewall&quot;&gt;Web Application Firewall&lt;&#x2F;h2&gt;

&lt;p&gt;Modern web applications are exposed to new risk from many places, including potentially every client that connects and sends traffic. A Web Application Firewall (WAF) provides monitoring and rules to protect applications in production.  In GitLab 12.3 we are shipping our first iteration of a &lt;a href=&quot;#web-application-firewall-for-kubernetes-ingress&quot;&gt;Web Application Firewall&lt;&#x2F;a&gt; built into the GitLab SDLC platform. Its focus is on monitoring and reporting of security concerns related to your Kubernetes clusters. Future releases will expand the WAF capabilities to block malicious traffic, create and manage firewall rules, and inform earlier stages of development to take action to further reduce risk.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;productivity-analytics---first-release&quot;&gt;Productivity Analytics - First Release&lt;&#x2F;h3&gt;

&lt;p&gt;Software delivery teams everywhere need the right information and insight in order to improve their productivity and efficiency. Too often, invisible bottlenecks and roadblocks force teams to wait and waste time rather than delivering new features. Beginning with 12.3, we’re starting to release new analytics features to help teams and leaders better understand their overall productivity and effectiveness for both Groups and Projects. &lt;a href=&quot;#productivity-analytics&quot;&gt;Productivity Analytics&lt;&#x2F;a&gt; will help teams and their leaders discover best practices to improve productivity. Initially focusing on the time it takes to merge MRs, GitLab will make it possible to drill into the data and learn insight that can guide future improvements. In many organizations, leaders are responsible for multiple projects and &lt;a href=&quot;#analytics-workspace&quot;&gt;Group level analytics workspace&lt;&#x2F;a&gt; is intended to provide productivity and performance insight and visibility across multiple projects. These two features are only the first in a series of updates that will specifically improve visibility and insight so that teams can become more efficient.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;enhanced-compliance&quot;&gt;Enhanced Compliance&lt;&#x2F;h3&gt;

&lt;p&gt;Compliance with policies and procedures is a common challenge that software teams face. For many GitLab users, having development teams collaborate in a single application makes compliance easier. In this 12.3 release of GitLab, we&#x27;re including several features that will continue to streamline efforts to reduce compliance risks. &lt;a href=&quot;#leverage-merge-request-approvals-to-prevent-merging-prohibited-licenses-mvc&quot;&gt;MR approval rules&lt;&#x2F;a&gt; provides a way to prevent teams from merging in code that introduces unsupported licenses. &lt;a href=&quot;#api-to-require-merge-request-approval-by-code-owners-per-branch&quot;&gt;Require code owner approval per branch&lt;&#x2F;a&gt; makes it possible to protect branches and require code owner approval of changes.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h3&gt;

&lt;p&gt;There are so many great features within GitLab 12.3 that we couldn’t possibly highlight them all (even though we really want to). Better resource visibility with &lt;a href=&quot;#global-view-for-group-level-cluster-deploymentsenvironments&quot;&gt;Global view for group-level cluster deployments&#x2F;environments&lt;&#x2F;a&gt;, more efficient Git fetches with &lt;a href=&quot;#compress-git-ref-advertisements-over-http&quot;&gt;Compress Git ref advertisements over HTTP&lt;&#x2F;a&gt;, and more efficient reviews with &lt;a href=&quot;#keyboard-shortcut-for-next-and-previous-unresolved-discussion&quot;&gt;Keyboard Shortcut for Next and Previous Unresolved Discussion&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p class=&quot;alert alert-info text-center&quot;&gt;Register now to join us at our first &lt;a href=&quot;&#x2F;events&#x2F;commit&#x2F;&quot;&gt;European user conference in London on Oct 9!&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_3&#x2F;12_3-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.1.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/09/19/gitlab-12-1-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/09/19/gitlab-12-1-11-released/</id>
<published>2019-09-19T00:00:00+00:00</published>
<updated>2019-09-19T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.1.11 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a critical regression in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;09&#x2F;10&#x2F;critical-security-release-gitlab-12-dot-2-dot-5-released&#x2F;&quot;&gt;the 12.1.9 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-and-enterprise-edition&quot;&gt;GitLab Community and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab&#x2F;merge_requests&#x2F;17029&quot;&gt;Fixes an issue that prevents no-downtime upgrades&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 12.2.5, 12.1.9, and 12.0.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/09/10/critical-security-release-gitlab-12-dot-2-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/09/10/critical-security-release-gitlab-12-dot-2-dot-5-released/</id>
<published>2019-09-10T00:00:00+00:00</published>
<updated>2019-09-10T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.2.5, 12.1.9, and 12.0.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-template-functionality-could-be-used-to-access-restricted-project-data&quot;&gt;Project Template Functionality Could Be Used to Access Restricted Project Data&lt;&#x2F;h2&gt;

&lt;p&gt;Project creation using custom group templates had a permission issue that
allowed an unauthorized user to clone a project to which they had partial
visibility, allowing them to see the restricted information. The issue is
now mitigated in the latest release and is assigned
&lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-16170&quot;&gt;CVE-2019-16170&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this
vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version
above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-enhancements-in-gitlab-pages&quot;&gt;Security Enhancements in GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages is updated in this release with several security enhancements
to GitLab Pages Access Control. Improvements include use of the &lt;code&gt;Secure&lt;&#x2F;code&gt;
flag on the session cookie, and shortening of the valid session time.&lt;&#x2F;p&gt;

&lt;p&gt;These improvements were identified as part of an internal security review.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;nginx-update&quot;&gt;Nginx Update&lt;&#x2F;h2&gt;

&lt;p&gt;We have patched Nginx, which is included in the GitLab Omnibus package for CVE-2019-9511, CVE-2019-9513, and CVE-2019-9516.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-updates&quot;&gt;Mattermost Updates&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve included respective Mattermost security versions in 12.2, 12.1 and 12.0.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;Mattermost security updates page&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.2.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/09/02/gitlab-12-2-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/09/02/gitlab-12-2-4-released/</id>
<published>2019-09-02T00:00:00+00:00</published>
<updated>2019-09-02T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.2.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;08&#x2F;29&#x2F;security-release-gitlab-12-dot-2-dot-3-released&#x2F;&quot;&gt;this month&#x27;s 12.2.3 release&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31821&quot;&gt;Match syntax highlighting theme for line expansion rows&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32134&quot;&gt;Fix issuable sidebar icon of notification disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32171&quot;&gt;Fix N+1 Gitaly calls in &#x2F;api&#x2F;v4&#x2F;projects&#x2F;:id&#x2F;issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32178&quot;&gt;Removes double &#x27;%&#x27; in text-box description&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32183&quot;&gt;Add helpers to exactly undo cleanup_concurrent_column_rename&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32234&quot;&gt;Fix Piwik templating&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32286&quot;&gt;Fix snippets API not working with visibility level&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32502&quot;&gt;Update Mermaid to v8.2.6 &lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32448&quot;&gt;Fix permissions check in &lt;code&gt;RelativeLinkFilter&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;15598&quot;&gt;Fix group hooks not firing in PostReceive&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;3551&quot;&gt;Update Mattermost to 5.13.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.2.3, 12.1.8, and 12.0.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/</id>
<published>2019-08-29T00:00:00+00:00</published>
<updated>2019-08-29T00:00:00+00:00</updated>
<author>
<name>Andrew Kelly</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.2.3, 12.1.8, and 12.0.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=%E2%9C%93&amp;amp;state=opened&amp;amp;label_name[]=security&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;kubernetes-integration-server-side-request-forgery&quot;&gt;Kubernetes Integration Server-Side Request Forgery&lt;&#x2F;h2&gt;

&lt;p&gt;An internal review determined that the protections against SSRF attacks on the Kubernetes integration are insufficient, which could have allowed an attacker to request any local network resource accessible from the GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15728&quot;&gt;CVE-2019-15728&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;server-side-request-forgery-in-jira-integration&quot;&gt;Server-Side Request Forgery in Jira Integration&lt;&#x2F;h2&gt;

&lt;p&gt;An internal review determined that the Jira integration contains a SSRF vulnerability as a result of a bypass of the current protection mechanisms against this type of attack, which would allow sending requests to any resources accessible in the local network by the GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15730&quot;&gt;CVE-2019-15730&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.14 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-protection-against-credential-stuffing-attacks&quot;&gt;Improved Protection Against Credential Stuffing Attacks&lt;&#x2F;h2&gt;

&lt;p&gt;A reCaptcha challenge will be required after certain failed login attempt conditions are met. This feature is disabled by default and can be enabled through Admin Area &amp;gt; Settings &amp;gt; Reporting &amp;gt; Enable reCAPTCHA for login.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;markdown-clientside-resource-exhaustion&quot;&gt;Markdown Clientside Resource Exhaustion&lt;&#x2F;h2&gt;

&lt;p&gt;Particular mathematic expressions in GitLab Markdown can exhaust client resources. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15722&quot;&gt;CVE-2019-15722&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please note that Merge Requests, Issues, Wiki Pages, and other areas with GitLab Markdown containing lots of math formulae or long formulae may need to be split up.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;abdilahrf_&quot;&gt;@abdilahrf_&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.15 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipeline-status-disclosure&quot;&gt;Pipeline Status Disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;An internal endpoint unintentionally disclosed information about the last pipeline ran for a merge request. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15729&quot;&gt;CVE-2019-15729&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-runner-authorization-issue&quot;&gt;Group Runner Authorization Issue&lt;&#x2F;h2&gt;

&lt;p&gt;An internal endpoint unintentionally allowed group maintainers to view and edit group runner settings. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15721&quot;&gt;CVE-2019-15721&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-metrics-disclosure&quot;&gt;CI Metrics Disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;Insufficient permission checks were being applied when displaying CI results, potentially exposing some CI metrics data to unauthorized users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15727&quot;&gt;CVE-2019-15727&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-ip-disclosed-by-embedded-image-and-media&quot;&gt;User IP Disclosed by Embedded Image and Media&lt;&#x2F;h2&gt;

&lt;p&gt;Embedded images and media files in markdown could be pointed to an arbitrary server, which would reveal the IP address of clients requesting the file from that server. This issue can be mitigated by enabling an &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;security&#x2F;asset_proxy.html&quot;&gt;asset proxy&lt;&#x2F;a&gt; and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15726&quot;&gt;CVE-2019-15726&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;iframe&quot;&gt;@iframe&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;label-description-html-injection&quot;&gt;Label Description HTML Injection&lt;&#x2F;h2&gt;

&lt;p&gt;Label descriptions were found to be vulnerable to HTML injection. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15724&quot;&gt;CVE-2019-15724&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-in-epic-notes-api&quot;&gt;IDOR in Epic Notes API&lt;&#x2F;h2&gt;

&lt;p&gt;An IDOR was discovered in the epic notes API which could result in disclosure of private milestones, labels, and other information. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15725&quot;&gt;CVE-2019-15725&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;push-rule-bypass&quot;&gt;Push Rule Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability that allowed users to bypass the push rules of a project had been indirectly fixed in a previous GitLab release. This version improves the fix to make it more robust. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15723&quot;&gt;CVE-2019-15723&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE versions 11.9.4-11.10.0. Please note that this was already fixed in 11.10.1.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-visibility-restriction-bypass&quot;&gt;Project Visibility Restriction Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that the project import API could be used to bypass project visibility restrictions. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15732&quot;&gt;CVE-2019-15732&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;logan5&quot;&gt;@logan5&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-discussion-restriction-bypass&quot;&gt;Merge Request Discussion Restriction Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that non-members were able to comment on merge requests despite the repository being set to allow only project members to do so. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15731&quot;&gt;CVE-2019-15731&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-merge-request-ids&quot;&gt;Disclosure of Merge Request IDs&lt;&#x2F;h2&gt;

&lt;p&gt;An internal review determined that under certain conditions, merge request IDs were being disclosed via email. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15738&quot;&gt;CVE-2019-15738&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;weak-authentication-in-certain-account-actions&quot;&gt;Weak Authentication In Certain Account Actions&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that certain account actions needed improved authentication and session management. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15737&quot;&gt;CVE-2019-15737&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Sajibe Kanti for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-commit-title-and-comments&quot;&gt;Disclosure of Commit Title and Comments&lt;&#x2F;h2&gt;

&lt;p&gt;Under very specific conditions, commit titles and team member comments could become viewable to users that did not have permission to do so. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15734&quot;&gt;CVE-2019-15734&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;brijeshshah13&quot;&gt;@brijeshshah13&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-xss-via-markdown&quot;&gt;Stored XSS via Markdown&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that certain areas displaying Markdown were not properly sanitizing some cross site scripting payloads. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15739&quot;&gt;CVE-2019-15739&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;samuelmortenson&quot;&gt;@samuelmortenson&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exif-geolocation-data-exposure&quot;&gt;EXIF Geolocation Data Exposure&lt;&#x2F;h2&gt;

&lt;p&gt;EXIF Geolocation data was not being removed from certain image uploads. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15740&quot;&gt;CVE-2019-15740&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please note that when upgrading a GitLab instance, the following rake task should be run: &lt;code&gt;rake gitlab:uploads:sanitize:remove_exif[,,false,0,PersonalFileUploader,2019-01-01]&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jackb898?type=user&quot;&gt;@jack898&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;multiple-ssrf-regressions-on-gitaly&quot;&gt;Multiple SSRF Regressions on Gitaly&lt;&#x2F;h2&gt;

&lt;p&gt;Two previous Gitaly SSRF fixes were mistakenly not included in GitLab 12.2. The issue is now mitigated in the latest release and will be assigned a CVE ID shortly.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.2.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;default-branch-name-exposure&quot;&gt;Default Branch Name Exposure&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that the specified default branch name could be exposed to unauthorised users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15733&quot;&gt;CVE-2019-15733&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-19&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.12 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-19&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-denial-of-service-via-ci-pipelines&quot;&gt;Potential Denial of Service via CI Pipelines&lt;&#x2F;h2&gt;

&lt;p&gt;Under certain circumstances, CI pipelines could potentially be used in a denial of service attack. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15736&quot;&gt;CVE-2019-15736&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-20&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-20&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-via-logrotate&quot;&gt;Privilege Escalation via Logrotate&lt;&#x2F;h2&gt;

&lt;p&gt;It was discovered that an unsafe interaction with logrotate could result in a privilege escalation. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15741&quot;&gt;CVE-2019-15741&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;petee&quot;&gt;@petee&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-21&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab Omnibus 7.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-21&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-merge-request-id-via-timeline-activities&quot;&gt;Disclosure of Merge Request ID via Timeline Activities&lt;&#x2F;h2&gt;

&lt;p&gt;A Guest user in a private project could see the merge request ID associated to an issue via the activity timeline. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15592&quot;&gt;CVE-2019-15592&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-22&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-22&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-via-issue-comments&quot;&gt;Denial of Service via Issue Comments&lt;&#x2F;h2&gt;

&lt;p&gt;A Denial of Service was possible when posting in an issue a comment of arbitrary length. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15593&quot;&gt;CVE-2019-15593&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;8ayac&quot;&gt;8ayac&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-23&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 9.3.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-23&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/08/23/gitlab-12-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/08/23/gitlab-12-2-1-released/</id>
<published>2019-08-23T00:00:00+00:00</published>
<updated>2019-08-23T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.2.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;08&#x2F;22&#x2F;gitlab-12-2-released&#x2F;&quot;&gt;this month&#x27;s 12.2.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31544&quot;&gt;Removes duplicate button from job log page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31590&quot;&gt;Rename License Management to License Compliance&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31697&quot;&gt;Link more issues in Design Management Limitations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31900&quot;&gt;Embed specific metrics chart in issue docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31938&quot;&gt;Fix Gitaly N+1 calls with listing issues&#x2F;MRs via API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31951&quot;&gt;Clarify when new values are valid&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31975&quot;&gt;Embed metrics undefined param fix&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;32126&quot;&gt;Fix &quot;ERR value is not an integer or out of range&quot; errors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;3542&quot;&gt;Fix Error 500s when loading repositories with license files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.2 released with Directed Acyclic Graphs for Pipelines and Design Management</title>
<release>12.2</release>
<link href='https://about.gitlab.com/releases/2019/08/22/gitlab-12-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/08/22/gitlab-12-2-released/</id>
<published>2019-08-22T00:00:00+00:00</published>
<updated>2019-08-22T00:00:00+00:00</updated>
<author>
<name>Joshua Lambert</name>
</author>
<content type='html'>&lt;p&gt;GitLab 12.2 is an exciting release that will help teams optimize their pipelines, improve collaboration, and manage interdependencies between projects. Read on to learn more.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;faster-more-flexible-pipelines&quot;&gt;Faster, more flexible pipelines&lt;&#x2F;h2&gt;

&lt;p&gt;The goal of CI pipelines are to automate manual build and testing tasks, accelerating software delivery while reducing errors and mistakes. However for some use cases, GitLab CI&#x2F;CD pipelines are not as efficient as they could be. With GitLab 12.2, we now support &lt;a href=&quot;#directed-acyclic-graphs-dag-for-gitlab-pipelines&quot;&gt;Directed Acyclic Graphs (DAG)&lt;&#x2F;a&gt; as a method to create and manage detailed job dependencies, rather than relying on sequential stages. This is incredibly powerful and makes it possible for your CI pipelines to become both &lt;strong&gt;faster&lt;&#x2F;strong&gt; and more &lt;strong&gt;efficient&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;design-management&quot;&gt;Design Management&lt;&#x2F;h2&gt;

&lt;p&gt;Software development is a team sport, and our goal is to make it easy for everyone to contribute. In 12.2, we’re delivering new capabilities to include designers and design management in GitLab. &lt;a href=&quot;#annotations-for-designs&quot;&gt;Design Management&lt;&#x2F;a&gt; will make it easy to share, version, and collaborate on design artifacts, helping teams to be more efficient with a single source of truth.&lt;&#x2F;p&gt;

&lt;p&gt;This is just the beginning of focusing on designer specific workflows inside of GitLab and we&#x27;d love for you to contribute to our &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;direction&#x2F;plan&#x2F;design_management&#x2F;&quot;&gt;Design Management Strategy&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;cross-project-merge-request-dependencies&quot;&gt;Cross Project Merge Request Dependencies&lt;&#x2F;h2&gt;

&lt;p&gt;Complex systems often span multiple projects with interdependencies between code changes, where the sequence of merging changes matters. GitLab now supports &lt;a href=&quot;#cross-project-merge-request-dependencies&quot;&gt;Cross-project Merge Request Dependencies&lt;&#x2F;a&gt;, making it possible to define these dependency relationships and prevent mistakes due to changes being merged in the wrong order. Fewer mistakes mean you’re able to reduce rework, and deploy your changes faster.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;There are so many great features within GitLab 12.2 that
we couldn’t possibly highlight them all. &lt;a href=&quot;#restrict-group-membership-by-domain&quot;&gt;Restrict group membership by domain&lt;&#x2F;a&gt;, &lt;a href=&quot;#percent-rollout-strategy-for-feature-flags&quot;&gt;Feature Flag Percent Rollout Strategy and Feature Flag User ID rollout Strategy&lt;&#x2F;a&gt;, &lt;a href=&quot;#security-approval-in-merge-requests&quot;&gt;Security approval in Merge Requests&lt;&#x2F;a&gt;, and now &lt;a href=&quot;#scoped-environment-variables-feature-moved-to-core&quot;&gt;scoped environment variables being included in Core&lt;&#x2F;a&gt;. Keep reading below to get details on every feature!&lt;&#x2F;p&gt;

&lt;p class=&quot;alert alert-info text-center&quot;&gt;&lt;a href=&quot;&#x2F;events&#x2F;commit&#x2F;&quot;&gt;Register now to join us at our first user conferences in Brooklyn and London!&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_2&#x2F;12_2-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 12.1.6, 12.0.6, and 11.11.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/08/12/critical-security-release-gitlab-12-dot-1-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/08/12/critical-security-release-gitlab-12-dot-1-dot-6-released/</id>
<published>2019-08-12T00:00:00+00:00</published>
<updated>2019-08-12T00:00:00+00:00</updated>
<author>
<name>Juan Broullon</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.1.6, 12.0.6, and 11.11.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-authentication-methods-disabled-for-grafana-by-default&quot;&gt;Insecure Authentication Methods Disabled for Grafana By Default&lt;&#x2F;h2&gt;

&lt;p&gt;Basic authentication and hard-coded admin credentials are now disabled by default in the bundled Grafana instance as part of the Omnibus-based GitLab packages. 
This change forces GitLab SSO to be the only authentication method, creates a backup of existing data, and resets the Grafana configuration to the GitLab default. 
Custom dashboards and user accounts that have been created will be preserved in the backup. Grafana authentication settings can then be modified following the 
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;grafana.html&quot;&gt;Omnibus Configuration Settings&lt;&#x2F;a&gt; guide.&lt;&#x2F;p&gt;

&lt;p&gt;The Grafana dashboard, when accessed using the hard-coded credentials, allowed for a malicious user to view internal resources that are accessible 
by the host where the GitLab instance resides.&lt;&#x2F;p&gt;

&lt;p&gt;The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-14943&quot;&gt;CVE-2019-14943&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;stargo&quot;&gt;@stargo&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;multiple-command-line-flag-injection-vulnerabilities&quot;&gt;Multiple Command-Line Flag Injection Vulnerabilities&lt;&#x2F;h2&gt;

&lt;p&gt;Improper parameter sanitization on Gitaly could lead to privilege escalation and remote code execution vulnerabilities under certain conditions. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-14944&quot;&gt;CVE-2019-14944&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;vakzz&quot;&gt;@vakzz&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating-1&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-cookie-handling-on-gitlab-pages&quot;&gt;Insecure Cookie Handling on GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;Authentication cookies on GitLab Pages with Access Control could be sent over HTTP and weren&#x27;t properly encrypted, which made them vulnerable to Man-In-The-Middle attacks. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-14942&quot;&gt;CVE-2019-14942&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This issue was internally discovered by the GitLab Security Team.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating-2&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.1.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/08/06/gitlab-12-1-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/08/06/gitlab-12-1-4-released/</id>
<published>2019-08-06T00:00:00+00:00</published>
<updated>2019-08-06T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.1.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;07&#x2F;31&#x2F;gitlab-12-1-3-released&#x2F;&quot;&gt;the 12.1.3 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31082&quot;&gt;Add exclusive lease to mergeability check process&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31201&quot;&gt;Set DOCKER_TLS_CERTDIR in CI job templates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31262&quot;&gt;Improve job log rendering performance&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31312&quot;&gt;Document required quotes in Mermaid subgraph titles&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31322&quot;&gt;Use Mermaid Markdown for testing guide docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31417&quot;&gt;Resolve docker in docker problems&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;30958&quot;&gt;Fix translation of &#x27;Updated&#x27; term in projects list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14810&quot;&gt;Do not send CI quota notifications when quota is unlimited&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14829&quot;&gt;Fix variable mismatch in code quality widget&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14922&quot;&gt;Resolve &quot;400 Bad request when deploying a maven package&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.1.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/07/31/gitlab-12-1-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/07/31/gitlab-12-1-3-released/</id>
<published>2019-07-31T00:00:00+00:00</published>
<updated>2019-07-31T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 12.1.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves several issues in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;07&#x2F;22&#x2F;gitlab-12-1-released&#x2F;&quot;&gt;this month&#x27;s 12.1
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition&quot;&gt;GitLab Community Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;30946&quot;&gt;Fix the project auto devops API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;30995&quot;&gt;Resolve &quot;Can&#x27;t save pages domain form with Let&#x27;s Encrypt enabled if current certificate is outdated&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31005&quot;&gt;Ensure SubmoduleHelper works outside view context&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31023&quot;&gt;Fix xterm CSS not loading&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31045&quot;&gt;Optimise import performance&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31076&quot;&gt;Fix incorrect web server selection parameter in init.d script&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31078&quot;&gt;Set DOCKER_TLS_CERTDIR in Auto Dev-Ops CI template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31080&quot;&gt;Set DOCKER_TLS_CERTDIR in CI job templates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31127&quot;&gt;Support Docker OCI images&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31162&quot;&gt;Fix error rendering submodules in MR diffs when there is no .gitmodules&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31222&quot;&gt;Fix pdf.js rendering pages in the wrong order&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;31285&quot;&gt;Fix exception handling in Gitaly autodetection&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14376&quot;&gt;Vulnerabilities API now takes optional pipeline_id&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14561&quot;&gt;Add policy for dependencies&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14562&quot;&gt;Filter DependencyList by package_manager&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14612&quot;&gt;Add basic dependencies endpoint&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14744&quot;&gt;Resolve &quot;Bulk editing group issues only works with owner access level&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14826&quot;&gt;Hide &quot;Buy additional minutes&quot; button for self-managed installs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14831&quot;&gt;Resolve &quot;Geo - Gitlab::Geo::DatabaseTasks.pending_migrations returns migrations already applied&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.1.2, 12.0.4, and 11.11.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/</id>
<published>2019-07-29T00:00:00+00:00</published>
<updated>2019-07-29T00:00:00+00:00</updated>
<author>
<name>Jeremy Matos</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.1.2, 12.0.4, and 11.11.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=%E2%9C%93&amp;amp;state=opened&amp;amp;label_name[]=security&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-integration-ssrf&quot;&gt;GitHub Integration SSRF&lt;&#x2F;h2&gt;

&lt;p&gt;An input validation problem was discovered in the GitHub service integration which could result in an attacker being able to make arbitrary POST requests in a GitLab instance&#x27;s internal network. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5461&quot;&gt;CVE-2019-5461&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;trigger-token-impersonation&quot;&gt;Trigger Token Impersonation&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered when trigger tokens are not rotated once ownership of them has changed. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5462&quot;&gt;CVE-2019-5462&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;build-status-disclosure&quot;&gt;Build Status Disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered in the CI badge images endpoint which could result in disclosure of the build status. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5463&quot;&gt;CVE-2019-5463&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab CE&#x2F;EE versions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-mitigation-bypass&quot;&gt;SSRF Mitigation Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;A flawed DNS rebinding protection issue was discovered in &lt;code&gt;url_blocker.rb&lt;&#x2F;code&gt; which could result in SSRF where the library is utilized. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5464&quot;&gt;CVE-2019-5464&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mclaren650sspider&quot;&gt;@mclaren650sspider&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-new-issue-id&quot;&gt;Information Disclosure New Issue ID&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered in the move issue feature which could result in disclosure of the newly created issue ID. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5465&quot;&gt;CVE-2019-5465&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.14 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-label-name-enumeration&quot;&gt;IDOR Label Name Enumeration&lt;&#x2F;h2&gt;

&lt;p&gt;An IDOR was discovered in the new merge requests endpoint which could result in disclosure of label names. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5466&quot;&gt;CVE-2019-5466&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-wiki-pages&quot;&gt;Persistent XSS Wiki Pages&lt;&#x2F;h2&gt;

&lt;p&gt;An input validation and output encoding issue was discovered in the wiki pages feature which could result in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5467&quot;&gt;CVE-2019-5467&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;@ryhmnlfj&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-revokation-bypass-with-mattermost-integration&quot;&gt;User Revokation Bypass with Mattermost Integration&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered when Mattermost slash commands are used with a blocked account. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5468&quot;&gt;CVE-2019-5468&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;logan5&quot;&gt;@logan5&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.14 command service and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-file-upload-via-import-project-archive&quot;&gt;Arbitrary File Upload via Import Project Archive&lt;&#x2F;h2&gt;

&lt;p&gt;A file upload issue was discovered when importing a project archive. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5469&quot;&gt;CVE-2019-5469&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ajxchapman&quot;&gt;@ajxchapman&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-vulnerability-feedback&quot;&gt;Information Disclosure Vulnerability Feedback&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered in the security dashboard which could result in disclosure of vulnerability feedback information. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5470&quot;&gt;CVE-2019-5470&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-via-email&quot;&gt;Persistent XSS via Email&lt;&#x2F;h2&gt;

&lt;p&gt;An input validation and output encoding issue was discovered in the email notification feature which could result in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5471&quot;&gt;CVE-2019-5471&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mario-areias&quot;&gt;@mario-areias&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-epic-comments&quot;&gt;Denial Of Service Epic Comments&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered that forbid to delete epic comments. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5472&quot;&gt;CVE-2019-5472&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous GitLab EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;email-verification-bypass&quot;&gt;Email Verification Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;An authentication issue was discovered that allowed to bypass email verification. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5473&quot;&gt;CVE-2019-5473&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 12.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;override-merge-request-approval-rules&quot;&gt;Override Merge Request Approval Rules&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered in the merge request approval rules. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5474&quot;&gt;CVE-2019-5474&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-pipeline-details&quot;&gt;Disclosure of Pipeline Details&lt;&#x2F;h2&gt;

&lt;p&gt;Details of restricted pipelines were visible via the merge request endpoint. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-15594&quot;&gt;CVE-2019-15594&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.1.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/07/24/gitlab-12-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/07/24/gitlab-12-1-1-released/</id>
<published>2019-07-24T00:00:00+00:00</published>
<updated>2019-07-24T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.1.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a bug discovered in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;07&#x2F;22&#x2F;gitlab-12-1-released&#x2F;&quot;&gt;this month&#x27;s 12.1.0 release&lt;&#x2F;a&gt;
which was also described in a &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;07&#x2F;23&#x2F;bugin12-1-0&#x2F;&quot;&gt;recent GitLab blog post&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14810&quot;&gt;Do not send CI quota notifications when quota is unlimited&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;em&gt;Note: There are no updates for GitLab Community Edition&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>12.1.0 Bug: Self-managed users get an incorrect notification to purchase CI minutes on GitLab.com</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/07/23/bugin12-1-0/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/07/23/bugin12-1-0/</id>
<published>2019-07-23T00:00:00+00:00</published>
<updated>2019-07-23T00:00:00+00:00</updated>
<author>
<name>William Chia</name>
</author>
<content type='html'>&lt;p&gt;We’d like to apologize for shipping a bug in our latest release that may affect you.&lt;&#x2F;p&gt;

&lt;p&gt;On GitLab.com we provide a bucket of shared CI Runner minutes for users with the ability to purchase additional minutes if you run out. When you reach 5% of your quota, the following notification is sent via email or in-app depending on how your notification preferences are set.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;This is an automated notification to let you know that your CI Runner Minutes quota for &lt;name&gt; is below 5%.&lt;&#x2F;name&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Click here to purchase more minutes.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;If you need assistance, please contact GitLab support.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;After upgrading to 12.1.0, folks on GitLab self-managed (i.e., you host your own instance of GitLab) may find that users on your instance are receiving this notification. This bug has been reported for instances that have quotas set as well as those that don&#x27;t. So users may receive the notification even if your Runner quotas are set to &lt;code&gt;0&lt;&#x2F;code&gt; (unlimited).&lt;&#x2F;p&gt;

&lt;p&gt;This message can be confusing for users of self-managed GitLab instances who should be directed to contact their instance admin rather than GitLab if they run out of provisioned minutes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;how-to-fix-the-bug&quot;&gt;How to fix the bug&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;del&gt;We are &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14809&#x2F;diffs&quot;&gt;working on a fix in this merge request&lt;&#x2F;a&gt; that will disable this notification for self-managed instances. The fix will go out in our next point release 12.1.1. We hope to have this release available in the next day or two.&lt;&#x2F;del&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;del&gt;If you’d like a fix sooner rather than waiting for the next point release, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;12998#note_195052407&quot;&gt;instructions for a hot fix&lt;&#x2F;a&gt; are posted on the issue for this bug.&lt;&#x2F;del&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Update&lt;&#x2F;strong&gt;:&lt;&#x2F;p&gt;

&lt;p&gt;This bug is now fixed. &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;07&#x2F;24&#x2F;gitlab-12-1-1-released&#x2F;&quot;&gt;Upgrading to 12.1.1&lt;&#x2F;a&gt; or later will remediate this issue and your users will no longer receive this notification.&lt;&#x2F;p&gt;

&lt;p&gt;Again, we’re sorry for this mistake. We pride ourselves on making every release of GitLab stable and easy to upgrade. We know that many of you upgrade to the latest release as soon as it’s available. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;fulfillment&#x2F;issues&#x2F;34&quot;&gt;View this issue to see our retrospective&lt;&#x2F;a&gt; on how we determined why this bug made it into the release and how we plan to avoid similar bugs in the future visit the issue where we are tracking progress.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.1 released with Parallel Merge Trains and Merge Requests for Confidential Issues</title>
<release>12.1</release>
<link href='https://about.gitlab.com/releases/2019/07/22/gitlab-12-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/07/22/gitlab-12-1-released/</id>
<published>2019-07-22T00:00:00+00:00</published>
<updated>2019-07-22T00:00:00+00:00</updated>
<author>
<name>Luca Williams</name>
</author>
<content type='html'>&lt;p&gt;With GitLab 12.1 we are excited to announce new features
that are unique to GitLab, such as Parallel Merge Trains
and Merge Requests for Confidential issues - along with
long-awaited features like managed Let&#x27;s Encrypt certificates
for GitLab Pages. Read on to learn more!&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;keep-the-master-branch-green-at-high-velocity&quot;&gt;Keep the master branch green at high velocity&lt;&#x2F;h2&gt;

&lt;p&gt;Keeping the master branch green is critical for Continuous Delivery. When the production build breaks, it means your new code isn&#x27;t going live, which impacts users and revenue. The only way to be 100% sure the master branch stays green when new code merges is to run the pipeline using the latest version of the master branch. For teams that have a high volume of merges, this can be difficult or even impossible. In the time it takes the pipeline to complete on one code change, other changes can get merged to master with the potential for conflict. The only way to mitigate this is to queue and sequence the changes so that once a production pipeline starts, other code doesn&#x27;t get merged ahead of that change. This is why we came up with &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;merge_request_pipelines&#x2F;pipelines_for_merged_results&#x2F;merge_trains&#x2F;index.html&quot;&gt;Merge Trains&lt;&#x2F;a&gt;, and shipped the &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;06&#x2F;22&#x2F;gitlab-12-0-released&#x2F;#sequential-merge-trains&quot;&gt;first iteration&lt;&#x2F;a&gt;
in Gitlab 12.0.&lt;&#x2F;p&gt;

&lt;p&gt;Merge Trains make use of GitLab&#x27;s &quot;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;merge_request_pipelines&#x2F;pipelines_for_merged_results&#x2F;index.html&quot;&gt;Pipelines for Merged Results&lt;&#x2F;a&gt;&quot; feature. With Pipelines for Merged Results enabled, GitLab automatically creates a separate ref that contains the result of merging the source and target branch. The Merge Request pipeline runs on that result ref rather than just running on the source branch. This way, you know if your code is safe to merge into master or not without needing to rebase continually.&lt;&#x2F;p&gt;

&lt;p&gt;Building on this functionality, Merge Trains then make sure that merges are put in the proper order once they are set to merge into the target branch. The &lt;strong&gt;merge&lt;&#x2F;strong&gt; button in the MR is replaced with a &lt;strong&gt;start&#x2F;add to merge train&lt;&#x2F;strong&gt; button that adds that merge to the Merge Train queue. Merges are processed in the proper order even if they are coming in at a rapid pace.&lt;&#x2F;p&gt;

&lt;p&gt;Initially, Merge Train pipelines executed sequentially. The previous MR
in the train needed to complete before the pipeline for the next
MR would start, this kept master green, but could slow
things down, especially for projects with long-running pipelines.
Now with GitLab 12.1, we’ve improved Merge Trains to
&lt;a href=&quot;#parallel-execution-strategy-for-merge-trains&quot;&gt;run in parallel&lt;&#x2F;a&gt;.
Up to four pipelines execute simultaneously including the ref from the previous Merge Request in the train based on the assumption that all
previous Merge Request succeeds. This way, the pipelines only need to re-run if a previous Merge Request fails. Executing Merge Train pipelines in parallel significantly speeds up the process. You can get started with Merge Trains today by enabling Pipelines for Merged Results and enjoy CD with an always-green master branch.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;iterate-privately-on-sensitive-updates&quot;&gt;Iterate privately on sensitive updates&lt;&#x2F;h2&gt;

&lt;p&gt;Working publicly in the open is a powerful vehicle for collaboration.
Open source projects with public code, and issue trackers know the benefits of enabling people to contribute regardless of their location. At GitLab we think transparency grants so many benefits that we don’t just make our issues and code public,
but our &lt;a href=&quot;&#x2F;handbook&#x2F;values&#x2F;#transparency&quot;&gt;business processes&lt;&#x2F;a&gt;
as well.&lt;&#x2F;p&gt;

&lt;p&gt;Alongside all the things that work great when they are out in
the open are &lt;a href=&quot;&#x2F;handbook&#x2F;communication&#x2F;confidentiality-levels&#x2F;#not-public&quot;&gt;a few things that are better kept private&lt;&#x2F;a&gt;. A typical scenario for many public projects is the need to keep security vulnerabilities private while they are being worked on to mitigate risk. Previously, GitLab supported
Confidential Issues in public projects but if you wanted to
create a confidential merge request you needed to coordinate
in a separate, private code repository.&lt;&#x2F;p&gt;

&lt;p&gt;Now, &lt;a href=&quot;#merge-requests-for-confidential-issues&quot;&gt;Merge Requests for Confidential Issues&lt;&#x2F;a&gt; is making this a lot easier. Clicking on the
&lt;strong&gt;Create Confidential Merge Request&lt;&#x2F;strong&gt; button on a Confidential Issue allows users to select a private fork within which to create the new branch and merge request, this keeps everything under wraps until
it’s appropriate to reveal it by merging the code from the private
fork back into the upstream public project.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;get-automatic-https-certs-for-pages-using-lets-encrypt&quot;&gt;Get automatic HTTPS certs for Pages using Let’s Encrypt&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages is a great way to publish web content, from landing
pages and documentation to project artifacts and reports. Of course,
securing your traffic with HTTPS is a must, but keeping track of
the process to procure, provision, and renew certs can be daunting.
It&#x27;s even more challenging if you are managing a large number of domains. Not having built-in, supported certificate management meant that many organizations operating at scale wanted to use GitLab Pages, but couldn&#x27;t.&lt;&#x2F;p&gt;

&lt;p&gt;Many of you in the GitLab community have told us how valuable
&lt;a href=&quot;#automatic-https-for-pages-with-lets-encrypt&quot;&gt;automated Let’s Encrypt certificates for GitLab Pages&lt;&#x2F;a&gt; would be.
Today, we’re happy to say this highly-requested feature is
available for use. Now, getting secured web traffic to all of
your GitLab Pages custom domains and subdomains is as simple as
clicking a toggle in your Pages settings.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;There are such a lot of great features shipping with GitLab 12.1 that
we couldn’t possibly highlight them all. &lt;a href=&quot;#git-object-deduplication&quot;&gt;Git object deduplication&lt;&#x2F;a&gt;, and Deploy Boards for Kubernetes clusters
at the &lt;a href=&quot;#deploy-boards-for-group-level-kubernetes-clusters&quot;&gt;Group&lt;&#x2F;a&gt;
and &lt;a href=&quot;#deploy-boards-for-instance-level-kubernetes-clusters&quot;&gt;Instance&lt;&#x2F;a&gt; level are just a few of the improvements in this release. Keep reading below to get details on every feature along with links to the docs.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_1&#x2F;flamducks.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 12.0.3, 11.11.5, and 11.10.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/07/03/security-release-gitlab-12-dot-0-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/07/03/security-release-gitlab-12-dot-0-dot-3-released/</id>
<published>2019-07-03T00:00:00+00:00</published>
<updated>2019-07-03T00:00:00+00:00</updated>
<author>
<name>Costel Maxim</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 12.0.3, 11.11.5, and 11.10.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=%E2%9C%93&amp;amp;state=opened&amp;amp;label_name[]=security&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ability-to-write-a-note-to-a-private-snippet&quot;&gt;Ability to Write a Note to a Private Snippet&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Snippets were vulnerable to an authorization issue that allowed unauthorized users to add comments to a private snippet. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13001&quot;&gt;CVE-2019-13001&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;executor&quot;&gt;@executor&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;recent-pipeline-information-disclosed-to-unauthorised-users&quot;&gt;Recent Pipeline Information Disclosed to Unauthorised Users&lt;&#x2F;h2&gt;

&lt;p&gt;Unauthorised users were able to read pipeline information of the last merge request. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13002&quot;&gt;CVE-2019-13002&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;resource-exhaustion-attack&quot;&gt;Resource Exhaustion Attack&lt;&#x2F;h2&gt;

&lt;p&gt;One of the parsers used by Gitlab CI was vulnerable to a resource exhaustion attack. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13003&quot;&gt;CVE-2019-13003&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;leipert&quot;&gt;@leipert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;error-caused-by-encoded-characters-in-comments&quot;&gt;Error Caused by Encoded Characters in Comments&lt;&#x2F;h2&gt;

&lt;p&gt;When specific encoded characters were added to comments, the comments section would become inaccessible. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13004&quot;&gt;CVE-2019-13004&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;newbiemole&quot;&gt;@newbiemole&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;authorization-issues-in-graphql&quot;&gt;Authorization Issues in GraphQL&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab graphql service was vulnerable to multiple authorization issues that disclosed restricted user, group, and repository metadata to unauthorized users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13005&quot;&gt;CVE-2019-13005&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;number-of-merge-requests-was-accessible&quot;&gt;Number of Merge Requests was Accessible&lt;&#x2F;h2&gt;

&lt;p&gt;Users with access to issues, but not the repository were able to view the number of related merge requests on an issue. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13006&quot;&gt;CVE-2019-13006&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enabling-one-of-the-service-templates-could-cause-resource-depletion&quot;&gt;Enabling One of the Service Templates Could Cause Resource Depletion&lt;&#x2F;h2&gt;

&lt;p&gt;When an admin enabled one of the service templates, it was triggering an action that leads to resource depletion. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13008&quot;&gt;CVE-2019-13007&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;broken-access-control-for-the-content-of-personal-snippets&quot;&gt;Broken Access Control for the Content of Personal Snippets&lt;&#x2F;h2&gt;

&lt;p&gt;Uploaded files associated with unsaved personal snippets were accessible to unauthorized users due to improper permission settings. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13009&quot;&gt;CVE-2019-13009&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;mkozono&quot;&gt;@mkozono&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible&lt;&#x2F;p&gt;

&lt;h2 id=&quot;decoding-color-codes-caused-resource-depletion&quot;&gt;Decoding Color Codes Caused Resource Depletion&lt;&#x2F;h2&gt;

&lt;p&gt;The color codes decoder was vulnerable to a resource depletion attack if specific formats were used. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13010&quot;&gt;CVE-2019-13010&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;8ayac&quot;&gt;@8ayac&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-template-name-disclosure&quot;&gt;Merge Request Template Name Disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;By using brute-force a user with access to a project, but not it&#x27;s repository could create a list of merge requests template names. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13011&quot;&gt;CVE-2019-13011&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-vulnerability-in-project-github-integration&quot;&gt;SSRF Vulnerability in Project GitHub Integration&lt;&#x2F;h2&gt;

&lt;p&gt;The GitHub project integration was vulnerable to an SSRF vulnerability which allowed an attacker to make requests to local network resources. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-13121&quot;&gt;CVE-CVE-2019-13121&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.0.2, 11.11.4, 11.10.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/06/26/gitlab-12-0-2-11-11-4-11-10-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/26/gitlab-12-0-2-11-11-4-11-10-7-released/</id>
<published>2019-06-26T00:00:00+00:00</published>
<updated>2019-06-26T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing versions 12.0.2, 11.11.4, 11.10.7 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;These version releases resolve a number of regressions discovered in prior releases.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;1202&quot;&gt;12.0.2&lt;&#x2F;h3&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29824&quot;&gt;Fix missing API notification flags for Microsoft Teams&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29825&quot;&gt;Do not rewrite relative links for system notes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29850&quot;&gt;Fix label serialisation in issue and note hooks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29885&quot;&gt;Gitlab::JsonCache#parse_value ensure string&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29889&quot;&gt;Fix notes email with group-level notification email&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29917&quot;&gt;Omit issues links in merge request entity API response&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29938&quot;&gt;Include the GitLab version in the cache key for Gitlab::JsonCache&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;30002&quot;&gt;Prevent EE backport migrations from running if CE is not migrated&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;30033&quot;&gt;Silence backup warnings when CRON=1 in use&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14184&quot;&gt;Take into account events created before milestone start&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;11114&quot;&gt;11.11.4&lt;&#x2F;h3&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28557&quot;&gt;Add 60s and 5m values to the buckets used by prometheus to measure time&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29383&quot;&gt;Fix Fogbugz Importer not working&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29500&quot;&gt;Fix gl_dropdown scrolling to top on assignee click&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29769&quot;&gt;Fix IDE commit to use start_ref&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29723&quot;&gt;Update translations files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14269&quot;&gt;Use quarantine size to check push size against repository size limit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;11107&quot;&gt;11.10.7&lt;&#x2F;h3&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29842&quot;&gt;Add client code to call GetObjectDirectorySize RPC&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28926&quot;&gt;Revert a default GIT_DEPTH for MR pipeline&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29202&quot;&gt;Fix label click scrolling to top&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29500&quot;&gt;Fix gl_dropdown scrolling to top on assignee click&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;12110&quot;&gt;Fix default value for start date in GitlabSubscription being static&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;14269&quot;&gt;Use quarantine size to check push size against repository size limit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 12.0.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/06/25/gitlab-12-0-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/25/gitlab-12-0-1-released/</id>
<published>2019-06-25T00:00:00+00:00</published>
<updated>2019-06-25T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 12.0.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a bug discovered in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;06&#x2F;22&#x2F;gitlab-12-0-released&#x2F;&quot;&gt;this month&#x27;s 12.0.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;3369&quot;&gt;Upgrade version check should enforce the upgrade path correctly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 12.0 released with Visual Reviews and Dependency List</title>
<release>12.0</release>
<link href='https://about.gitlab.com/releases/2019/06/22/gitlab-12-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/22/gitlab-12-0-released/</id>
<published>2019-06-22T00:00:00+00:00</published>
<updated>2019-06-22T00:00:00+00:00</updated>
<author>
<name>Jeremy Watson</name>
</author>
<content type='html'>&lt;h2 id=&quot;dev-sec-and-ops&quot;&gt;Dev, Sec, and Ops&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 12.0 marks a key step in our journey to create an inclusive approach to
DevSecOps, empowering &quot;everyone to contribute&quot;.&lt;&#x2F;p&gt;

&lt;p&gt;For the past year, we&#x27;ve been on an amazing journey, collaborating and creating
a solution that brings teams together. There have been thousands of community
contributions making GitLab more lovable.&lt;&#x2F;p&gt;

&lt;iframe width=&quot;560&quot; height=&quot;315&quot; src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;sboJfUylJFA&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot;&gt;&lt;&#x2F;iframe&gt;

&lt;p&gt;We believe everyone can contribute, and we’ve enabled cross-team collaboration,
faster delivery of great code, and bringing together Dev, Ops, and Security.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header&quot; id=&quot;visual-reviews&quot;&gt;Visual Reviews&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab review applications are a fantastic tool to enable stakeholders from
Operations to QA to business owners to evaluate and approve application changes
before production.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab 12.0, &lt;a href=&quot;#visual-reviews&quot;&gt;we make it easy to provide visual feedback&lt;&#x2F;a&gt;
directly from the review app. It’s simple and streamlined, no toggling between
different tabs and typing your feedback, helping to shorten review cycles and
accelerate delivery.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;project-dependency-list&quot;&gt;Project Dependency List&lt;&#x2F;h3&gt;

&lt;p&gt;Projects typically include dozens of individual components, which can introduce
vulnerabilities. Often, security and compliance teams need to be aware of the
specific components included in a project.&lt;&#x2F;p&gt;

&lt;p&gt;Now, we&#x27;re making it &lt;a href=&quot;#project-dependency-list&quot;&gt;easy to view a project&#x27;s dependencies&lt;&#x2F;a&gt;
in a single source of truth.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;limit-access-based-on-ip-address&quot;&gt;Limit access based on IP address&lt;&#x2F;h3&gt;

&lt;p&gt;Some organizations want to limit access to their repositories based on
 specific IP addresses.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab 12.0, &lt;a href=&quot;#restrict-access-by-ip-address&quot;&gt;you can specifically prohibit&lt;&#x2F;a&gt;
 traffic from outside IP addresses from accessing your GitLab data.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;12_0&#x2F;12_0-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.11.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/06/10/gitlab-11-11-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/10/gitlab-11-11-3-released/</id>
<published>2019-06-10T00:00:00+00:00</published>
<updated>2019-06-10T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.11.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;06&#x2F;05&#x2F;gitlab-11-11-2-released&#x2F;&quot;&gt;the 11.11.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28612&quot;&gt;Fix invalid visibility string comparison in project import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28926&quot;&gt;Revert a default GIT_DEPTH for MR pipeline&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29131&quot;&gt;Fix connection to Tiller error while uninstalling&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29201&quot;&gt;Revert &quot;Disable retrying cancelled jobs&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29202&quot;&gt;Fix label click scrolling to top&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29234&quot;&gt;Fixes the authorization callback URL for GitHub project imports&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29312&quot;&gt;Make OpenID Connect work without requiring a name&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29314&quot;&gt;Fix OpenID Connect documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29310&quot;&gt;Update Gitaly to 1.42.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;Gitlab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;13524&quot;&gt;Fix create merge request from vulnerability modal regression&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.10.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/06/05/gitlab-11-10-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/05/gitlab-11-10-6-released/</id>
<published>2019-06-05T00:00:00+00:00</published>
<updated>2019-06-05T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.10.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;06&#x2F;03&#x2F;security-release-gitlab-11-dot-11-dot-1-released&#x2F;&quot;&gt;the 11.10 release&lt;&#x2F;a&gt;
and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27913&quot;&gt;Allow a member to have an access level equal to parent group&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28052&quot;&gt;Fix uploading of LFS tracked file through UI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28171&quot;&gt;Use a path for the related merge requests endpoint&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28172&quot;&gt;Add remove_foreign_key_if_exists&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28239&quot;&gt;Don&#x27;t run full gc in AfterImportService&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28305&quot;&gt;Fix project visibility level validation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28494&quot;&gt;API: Fix recursive flag not working with Rugged get_tree_entries flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28495&quot;&gt;Fix height of input groups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28772&quot;&gt;Use source ref in pipeline webhook&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11030&quot;&gt;Resolve &quot;Removing the project that holds the Insights configuration raises an error&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11312&quot;&gt;Fix ee&#x2F;app&#x2F;assets&#x2F;javascripts&#x2F;epic&#x2F;components&#x2F;epic_body.vue. Types can not use i18n. See ee&#x2F;app&#x2F;assets&#x2F;javascripts&#x2F;related_issues&#x2F;constants.js&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;12070&quot;&gt;Fix approvals section when merge requests disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;12414&quot;&gt;Use path instead of a URL for accessing approval settings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;12488&quot;&gt;Fix missing expose_path for license api paths&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.11.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/06/05/gitlab-11-11-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/05/gitlab-11-11-2-released/</id>
<published>2019-06-05T00:00:00+00:00</published>
<updated>2019-06-05T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.11.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;&quot;&gt;this month&#x27;s 11.11.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28495&quot;&gt;Fix height of input groups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28607&quot;&gt;Update SAST.gitlab-ci.yml - Add SAST_GITLEAKS_ENTROPY_LEVEL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28637&quot;&gt;Fix display of promote to group label&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28680&quot;&gt;Fix OmniAuth OAuth2Generic strategy not loading&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28772&quot;&gt;Use source ref in pipeline webhook&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;28778&quot;&gt;Disable two_step_rebase feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;29022&quot;&gt;Fix migration failure when groups are missing route&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;Gitlab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;13257&quot;&gt;Geo: Does not apply selective sync restrictions while counting registries on the tracking database&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.11.1, 11.10.5, and 11.9.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/</id>
<published>2019-06-03T00:00:00+00:00</published>
<updated>2019-06-03T00:00:00+00:00</updated>
<author>
<name>Juan Broullon</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.11.1, 11.10.5, and 11.9.12 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=%E2%9C%93&amp;amp;state=opened&amp;amp;label_name[]=security&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;remote-command-execution-vulnerability-on-repository-download-feature&quot;&gt;Remote Command Execution Vulnerability on Repository Download Feature&lt;&#x2F;h2&gt;

&lt;p&gt;A specially crafted payload would allow an authenticated malicious user to execute commands remotely through the repository download feature. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12430&quot;&gt;CVE-2019-12430&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.11.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-issue-titles-revealed-to-restricted-users-on-unsubscribe&quot;&gt;Confidential Issue Titles Revealed to Restricted Users on Unsubscribe&lt;&#x2F;h2&gt;

&lt;p&gt;Non-member users who subscribed to issue notifications could access the title of confidential issues through the unsubscription page. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12432&quot;&gt;CVE-2019-12432&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;skavans&quot;&gt;@skavans&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.13 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-milestone-metadata-through-the-search-api&quot;&gt;Disclosure of Milestone Metadata through the Search API&lt;&#x2F;h2&gt;

&lt;p&gt;Restricted users could access the metadata of private milestones through the Search API. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12431&quot;&gt;CVE-2019-12431&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.13 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-discovery-via-comment-links&quot;&gt;Private Project Discovery via Comment Links&lt;&#x2F;h2&gt;

&lt;p&gt;Users could guess the URL slug of private projects through the contrast of the destination URLs of issues linked in comments. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12434&quot;&gt;CVE-2019-12434&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;metadata-of-confidential-issues-disclosed-to-restricted-users&quot;&gt;Metadata of Confidential Issues Disclosed to Restricted Users&lt;&#x2F;h2&gt;

&lt;p&gt;Unprivileged users were able to access labels, status and merge request counts of confidential issues via the milestone details page. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12429&quot;&gt;CVE-2019-12429&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mandatory-external-authentication-provider-sign-in-restrictions-bypass&quot;&gt;Mandatory External Authentication Provider Sign-In Restrictions Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;Users could bypass the mandatory external authentication provider sign-in restrictions by sending a specially crafted request. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12428&quot;&gt;CVE-2019-12428&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 6.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;internal-projects-allowed-to-be-created-on-in-private-groups&quot;&gt;Internal Projects Allowed to Be Created on in Private Groups&lt;&#x2F;h2&gt;

&lt;p&gt;Restricted visibility settings allow creating internal projects in private groups, leading to multiple permission issues. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12433&quot;&gt;CVE-2019-12433&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;petermarko&quot;&gt;Peter Marko&lt;&#x2F;a&gt; for contributing with a fix for this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;server-side-request-forgery-through-dns-rebinding&quot;&gt;Server-Side Request Forgery Through DNS Rebinding&lt;&#x2F;h2&gt;

&lt;p&gt;Multiple features contained Server-Side Request Forgery (SSRF) vulnerabilities caused by an insufficient validation to prevent DNS rebinding attacks. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12443&quot;&gt;CVE-2019-12443&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; The protection against DNS rebinding attacks can be disabled by unmarking the &quot;Enforce DNS rebinding attack protection&quot; checkbox under &lt;em&gt;Admin Area &amp;gt; Settings &amp;gt; Network &amp;gt; Outbound requests&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-cross-site-scripting-on-wiki-pages&quot;&gt;Stored Cross-Site Scripting on Wiki Pages&lt;&#x2F;h2&gt;

&lt;p&gt;Wiki Pages contained a lack of input validation which resulted in a persistent XSS vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12444&quot;&gt;CVE-2019-12444&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ryhmnlfj&quot;&gt;@ryhmnlfj&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-cross-site-scripting-on-notes&quot;&gt;Stored Cross-Site Scripting on Notes&lt;&#x2F;h2&gt;

&lt;p&gt;A malicious user could execute JavaScript code on notes by importing a specially crafted project file. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12445&quot;&gt;CVE-2019-12445&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-password-disclosed-on-import-error-page&quot;&gt;Repository Password Disclosed on Import Error Page&lt;&#x2F;h2&gt;

&lt;p&gt;A failure while importing a repository by URL would render an error page containing the plaintext password of the repository to import. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12446&quot;&gt;CVE-2019-12446&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;vandebrj&quot;&gt;@vandebrj&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;protected-branches-restriction-rules-bypass&quot;&gt;Protected Branches Restriction Rules Bypass&lt;&#x2F;h2&gt;

&lt;p&gt;The protected branches feature contained a access control issue which resulted in a bypass of the protected branches restriction rules. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12441&quot;&gt;CVE-2019-12441&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;stored-cross-site-scripting-vulnerability-on-child-epics&quot;&gt;Stored Cross-Site Scripting Vulnerability on Child Epics&lt;&#x2F;h2&gt;

&lt;p&gt;The epic details page contained a lack of input validation and output encoding issue which resulted in a persistent XSS vulnerability on child epics. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-12442&quot;&gt;CVE-2019-12442&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @near_ for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-to-knative-05&quot;&gt;Upgrade to Knative 0.5&lt;&#x2F;h2&gt;

&lt;p&gt;Knative was upgraded to version 0.5 for the GitLab 11.11, 11.10 and 11.9 packages. This Knative release contains several security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.11 released with Multi-Assignment for MRs and container enhancements</title>
<release>11.11</release>
<link href='https://about.gitlab.com/releases/2019/05/22/gitlab-11-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/05/22/gitlab-11-11-released/</id>
<published>2019-05-22T00:00:00+00:00</published>
<updated>2019-05-22T00:00:00+00:00</updated>
<author>
<name>Jason Yavorska</name>
</author>
<content type='html'>&lt;h2 id=&quot;increased-collaboration-and-visibility&quot;&gt;Increased collaboration and visibility&lt;&#x2F;h2&gt;

&lt;p&gt;One of the areas we focus on at GitLab is to find new ways to increase collaboration throughout the entire DevOps lifecycle. In this release, we&#x27;re happy to announce that we now support &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#multiple-assignees-for-merge-requests&quot;&gt;Multiple Assignees for a Merge Request&lt;&#x2F;a&gt;! This is available in GitLab Starter and truly embodies our &lt;strong&gt;everyone can contribute&lt;&#x2F;strong&gt; motto. We know that many people may be working&#x2F;collaborating in the same merge request to make sure things are on track, and Multiple Assignees for Merge Requests provides an environment to do just that!&lt;&#x2F;p&gt;

&lt;p&gt;Additionally, we have heightened the visibility for DevOps teams by supporting &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#deployment-notifications-for-slack-and-mattermost&quot;&gt;automated deployment event notifications for Slack and Mattermost&lt;&#x2F;a&gt;. Adding to the list of push events for these two collaborative environments allows a notification to kick off near real-time to update your team every time a deployment occurs.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reduce-overhead-with-windows-support-of-docker-containers-and-provisioning-instance-level-kubernetes-clusters&quot;&gt;Reduce overhead with Windows support of Docker containers and provisioning instance-level Kubernetes clusters&lt;&#x2F;h2&gt;

&lt;p&gt;We 💖 containers! Containers require fewer system resources than your traditional or virtual machine environments while increasing the portability of your application. With GitLab 11.11, we now support a &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#windows-container-executor-for-gitlab-runner&quot;&gt;Windows Container Executor for GitLab Runners&lt;&#x2F;a&gt;, something that will enable the use of Docker containers on Windows, allowing for more advanced pipeline orchestration and management.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Premium (self-managed instances only) now has a &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#caching-dependency-proxy-for-container-registry&quot;&gt;Caching Dependency Proxy for your Docker images&lt;&#x2F;a&gt;. This MVC iteration helps to speed up time to delivery by providing a caching proxy for frequently used Docker images.&lt;&#x2F;p&gt;

&lt;p&gt;Users of self-managed GitLab instances are now able to provision an &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#instance-level-kubernetes-cluster-configuration&quot;&gt;Instance Level Kubernetes Cluster&lt;&#x2F;a&gt;, enabling all groups and projects in the instance to make use of it for their deployments. This GitLab Kubernetes integration will automatically create project-specific resources for added security.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h2&gt;

&lt;p&gt;In addition to increased collaboration and visibility capabilities, we&#x27;ve also added &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#guest-access-to-releases&quot;&gt;Guest Access to Releases&lt;&#x2F;a&gt;, extended the &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#add-on-ci-runner-minutes-have-been-extended-to-free-plans&quot;&gt;Add-on CI Runner minutes to GitLab Free&lt;&#x2F;a&gt;, simplified reviews by &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;05&#x2F;22&#x2F;gitlab-11-11-released&#x2F;#applying-a-suggestion-now-automatically-resolves-the-discussion&quot;&gt;auto-resolving a discussion whenever a suggestion is applied&lt;&#x2F;a&gt;, and much more!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_11&#x2F;11_11-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.10.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/05/01/gitlab-11-10-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/05/01/gitlab-11-10-4-released/</id>
<published>2019-05-01T00:00:00+00:00</published>
<updated>2019-05-01T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.10.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;04&#x2F;30&#x2F;security-release-gitlab-11-dot-10-dot-3-released&#x2F;&quot;&gt;this month&#x27;s 11.10.3
release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27618&quot;&gt;&lt;code&gt;on_stop&lt;&#x2F;code&gt; is not automatically triggered with pipelines for merge requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27803&quot;&gt;Fix pipelines for merge requests does not show pipeline page when source branch   is removed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27382&quot;&gt;Resolve &quot;Merge Request Popover is not working on the To Do page&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27416&quot;&gt;Resolve &quot;500 error on save of general pipeline settings timeout&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27451&quot;&gt;Add feature flag to disable LFS check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27586&quot;&gt;Fix Metrics environments dropdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27589&quot;&gt;Resolve &quot;MR Popover is not attached in system notes&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27614&quot;&gt;Fix bug when project export to remote url fails&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27634&quot;&gt;Use wiki partial in search results&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27671&quot;&gt;CE: Adds missing prop&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27687&quot;&gt;Resolve &quot;Deployment jobs broken as of 11.10.0&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27724&quot;&gt;Prevent text selection when dragging in issue boards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27768&quot;&gt;Resolve &quot;Masked Variable still printed in log output on gitlab.com&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27781&quot;&gt;Prevent concurrent execution of PipelineScheduleWorker&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27782&quot;&gt;Fix slow performance with compiling HAML templates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11498&quot;&gt;[Insights] Change the default weeks period limit to 12&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11591&quot;&gt;Adds missing prop in pipelines graph&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11717&quot;&gt;Fix license app with relative url&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.10.3, 11.9.11, and 11.8.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/30/security-release-gitlab-11-dot-10-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/30/security-release-gitlab-11-dot-10-dot-3-released/</id>
<published>2019-04-30T00:00:00+00:00</published>
<updated>2019-04-30T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.10.3, 11.9.11, and 11.8.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;The GitLab EE versions contain an important security fix, and we strongly recommend that all GitLab EE installations be upgraded immediately. GitLab CE is not affected, but the
version numbers were increased to be consistent with EE versioning.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-with-limited-scope-token&quot;&gt;Information Disclosure with Limited Scope Token&lt;&#x2F;h2&gt;

&lt;p&gt;A small number of GitLab API endpoints would disclose project information when using a &lt;em&gt;read_user&lt;&#x2F;em&gt; scoped token. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11605&quot;&gt;CVE-2019-11605&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.10.2, 11.9.10, and 11.8.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/29/security-release-gitlab-11-dot-10-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/29/security-release-gitlab-11-dot-10-dot-2-released/</id>
<published>2019-04-29T00:00:00+00:00</published>
<updated>2019-04-29T00:00:00+00:00</updated>
<author>
<name>Juan Broullon</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.10.2, 11.9.10, and 11.8.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=%E2%9C%93&amp;amp;state=opened&amp;amp;label_name[]=security&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;moving-an-issue-to-private-repo-leaks-project-namespace&quot;&gt;Moving an Issue to Private Repo Leaks Project Namespace&lt;&#x2F;h2&gt;

&lt;p&gt;When an issue was moved to a private project, the private project namespace was leaked to unauthorized users with access to the original issue. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11545&quot;&gt;CVE-2019-11545&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;notification-emails-sent-to-restricted-users&quot;&gt;Notification Emails Sent to Restricted Users&lt;&#x2F;h2&gt;

&lt;p&gt;Non-member users who subscribed to notifications of an internal project with issue and repository restrictions would receive emails about restricted events. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11544&quot;&gt;CVE-2019-11544&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yashrs&quot;&gt;@yashrs&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-comments-on-confidential-issues&quot;&gt;Unauthorized Comments on Confidential Issues&lt;&#x2F;h2&gt;

&lt;p&gt;Unprivileged members of a project were able to post comments on confidential issues through an authorization issue in the note endpoint. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11548&quot;&gt;CVE-2019-11548&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @mishre for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 5.4.0 through 11.8.8.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-approval-count-inflation&quot;&gt;Merge Request Approval Count Inflation&lt;&#x2F;h2&gt;

&lt;p&gt;A Race Condition vulnerability was discovered which could allow users to approve a merge request multiple times and potentially reach the approval count required to merge. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11546&quot;&gt;CVE-2019-11546&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;flashdisk&quot;&gt;@flashdisk&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unsanitized-branch-names-on-new-merge-request-notification-emails&quot;&gt;Unsanitized Branch Names on New Merge Request Notification Emails&lt;&#x2F;h2&gt;

&lt;p&gt;The branch name on new merge request notification emails wasn&#x27;t being escaped, which could potentially lead to XSS issues. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11547&quot;&gt;CVE-2019-11547&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;mario-areias&quot;&gt;@mario-areias&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 6.0.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-sanitation-of-credentials-in-gitaly&quot;&gt;Improper Sanitation of Credentials in Gitaly&lt;&#x2F;h2&gt;

&lt;p&gt;Gitaly has been upgraded to fix an information disclosure issue where HTTP&#x2F;GIT credentials were included in logs on connection errors. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11549&quot;&gt;CVE-2019-11549&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @j-jam for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-to-rails-5072&quot;&gt;Upgrade to Rails 5.0.7.2&lt;&#x2F;h2&gt;

&lt;p&gt;Ruby on Rails was upgraded to version 5.0.7.2 for the Gitlab 11.10.2 package. This Ruby on Rails release contains several security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.5.11, 11.6.11, 11.7.12, 11.8.8, 11.9.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/24/gitlab-11-5-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/24/gitlab-11-5-11-released/</id>
<published>2019-04-24T00:00:00+00:00</published>
<updated>2019-04-24T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.5.11, 11.6.11, 11.7.12, 11.8.8, 11.9.9 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;These set of patches are geared towards improved performance of accessing git
data when using NFS for file storage of git data.  This feature sits behind a
feature flag discussed here:
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;nfs.html#improving-nfs-performance-with-gitlab&quot;&gt;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;nfs.html#improving-nfs-performance-with-gitlab&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;performance&quot;&gt;Performance&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;57317&quot;&gt;Bring back a subset of Rugged calls under a feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;1188&quot;&gt;11.8.8&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25750&quot;&gt;Backport Kerberos clone URL to CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26043&quot;&gt;Backports EE change for expanded pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26050&quot;&gt;Fix Bitbucket import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26055&quot;&gt;Fix health checks not working behind load balancers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26190&quot;&gt;Fix error creating a merge request when diff includes a null byte&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9627&quot;&gt;Renders inline downstream &amp;amp; upstream pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.10.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/24/gitlab-11-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/24/gitlab-11-10-1-released/</id>
<published>2019-04-24T00:00:00+00:00</published>
<updated>2019-04-24T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.10.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;04&#x2F;22&#x2F;gitlab-11-10-released&#x2F;&quot;&gt;this month&#x27;s 11.10.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27273&quot;&gt;Only check abilities on rendered GraphQL nodes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27352&quot;&gt;Disable JIT Kubernetes resource creation for project level clusters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27441&quot;&gt;Bring back Rugged implementation of ListCommitsByOid&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27442&quot;&gt;Resolve cluster metrics regression&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27475&quot;&gt;Fix related merge requests not working with relative URL root&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;10450&quot;&gt;Improve SAML settings with validation, design, and help text&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;10819&quot;&gt;Fix approval rules when used with relative url root.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11029&quot;&gt;Fix add&#x2F;remove pipeline dashboard issue.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11033&quot;&gt;Fix JWT token check when repository does not exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11063&quot;&gt;Clear local drafts after submitting merge request review&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11076&quot;&gt;Use a single color for the Insights time series bar charts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;11263&quot;&gt;Fix preventing approval of merge requests by an author&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.10 released with Pipelines on the Operations Dashboard, Pipelines for Merged Results, and Multi-line Merge Request Suggestions</title>
<release>11.10</release>
<link href='https://about.gitlab.com/releases/2019/04/22/gitlab-11-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/22/gitlab-11-10-released/</id>
<published>2019-04-22T00:00:00+00:00</published>
<updated>2019-04-22T00:00:00+00:00</updated>
<author>
<name>Eric Brinkman</name>
</author>
<content type='html'>&lt;h3 id=&quot;easily-see-pipeline-health-across-projects&quot;&gt;Easily see pipeline health across projects&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab continues to add features to provide visibility into
the DevOps lifecycle. This release enhances the
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;operations_dashboard&#x2F;&quot;&gt;Operations Dashboard&lt;&#x2F;a&gt;
with a powerful feature that provides an overview of pipeline status.&lt;&#x2F;p&gt;

&lt;p&gt;This is handy even when looking at a single project&#x27;s pipeline,
but is especially valuable when using &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;multi_project_pipelines.html&quot;&gt;multi-project pipelines&lt;&#x2F;a&gt; - common
when you have a microservices architecture and you
need to run a pipeline to test and deploy code housed in
multiple different project repositories. Now you can get
instant visibility at a glance into the health of all of
your &lt;a href=&quot;#pipelines-on-the-operations-dashboard&quot;&gt;pipelines on the Operations Dashboard&lt;&#x2F;a&gt;,
no matter where they run.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;run-pipelines-against-merged-results&quot;&gt;Run pipelines against merged results&lt;&#x2F;h3&gt;

&lt;p&gt;Over time it’s possible for your source and target branches to diverge, 
which can result in the scenario where both source and target pipelines pass, 
but the combined output fails. Now, you can &lt;a href=&quot;#pipelines-for-merged-results&quot;&gt;run pipelines against the merged result&lt;&#x2F;a&gt;
prior to merging. This allows you to quickly catch errors that would only
surface if you had rebased often, allowing for much quicker resolution of pipeline failures 
and more efficient usage of &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;&quot;&gt;GitLab Runners&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;further-streamline-collaboration&quot;&gt;Further streamline collaboration&lt;&#x2F;h3&gt;

&lt;p&gt;With GitLab 11.10, we provide even more features to simplify
collaboration and developer workflows. In a &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;12&#x2F;22&#x2F;gitlab-11-6-released&#x2F;#suggested-changes&quot;&gt;previous release&lt;&#x2F;a&gt;,
we introduced merge request suggestions, allowing a reviewer
to suggest a one-line change in a merge request comment that
can be readily committed from within the comment thread
interface. Our users loved it and wanted more. Now, you can
suggest a &lt;a href=&quot;#suggest-changes-to-multiple-lines&quot;&gt;multi-line change&lt;&#x2F;a&gt;,
specifying which existing lines to remove, and introducing multiple
lines of additions. Thank you for contributing improvement suggestions!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;and-so-much-more&quot;&gt;And so much more…&lt;&#x2F;h3&gt;

&lt;p&gt;So many great features are available in this release, like
&lt;a href=&quot;#scoped-labels&quot;&gt;Scoped Labels&lt;&#x2F;a&gt;,
a more thorough &lt;a href=&quot;#more-thorough-container-registry-cleanup&quot;&gt;Container Registry cleanup&lt;&#x2F;a&gt;,
&lt;a href=&quot;#composable-auto-devops&quot;&gt;Composable Auto DevOps&lt;&#x2F;a&gt;,
and the ability to &lt;a href=&quot;#purchase-add-on-ci-runner-minutes&quot;&gt;purchase additional CI Runner minutes&lt;&#x2F;a&gt;.
Read on to learn about them all!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_10&#x2F;11_10-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.9.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/11/gitlab-11-9-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/11/gitlab-11-9-8-released/</id>
<published>2019-04-11T00:00:00+00:00</published>
<updated>2019-04-11T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.9.8 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;03&#x2F;22&#x2F;gitlab-11-9-released&#x2F;&quot;&gt;previous month&#x27;s 11.9.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;performance-2-changes&quot;&gt;Performance (2 changes)&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27121&quot;&gt;Improve performance of Pull Request importer.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27235&quot;&gt;Disable method instrumentation for diffs.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;other-1-change&quot;&gt;Other (1 change)&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26905&quot;&gt;Allow use of untrusted Regexp via feature flag.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;27172&quot;&gt;Restore HipChat project service.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;fixed-1-change&quot;&gt;Fixed (1 change)&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;10446&quot;&gt;Fix sorting by priority with filtering by approvers.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.9.7, 11.8.7, and 11.7.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/</id>
<published>2019-04-10T00:00:00+00:00</published>
<updated>2019-04-10T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.9.7, 11.8.7, and 11.7.11 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;The GitLab EE versions contain an important security fix, and we strongly recommend that all GitLab EE installations be upgraded immediately. GitLab CE is not affected, but the
version numbers were increased to be consistent with EE versioning.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-runner-registration-token-exposure&quot;&gt;Group Runner Registration Token Exposure&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab groups API was vulnerable to an information disclosure issue that disclosed group runner registration tokens to unauthorized users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-11000&quot;&gt;CVE-2019-11000&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;storm_spirit&quot;&gt;@storm_spirit&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.9.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/04/gitlab-11-9-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/04/gitlab-11-9-6-released/</id>
<published>2019-04-04T00:00:00+00:00</published>
<updated>2019-04-04T00:00:00+00:00</updated>
<author>
<name>John T Skarbek</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.9.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;03&#x2F;22&#x2F;gitlab-11-9-released&#x2F;&quot;&gt;last month&#x27;s 11.9.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;fixed-6-changes&quot;&gt;Fixed (6 changes)&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26813&quot;&gt;Avoid excessive recursive calls with Rugged TreeEntries&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26785&quot;&gt;Fix API &#x2F;project&#x2F;:id&#x2F;branches not returning correct merge status&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26480&quot;&gt;Force to recreate all MR diffs on import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;added-1-change&quot;&gt;Added (1 change)&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26284&quot;&gt;Add Insights frontend to retrieve and render chart&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;performance-1-change&quot;&gt;Performance (1 change)&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26803&quot;&gt;Force a full GC after importing a project&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;fixed-3-changes&quot;&gt;Fixed (3 changes)&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;10356&quot;&gt;Fix project approval rule with only private group being considered as approved when override is allowed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;10474&quot;&gt;Fix approval rule sourcing from forked MR&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;10507&quot;&gt;Guard against ldap_sync_last_sync_at being nil&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.9.4, 11.8.6, and 11.7.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/04/01/security-release-gitlab-11-dot-9-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/04/01/security-release-gitlab-11-dot-9-dot-4-released/</id>
<published>2019-04-01T00:00:00+00:00</published>
<updated>2019-04-01T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.9.4, 11.8.6, and 11.7.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=%E2%9C%93&amp;amp;state=opened&amp;amp;label_name[]=security&quot;&gt;issue tracker&lt;&#x2F;a&gt; in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dos-potential-for-regex-in-cicd-refs&quot;&gt;DoS potential for regex in CI&#x2F;CD &lt;code&gt;refs&lt;&#x2F;code&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;An regex input validation issue for the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;index.html#onlyrefs--exceptrefs&quot;&gt;&lt;code&gt;refs&lt;&#x2F;code&gt; value&lt;&#x2F;a&gt; was discovered which could allow an attacker to execute a denial of service on the platform. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10640&quot;&gt;CVE-2019-10640&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;notes&quot;&gt;Notes&lt;&#x2F;h3&gt;

&lt;p&gt;Due to this fix, certain regular expression patterns in &lt;code&gt;refs&lt;&#x2F;code&gt; values may no longer be supported and will require modification.&lt;&#x2F;p&gt;

&lt;p&gt;This fix will go live for GitLab.com users on April 8, 2019.&lt;&#x2F;p&gt;

&lt;p&gt;Related issues:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;59703&lt;&#x2F;li&gt;
  &lt;li&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;customer-success&#x2F;professional-services&#x2F;issues&#x2F;421&lt;&#x2F;li&gt;
  &lt;li&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;49665 (confidential for first 30 days past publication)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;explanation&quot;&gt;Explanation&lt;&#x2F;h3&gt;

&lt;p&gt;Previously, GitLab used &lt;a href=&quot;https:&#x2F;&#x2F;ruby-doc.org&#x2F;core-2.4.2&#x2F;Regexp.html&quot;&gt;Ruby&#x27;s Regexp&lt;&#x2F;a&gt; for pattern matching. This change switches the regular expression engine to &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;re2&#x2F;&quot;&gt;RE2&lt;&#x2F;a&gt; while maintaining the previous syntax. GitLab internally converts &lt;code&gt;&#x2F;pattern&#x2F;flags&lt;&#x2F;code&gt; into valid RE2 patterns.&lt;&#x2F;p&gt;

&lt;p&gt;However, this is considered a breaking change because RE2 does not support some patterns, such as negative lookahead, due to computational complexity. For the list of supported syntaxes, see https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;re2&#x2F;wiki&#x2F;Syntax.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;example-1&quot;&gt;Example 1&lt;&#x2F;h4&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;  only:
    - tags
  except:
    - &#x2F;^(?!master).+@&#x2F;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The intent of this matcher is to possibly create a job only on tags that are created for &lt;code&gt;master&lt;&#x2F;code&gt;. However, this did not work as intended, as Git does not have a concept of creating a reference on top of another reference. Tag, branch, and any reference are always created on top of a revision.&lt;&#x2F;p&gt;

&lt;p&gt;The valid equivalent syntax here is:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;only:
  - tags
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h4 id=&quot;example-2&quot;&gt;Example 2&lt;&#x2F;h4&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;  only:
    - &#x2F;&#x2F;@gitlab-org&#x2F;gitlab-ce
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The intent of this matcher is to create a job only for an upstream repository. It fails, as RE2 requires a pattern to be matching. In the above example the behavior is undefined.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;  only:
    - &#x2F;.&#x2F;@gitlab-org&#x2F;gitlab-ce
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;This syntax will successfully match any refname.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;related-branches-visible-in-issues-for-guests&quot;&gt;Related branches visible in issues for guests&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered which allowed Guests of a project to see Related Branches created for an issue. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10116&quot;&gt;CVE-2019-10116&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-at-merge-request-resolve-conflicts&quot;&gt;Persistent XSS at merge request resolve conflicts&lt;&#x2F;h2&gt;

&lt;p&gt;An input validation and output encoding issue was discovered in the merge request &quot;resolve conflicts&quot; page which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10111&quot;&gt;CVE-2019-10111&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;valis_&quot;&gt;@valis_&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.0 to 11.8.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-authorization-control-move-issue&quot;&gt;Improper authorization control &quot;move issue&quot;&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered in the &quot;move issue&quot; feature which could allow an attackers to create projects under any namespace on any GitLab instance on which they already hold credentials. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10110&quot;&gt;CVE-2019-10110&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @mishre for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-users-of-private-projects-have-access-to-releases&quot;&gt;Guest users of private projects have access to releases&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered for the GitLab Releases feature which could allow guest users access to private information like release details. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10115&quot;&gt;CVE-2019-10115&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dos-potential-on-project-languages-page&quot;&gt;DoS potential on project languages page&lt;&#x2F;h2&gt;

&lt;p&gt;A potential denial of service attack vector was discovered on the project languages endpoint. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10113&quot;&gt;CVE-2019-10113&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;opalmer&quot;&gt;@opalmer&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;recurity-assessment-information-exposure-through-timing-discrepancy&quot;&gt;Recurity assessment: information exposure through timing discrepancy&lt;&#x2F;h2&gt;

&lt;p&gt;During the OAuth authentication process, the application attempts to validate a parameter in an insecure way, potentially exposing data. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10114&quot;&gt;CVE-2019-10114&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity&lt;&#x2F;a&gt; for reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;recurity-assessment-loginstate-hmac-issues&quot;&gt;Recurity assessment: loginState HMAC issues&lt;&#x2F;h2&gt;

&lt;p&gt;The construction of the HMAC key was insecurely derived. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10112&quot;&gt;CVE-2019-10112&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity&lt;&#x2F;a&gt; for reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;recurity-assessment-open-redirect&quot;&gt;Recurity assessment: open redirect&lt;&#x2F;h2&gt;

&lt;p&gt;Within the &lt;code&gt;GeoAuthController&lt;&#x2F;code&gt; for the secondary Geo node, a redirect is triggered after successful authentication which was subject to an open redirect vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10117&quot;&gt;CVE-2019-10117&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity&lt;&#x2F;a&gt; for reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pdfjs-vulnerable-to-cve-2018-5158&quot;&gt;PDF.js vulnerable to CVE-2018-5158&lt;&#x2F;h2&gt;

&lt;p&gt;The version of PDF.js embedded in Gitlab is 1.8.172, which is vulnerable to CVE-2018-5158. Per the summary, attacker-supplied JavaScript will be executed in a web worker context. Please see https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1452075 for more details about the CVE. The issue is now mitigated in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;certifiable&quot;&gt;@certifiable&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-labels-of-private-projectsgroups&quot;&gt;IDOR labels of private projects&#x2F;groups&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization issue was discovered which allowed non-members of a private project&#x2F;group to add and read labels. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10108&quot;&gt;CVE-2019-10108&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @vijay_kumar1110](https:&#x2F;&#x2F;hackerone.com&#x2F;indoappsec?type=user) for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.11.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exif-geolocation-data-not-stripped-from-uploaded-images&quot;&gt;EXIF geolocation data not stripped from uploaded images&lt;&#x2F;h2&gt;

&lt;p&gt;Images uploaded to GitLab were not stripped of EXIF geolocation data. As a result, anyone with access to the uploaded image could obtain the its geolocation, device, and software version data, if present. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-10109&quot;&gt;CVE-2019-10109&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; if you are using CentOS Minimal, you may need to install &lt;code&gt;perl&lt;&#x2F;code&gt; package: &lt;code&gt;yum install perl&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jackb898?type=user&quot;&gt;@jackb898&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rgupt&quot;&gt;@rgupt&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all previous versions of GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above are upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;additional-notes-for-removing-existing-uploads&quot;&gt;Additional notes for removing existing uploads&lt;&#x2F;h3&gt;

&lt;p&gt;Since 11.9, EXIF data are automatically stripped from JPG or TIFF image uploads.
Because EXIF data may contain sensitive information (e.g. GPS location), you
may also choose to remove EXIF data from images which were uploaded to older versions of GitLab
with &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;raketasks&#x2F;uploads&#x2F;sanitize.html&quot;&gt;the rake task&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update GitLab, see the &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;security-cover-new.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.9.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/03/26/gitlab-11-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/03/26/gitlab-11-9-1-released/</id>
<published>2019-03-26T00:00:00+00:00</published>
<updated>2019-03-26T00:00:00+00:00</updated>
<author>
<name>Alex Hanselka</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.9.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;03&#x2F;22&#x2F;gitlab-11-9-released&#x2F;&quot;&gt;this month&#x27;s 11.9.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26274&quot;&gt;Resolve &quot;Z-Index Issue on Pipeline Dropdown&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26374&quot;&gt;Add option to whitelist _html fields from attributes on CacheMarkdownField&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26402&quot;&gt;Fix duplicated bottom match line&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26413&quot;&gt;Allow users to create protected branches via CLI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26415&quot;&gt;Resolve &quot;Android template is missing .gitlab-ci.yml&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26473&quot;&gt;Refresh commit count after repository head changes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;26476&quot;&gt;Set proper default-branch on GitHub Import&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9949&quot;&gt;Remove &lt;code&gt;feature_flag_audit&lt;&#x2F;code&gt; feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;10321&quot;&gt;Fix date save for Epic to reflect on UI immediately after save&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.9 released with secrets detection and multiple MR approval rules</title>
<release>11.9</release>
<link href='https://about.gitlab.com/releases/2019/03/22/gitlab-11-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/03/22/gitlab-11-9-released/</id>
<published>2019-03-22T00:00:00+00:00</published>
<updated>2019-03-22T00:00:00+00:00</updated>
<author>
<name>Kenny Johnston</name>
</author>
<content type='html'>&lt;h3 id=&quot;quickly-learn-if-secrets-have-been-leaked&quot;&gt;Quickly learn if secrets have been leaked&lt;&#x2F;h3&gt;

&lt;p&gt;Inadvertently committing credentials to a shared repository can have serious consequences, yet it is a simple
mistake to make. Once an attacker gets your password or API key, they can take over your account, lock you out, and fraudulently spend money.
This can even lead to a domino effect where access to one account grants access to others. With the stakes so high,
it’s of paramount importance to learn as quickly as possible if secrets have been leaked.&lt;&#x2F;p&gt;

&lt;p&gt;With this release, we’re introducing &lt;a href=&quot;#detect-secrets-and-credentials-in-the-repository&quot;&gt;secret detection&lt;&#x2F;a&gt; as
part of our SAST functionality. Each commit is scanned by a CI&#x2F;CD job to ensure it doesn’t contain secrets.
If the scan detects secrets, the developer is alerted in the merge request, allowing them to take action quickly
to invalidate the leaked credentials and generate new ones.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;enforce-proper-change-management&quot;&gt;Enforce proper change management&lt;&#x2F;h3&gt;

&lt;p&gt;As an organization grows and becomes more complex, it becomes difficult to keep alignment across different
parts of the organization. At the same time, the consequences of merging improper or insecure code also
increase when an application has more users and generates more revenue. For many organizations, ensuring
proper review process is followed before code is merged is a hard requirement because the risks of not doing so are so great.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 11.9, we’re providing greater controls and more structure with &lt;a href=&quot;#merge-request-approval-rules&quot;&gt;Merge request approval rules&lt;&#x2F;a&gt;.
Previously, you could specify either an individual or a group for required approval (where any single member of the group can provide approval). Now, multiple rules can be added to a merge request to require individual approvers specifically,
or even require a number of approvers from a particular group. Additionally, the Code Owners feature is an integrated part of approval rules, making it easy to track down who should approve.&lt;&#x2F;p&gt;

&lt;p&gt;This allows organizations to implement complex approval flows, all
while maintaining the simplicity of GitLab’s single application where issues, code, pipelines, and monitoring
data are visible and accessible to inform decisions and speed approval.&lt;&#x2F;p&gt;

&lt;p class=&quot;alert alert-info&quot;&gt;Approval Rules have temporarily been disabled on GitLab.com and are not enabled by default in GitLab 11.9 due to a
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;10356&quot;&gt;regression&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;chatops-is-now-open-source&quot;&gt;ChatOps is now open source&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab ChatOps is a powerful automation tool, allowing you to execute any CI&#x2F;CD job and receive the status
of the job directly from chat apps like Slack and Mattermost. Originally &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;03&#x2F;22&#x2F;gitlab-10-6-released&#x2F;#gitlab-chatops-alpha&quot;&gt;released in GitLab 10.6&lt;&#x2F;a&gt;, ChatOps
was part of the GitLab Ultimate tier. As part of our &lt;a href=&quot;&#x2F;company&#x2F;pricing&#x2F;#the-likely-type-of-buyer-determines-what-features-go-in-what-tier&quot;&gt;product strategy&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;company&#x2F;stewardship&#x2F;&quot;&gt;commitment to open source&lt;&#x2F;a&gt;,
we occasionally move features down in tier and never move them up.&lt;&#x2F;p&gt;

&lt;p&gt;With ChatOps, we felt this was functionality that everyone could benefit from and that the feature itself could benefit from community contributions.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab 11.9, we’ve &lt;a href=&quot;#move-chatops-to-core&quot;&gt;open sourced ChatOps&lt;&#x2F;a&gt; so it is available to use in GitLab
self-managed Core and GitLab.com Free, and is open for community contributions.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h3&gt;

&lt;p&gt;So many great features are available in this release like &lt;a href=&quot;#auditing-for-feature-flags&quot;&gt;Auditing for feature flags&lt;&#x2F;a&gt;,
&lt;a href=&quot;#vulnerability-remediation-merge-request&quot;&gt;Vulnerability remediation merge request&lt;&#x2F;a&gt;,
and &lt;a href=&quot;#cicd-templates-for-security-jobs&quot;&gt;CI&#x2F;CD templates for security jobs&lt;&#x2F;a&gt; that you’ll want to read on to learn about them all!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_9&#x2F;11_9-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.8.3 and 11.7.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/03/20/critical-security-release-gitlab-11-dot-8-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/03/20/critical-security-release-gitlab-11-dot-8-dot-3-released/</id>
<published>2019-03-20T00:00:00+00:00</published>
<updated>2019-03-20T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.8.3 and 11.7.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-runner-registration-token-exposed-through-issues-quick-actions&quot;&gt;Project Runner Registration Token Exposed Through Issues Quick Actions&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab issues quick actions were vulnerable to an information disclosure issue that disclosed project runner registration tokens to unauthorized users. The issue is now mitigated in the latest release 
and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9866&quot;&gt;CVE-2019-9866&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-mattermost-to-version-565-in-gitlab-117&quot;&gt;Upgrade Mattermost to Version 5.6.5 in GitLab 11.7&lt;&#x2F;h2&gt;

&lt;p&gt;The Mattermost integration was updated to version 5.6.5 for the GitLab 11.7 package. Included in this Mattermost release are several security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.8.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/03/14/gitlab-11-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/03/14/gitlab-11-8-2-released/</id>
<published>2019-03-14T00:00:00+00:00</published>
<updated>2019-03-14T00:00:00+00:00</updated>
<author>
<name>Yorick Peterse</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.8.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;02&#x2F;22&#x2F;gitlab-11-8-released&#x2F;&quot;&gt;this month&#x27;s 11.8.0
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25433&quot;&gt;Docs review: MR diffs external storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25475&quot;&gt;Remove padding for mr-widget-section&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25496&quot;&gt;Update minimum ruby version to 2.5.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25511&quot;&gt;Properly handle multiple X-Forwarded-For addresses in runner IP&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25524&quot;&gt;Allow &lt;code&gt;:read_list&lt;&#x2F;code&gt; when &lt;code&gt;:read_group&lt;&#x2F;code&gt; is allowed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25546&quot;&gt;Fix method to mark a project repository as writable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;25239&quot;&gt;Resolve &quot;Gitlab Project import fails: sidekiq undefined method import_jid&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9588&quot;&gt;Remove feature_flags_environment_scope feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9602&quot;&gt;Fix GroupSAML metadata feature flag&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9604&quot;&gt;Fix typo in Roadmap sorting causing scrolling to fail on null dates&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9648&quot;&gt;Compute approved approver for merged MR if it is absent&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9653&quot;&gt;Fix multiple approval rules license level&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9796&quot;&gt;Fix bridge jobs than can be hidden keys too&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9819&quot;&gt;Fix Approval UI showing up for free plan&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9899&quot;&gt;Resolve &quot;Add &quot;No approval required&quot; state to approval rules MR component&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;security-fix&quot;&gt;Security fix&lt;&#x2F;h3&gt;

&lt;h4 id=&quot;public-project-in-a-private-group-makes-the-group-page-publicly-accessible&quot;&gt;Public project in a private group makes the group page publicly accessible&lt;&#x2F;h4&gt;

&lt;p&gt;Sharing a public project with a private group makes the group page publicly accessible. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9732&quot;&gt;CVE-2019-9732&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h4&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.0.3 and later.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h4&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.8.1, 11.7.6, and 11.6.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/03/04/security-release-gitlab-11-dot-8-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/03/04/security-release-gitlab-11-dot-8-dot-1-released/</id>
<published>2019-03-04T00:00:00+00:00</published>
<updated>2019-03-04T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.8.1, 11.7.6, and 11.6.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-file-read-via-mergerequestdiff&quot;&gt;Arbitrary file read via MergeRequestDiff&lt;&#x2F;h2&gt;

&lt;p&gt;A problem with lack of input validation was discovered for MergeRequestDiff objects which resulted in an arbitrary local file read. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9221&quot;&gt;CVE-2019-9221&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-add-publicinternal-groups-as-members-to-project&quot;&gt;IDOR add &lt;code&gt;public&lt;&#x2F;code&gt;&#x2F;&lt;code&gt;internal&lt;&#x2F;code&gt; groups as members to project&lt;&#x2F;h2&gt;

&lt;p&gt;An IDOR was discovered which could allow project owners to add &lt;code&gt;public&lt;&#x2F;code&gt;&#x2F;&lt;code&gt;internal&lt;&#x2F;code&gt; groups, of which they are not a member, to their project. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9756&quot;&gt;CVE-2019-9756&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;indoappsec?type=user&quot;&gt;@vijay_kumar1110&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.8.0 and earlier.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;csrf-add-kubernetes-cluster-integration&quot;&gt;CSRF add Kubernetes cluster integration&lt;&#x2F;h2&gt;

&lt;p&gt;The Kubernetes integration feature was vulnerable to CSRF which could result in overwriting an existing Kubernetes integration with the attacker&#x27;s cluster. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9176&quot;&gt;CVE-2019-9176&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;cache-money&quot;&gt;@cache-money&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blind-ssrf-in-prometheus-integration&quot;&gt;Blind SSRF in prometheus integration&lt;&#x2F;h2&gt;

&lt;p&gt;The prometheus integration feature was vulnerable to SSRF which could result access to internal services. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9174&quot;&gt;CVE-2019-9174&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-information-disclosure&quot;&gt;Merge request information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;Projects configured with MRs accessible only by project members were subject to information disclosure to non-members via a specific API endpoint. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9172&quot;&gt;CVE-2019-9172&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-milestone-name-information-disclosure&quot;&gt;IDOR milestone name information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The milestone picker was vulnerable to an IDOR which resulted in disclosure of milestone names. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9170&quot;&gt;CVE-2019-9170&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 2.9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;burndown-chart-information-disclosure&quot;&gt;Burndown chart information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The burndown chart feature was inadvertently leaking confidential issue attribute information. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9175&quot;&gt;CVE-2019-9175&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-merge-request-titles-in-public-project-information-disclosure&quot;&gt;Private merge request titles in public project information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The milestones tab was inadvertently leaking private merge request titles to the public. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9178&quot;&gt;CVE-2019-9178&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.12 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-namespace-disclosure-in-email-notification-when-issue-is-moved&quot;&gt;Private namespace disclosure in email notification when issue is moved&lt;&#x2F;h2&gt;

&lt;p&gt;When an issue is moved to a private namespace, the email notification was inadvertently disclosing the project path which it was moved to. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9179&quot;&gt;CVE-2019-9179&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-with-restricted-repo-access-can-access-and-create-discussions-on-commits&quot;&gt;Users with restricted repo access can access and create discussions on commits&lt;&#x2F;h2&gt;

&lt;p&gt;A permissions issue was discovered for access to discussions&#x2F;notes on commits. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9890&quot;&gt;CVE-2019-9890&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;milestone-name-disclosure&quot;&gt;Milestone name disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;When a project is public and issues are set to &lt;code&gt;Only Project Members&lt;&#x2F;code&gt;, milestone names are able to be disclosed via the milestone autocomplete and board endpoints. These issues are now mitigated in the latest release and are assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9171&quot;&gt;CVE-2019-9171&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9224&quot;&gt;CVE-2019-9224&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.16 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-board-name-disclosure&quot;&gt;Issue board name disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;When a project is public and issues are set to &lt;code&gt;Only Project Members&lt;&#x2F;code&gt;, issue board names are able to be disclosed via the boards and boards list API endpoints. These issues are now mitigated in the latest release and are assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9225&quot;&gt;CVE-2019-9225&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9219&quot;&gt;CVE-2019-9219&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;indoappsec?type=user&quot;&gt;@vijay_kumar1110&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.16 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;npm-automatic-package-referencer&quot;&gt;NPM automatic package referencer&lt;&#x2F;h2&gt;

&lt;p&gt;The automatic package referencer contained an issue where victims could be tricked into installing and executing a malicious package from the npm registry. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9217&quot;&gt;CVE-2019-9217&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;edoverflow&quot;&gt;@edoverflow&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.16 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-traversal-snippet-mover&quot;&gt;Path traversal snippet mover&lt;&#x2F;h2&gt;

&lt;p&gt;The logic to move snippets contained a path traversal vulnerability which is currently resulting in a denial of service but could result in data exposure. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9222&quot;&gt;CVE-2019-9222&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pindakaas&quot;&gt;@pindakaas&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-repo-existence&quot;&gt;Information disclosure repo existence&lt;&#x2F;h2&gt;

&lt;p&gt;An information disclosure was discovered which could allow an attacker to determine the existence of a private repo by attempting to clone it. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9223&quot;&gt;CVE-2019-9223&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;tim241&quot;&gt;Tim Wanders&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.15 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-dos-via-mermaid&quot;&gt;Issue DoS via Mermaid&lt;&#x2F;h2&gt;

&lt;p&gt;An input validation issue was discovered in the issue page markdown field which could result in a DoS on the affected issue. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9220&quot;&gt;CVE-2019-9220&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;8ayac&quot;&gt;@8ayac&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-impersonate-user&quot;&gt;Privilege escalation impersonate user&lt;&#x2F;h2&gt;

&lt;p&gt;The impersonate user feature contained a vulnerability which could allow for the user being impersonated to escalate privileges. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-9485&quot;&gt;CVE-2019-9485&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;skavans&quot;&gt;@skavans&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;validate-inresponseto-when-linking-gitlabcom-group-saml&quot;&gt;Validate InResponseTo when linking GitLab.com Group SAML&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab.com is now validating the &lt;code&gt;InResponseTo&lt;&#x2F;code&gt; field in the SAML response matches the unique ID we generated for the initial request in order to prevent account hijacking. Note that GitLab.com issues cannot be assigned CVE IDs.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab.com Only.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;The patch has already been applied to GitLab.com&lt;&#x2F;p&gt;

&lt;h2 id=&quot;permissions-issue-gitlabcom-group-saml&quot;&gt;Permissions issue GitLab.com Group SAML&lt;&#x2F;h2&gt;

&lt;p&gt;Disabling the Group SAML option, after previously enabling it, could still allow users to join via SAML SSO. Note that GitLab.com issues cannot be assigned CVE IDs.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab.com Only.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;The patch has already been applied to GitLab.com&lt;&#x2F;p&gt;

&lt;h2 id=&quot;omnibus-updates&quot;&gt;Omnibus updates&lt;&#x2F;h2&gt;

&lt;p&gt;Non-security updates for the &lt;code&gt;gitlab-ctl restart unicorn&lt;&#x2F;code&gt; &lt;code&gt;restart_command&lt;&#x2F;code&gt; have been applied. Please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;3062 for more details regarding this update.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.8 released with SAST for JavaScript, Pages for subgroups, and Error Tracking</title>
<release>11.8</release>
<link href='https://about.gitlab.com/releases/2019/02/22/gitlab-11-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/02/22/gitlab-11-8-released/</id>
<published>2019-02-22T00:00:00+00:00</published>
<updated>2019-02-22T00:00:00+00:00</updated>
<author>
<name>Joshua Lambert</name>
</author>
<content type='html'>&lt;h2 class=&quot;intro-header&quot; id=&quot;javascript-coverage-in-sast&quot;&gt;JavaScript coverage in SAST&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Static Application Security Testing (SAST) scans source code and helps to detect potential security vulnerabilities early in the pipeline. In 11.8, we&#x27;ve added &lt;a href=&quot;.&#x2F;#sast-support-for-javascript&quot;&gt;SAST support for JavaScript&lt;&#x2F;a&gt;, building on top of our existing node.js support. Now any JavaScript file can be scanned, like static scripts and HTML. A vital practice in DevSecOps is to scan code changes with each commit, and with this change, we&#x27;re covering one of the most popular web languages, helping you to find JavaScript risks as early as possible.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;gitlab-pages-for-subgroups-and-templates&quot;&gt;GitLab Pages for subgroups and templates&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages got a whole lot better this release, with two key improvements. First, we have introduced &lt;a href=&quot;.&#x2F;#pages-support-for-subgroups&quot;&gt;GitLab Pages support for projects in subgroups&lt;&#x2F;a&gt;, enabling these projects to easily publish content to the web. GitLab 11.8 also bundles our most popular &lt;a href=&quot;.&#x2F;#create-pages-sites-in-one-click-using-bundled-templates&quot;&gt;templates for Pages&lt;&#x2F;a&gt;, so users can get started with just a single click.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;error-tracking-with-sentry&quot;&gt;Error Tracking with Sentry&lt;&#x2F;h2&gt;

&lt;p&gt;Application errors provide important insight into the health of your application, and can help detect problems without waiting for users to report them. GitLab 11.8 can now &lt;a href=&quot;.&#x2F;#error-tracking-with-sentry&quot;&gt;display the most recent errors&lt;&#x2F;a&gt; directly within the project, making them easier and quicker to find and take action on.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-many-more-great-features&quot;&gt;And many more great features!&lt;&#x2F;h2&gt;

&lt;p&gt;There are so many great features in this release, that we wanted to highlight a few more:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;.&#x2F;#merge-request-approval-rules&quot;&gt;&lt;strong&gt;Merge Request Approval Rules&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;: Easily define rules for who needs to approve a change, whether it&#x27;s a specific user, group, or role. Available on GitLab.com soon, and can be enabled in your own GitLab instance by an administrator.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;.&#x2F;#feature-flags-for-environments&quot;&gt;&lt;strong&gt;Feature Flags for Environments&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;: Previously, feature flags were either on or off across all of your environments. No more! Feature flags can now be selectively enabled on a per-environment basis. Available on GitLab.com today, and can be enabled in your own GitLab instance by an administrator.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;#improved-squash-commit-messages&quot;&gt;&lt;strong&gt;Improved Squash Commit Messages&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;: For those who enjoy crafting great commit messages, it can be sad to see them lost in a squashed commit to keep things tidy. On 11.8 squashed commits now automatically utilize the first multi-line commit message, and can also be overridden to make them even better.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_8&#x2F;11_8-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.7.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/02/07/gitlab-11-7-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/02/07/gitlab-11-7-5-released/</id>
<published>2019-02-07T00:00:00+00:00</published>
<updated>2019-02-07T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.7.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;02&#x2F;05&#x2F;critical-security-release-gitlab-11-dot-7-dot-4-released&#x2F;&quot;&gt;GitLab Critical Security Release: 11.7.4&lt;&#x2F;a&gt; and prior.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24499&quot;&gt;Fix import handling errors in Bitbucket Server importer.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24603&quot;&gt;Adjusts suggestions unable to be applied.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24615&quot;&gt;Fix 500 errors with legacy appearance logos.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24645&quot;&gt;Fix form functionality for edit tag page.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Update Workhorse to v8.0.2.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24877&quot;&gt;Downcase aliased OAuth2 callback providers.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24884&quot;&gt;Fix Detect Host Keys not working.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24907&quot;&gt;Changed external wiki query method to prevent attribute caching.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.7.4 and 11.6.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/02/05/critical-security-release-gitlab-11-dot-7-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/02/05/critical-security-release-gitlab-11-dot-7-dot-4-released/</id>
<published>2019-02-05T00:00:00+00:00</published>
<updated>2019-02-05T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.7.4 and 11.6.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;leak-of-confidential-issue-and-merge-request-titles&quot;&gt;Leak of Confidential Issue and Merge Request Titles&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Releases were vulnerable to an authorization issue that allowed users to view confidential issue and merge request titles of other projects. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-7353&quot;&gt;CVE-2019-7353&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-user-status&quot;&gt;Persistent XSS in User Status&lt;&#x2F;h2&gt;

&lt;p&gt;A regression was identified in the patch for a persistent XSS attack in user status. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6796&quot;&gt;CVE-2019-6796&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.7.3, 11.6.8, 11.5.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/</id>
<published>2019-01-31T00:00:00+00:00</published>
<updated>2019-01-31T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.7.3, 11.6.8, and 11.5.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;These versions are the public releases following 11.7.0, 11.6.5, and 11.5.7. The intermediate versions were not made public for quality assurance reasons.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;remote-command-execution-via-gitlab-pages&quot;&gt;Remote Command Execution via GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages contained a directory traversal vulnerability that could lead to remote command execution. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6783&quot;&gt;CVE-2019-6783&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bink&quot;&gt;@bink&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE 8.17, and EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;covert-redirect-to-steal-githubbitbucket-tokens&quot;&gt;Covert Redirect to Steal GitHub&#x2F;Bitbucket Tokens&lt;&#x2F;h2&gt;

&lt;p&gt;For installations using GitHub or Bitbucket OAuth integrations, it was possible to use a &lt;a href=&quot;http:&#x2F;&#x2F;tetraph.com&#x2F;covert_redirect&#x2F;&quot;&gt;covert redirect&lt;&#x2F;a&gt; to obtain the user OAuth token for those services. This release moves the OAuth callbacks to a common path to mitigate the issue.  The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6788&quot;&gt;CVE-2019-6788&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @mishre and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;yipman&quot;&gt;@yipman&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Necessary Action:&lt;&#x2F;em&gt; It is necessary to append &lt;code&gt;&#x2F;users&#x2F;auth&lt;&#x2F;code&gt; to the callback URL in GitHub or Bitbucket to fully protect against this issue. Please see our pages on the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;github.html&quot;&gt;GitHub&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;bitbucket.html&quot;&gt;Bitbucket&lt;&#x2F;a&gt; integrations for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;remote-mirror-branches-leaked-by-git-transfer-refs&quot;&gt;Remote Mirror Branches Leaked by Git Transfer Refs&lt;&#x2F;h2&gt;

&lt;p&gt;A Gitv2 feature used to hide certain internal references does not function correctly, and can reveal hidden refs. This release disables Gitv2 in GitLab until the problem is resolved. No additional action is required, even if Gitv2 was manually configured.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;denial-of-service-with-markdown&quot;&gt;Denial of Service with Markdown&lt;&#x2F;h2&gt;

&lt;p&gt;It was found that inputting an overly long string into a Markdown field could cause a denial of service. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6785&quot;&gt;CVE-2019-6785&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;8ayac&quot;&gt;@8ayac&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guests-can-view-list-of-group-merge-requests&quot;&gt;Guests Can View List of Group Merge Requests&lt;&#x2F;h2&gt;

&lt;p&gt;Guest users were able to view the list of a group&#x27;s merge requests. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6790&quot;&gt;CVE-2019-6790&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.14 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-can-view-merge-request-titles-via-system-notes&quot;&gt;Guest Can View Merge Request Titles via System Notes&lt;&#x2F;h2&gt;

&lt;p&gt;System notes contained an access control issue that permitted a guest user to view merge request titles. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6997&quot;&gt;CVE-2019-6997&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-via-katex&quot;&gt;Persistent XSS via KaTeX&lt;&#x2F;h2&gt;

&lt;p&gt;Markdown fields contained a lack of input validation and output encoding when processing KaTeX that resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6784&quot;&gt;CVE-2019-6784&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jouko&quot;&gt;@jouko&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;emails-sent-to-unauthorized-users&quot;&gt;Emails Sent to Unauthorized Users&lt;&#x2F;h2&gt;

&lt;p&gt;In some cases, users without project permissions received emails after a project move. For private projects, this would disclose the new project namespace to an unauthorized user. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6789&quot;&gt;CVE-2019-6789&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 6.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;hyperlink-injection-in-notification-emails&quot;&gt;Hyperlink Injection in Notification Emails&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible to use the profile name to inject a potentially malicious link into notification emails. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6781&quot;&gt;CVE-2019-6781&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;corb3nik&quot;&gt;@corb3nik&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-access-to-lfs-objects&quot;&gt;Unauthorized Access to LFS Objects&lt;&#x2F;h2&gt;

&lt;p&gt;The contents of an LFS object could be accessed by an unauthorized user, if the file size and OID were known. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6786&quot;&gt;CVE-2019-6786&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Maxim Ivanov for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.16 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;trigger-token-exposure&quot;&gt;Trigger Token Exposure&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab API contained an authorization issue that permitted project Maintainers and Owners to view the trigger tokens of other project users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6787&quot;&gt;CVE-2019-6787&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.12 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-rails-to-5071-and-4211&quot;&gt;Upgrade Rails to 5.0.7.1 and 4.2.11&lt;&#x2F;h2&gt;

&lt;p&gt;This release upgrades the version of Ruby on Rails included in GitLab to address &lt;a href=&quot;https:&#x2F;&#x2F;groups.google.com&#x2F;forum&#x2F;#!topic&#x2F;rubyonrails-security&#x2F;FL4dSdzr2zw&quot;&gt;CVE-2018-16476&lt;&#x2F;a&gt;. GitLab versions 11.7 and 11.6 will now use Rails 5.0.7.1, and GitLab 11.5 will now use 4.2.11&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;contributed-project-information-visible-in-private-profile&quot;&gt;Contributed Project Information Visible in Private Profile&lt;&#x2F;h2&gt;

&lt;p&gt;Due to an authorization issue the contributed project information of a private profile could be viewed. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6782&quot;&gt;CVE-2019-6782&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;imported-project-retains-prior-visibility-setting&quot;&gt;Imported Project Retains Prior Visibility Setting&lt;&#x2F;h2&gt;

&lt;p&gt;When a project with visibility more permissive than the target group was imported, it would retain its prior visibility. This release will now change the visibility of the project to the visibility of the group. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6791&quot;&gt;CVE-2019-6791&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;error-disclosure-on-project-import&quot;&gt;Error disclosure on Project Import&lt;&#x2F;h2&gt;

&lt;p&gt;When an error was encountered on project import, the error message would display instance internal information. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6792&quot;&gt;CVE-2019-6792&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-user-status&quot;&gt;Persistent XSS in User Status&lt;&#x2F;h2&gt;

&lt;p&gt;The user status field contained a lack of input validation and output encoding that resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6796&quot;&gt;CVE-2019-6796&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;last-commit-status-leaked-to-guest-users&quot;&gt;Last Commit Status Leaked to Guest Users&lt;&#x2F;h2&gt;

&lt;p&gt;A project guest user could view the last commit status of the default branch. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6794&quot;&gt;CVE-2019-6794&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mitigations-for-idn-homograph-and-rtlo-attacks&quot;&gt;Mitigations for IDN Homograph and RTLO Attacks&lt;&#x2F;h2&gt;

&lt;p&gt;IDN homographs and RTLO characters were rendered to unicode, which could be used for social engineering. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6795&quot;&gt;CVE-2019-6795&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;edoverflow&quot;&gt;@edoverflow&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;access-to-internal-wiki-when-external-wiki-enabled&quot;&gt;Access to Internal Wiki When External Wiki Enabled&lt;&#x2F;h2&gt;

&lt;p&gt;Access to the internal wiki was permitted when an external wiki service was enabled. With this release, each type of wiki will be managed and displayed separately in the UI. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6960&quot;&gt;CVE-2019-6960&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-can-comment-on-locked-project-issues&quot;&gt;User Can Comment on Locked Project Issues&lt;&#x2F;h2&gt;

&lt;p&gt;Users were able to comment on locked project issues. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6995&quot;&gt;CVE-2019-6995&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;flashdisk&quot;&gt;@flashdisk&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-19&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-19&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-reaction-emojis-by-guest-users&quot;&gt;Unauthorized Reaction Emojis by Guest Users&lt;&#x2F;h2&gt;

&lt;p&gt;Guest users were able to add reaction emojis on comments to which they had no visibility. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-7176&quot;&gt;CVE-2019-7176&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-20&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-20&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-retains-project-role-after-removal-from-private-group&quot;&gt;User Retains Project Role After Removal from Private Group&lt;&#x2F;h2&gt;

&lt;p&gt;A user would retain their role within a project in a private group after being removed from the group, if their privileges within the project were different from the group. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-7155&quot;&gt;CVE-2019-7155&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;rpadovani&quot;&gt;@rpadovani&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-21&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-21&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-token-leaked-to-maintainers&quot;&gt;GitHub Token Leaked to Maintainers&lt;&#x2F;h2&gt;

&lt;p&gt;The GitHub token used in &lt;strong&gt;CI&#x2F;CD for External Repos&lt;&#x2F;strong&gt; was being leaked to project maintainers in the UI. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6797&quot;&gt;CVE-2019-6797&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-22&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-22&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-blind-ssrf-in-jira-integration&quot;&gt;Unauthenticated Blind SSRF in Jira Integration&lt;&#x2F;h2&gt;

&lt;p&gt;The Jira integration feature was vulnerable to an unauthenticated blind SSRF issue. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6793&quot;&gt;CVE-2019-6793&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-23&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-23&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-access-to-group-membership&quot;&gt;Unauthorized Access to Group Membership&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request approvers section had an access control issue that permitted project maintainers to view membership of private groups. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6996&quot;&gt;CVE-2019-6996&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-24&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-24&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;validate-saml-response-in-group-saml-sso&quot;&gt;Validate SAML Response in Group SAML SSO&lt;&#x2F;h2&gt;

&lt;p&gt;In preparation for enhanced group SAML SSO support in GitLab.com, additional validations were added to the group SAML implementation to validate that an SSO request was initiated from GitLab.com. This will ensure that a malicious user is unable to trick users into linking their account to a malicious IdP.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-25&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-25&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;This enhancement currently applies only to GitLab.com&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated: 2019-02-07&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;h2 id=&quot;pipelines-section-is-available-to-unauthorized-users&quot;&gt;Pipelines section is available to unauthorized users&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab pipelines feature was vulnerable to authorization issues that allowed unauthorized users to view job information. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-7549&quot;&gt;CVE-2019-7549&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Soullivaneuh&quot;&gt;Sullivan Senechal&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt;, and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-26&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-26&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.7 shipped with Releases, Multi-level Child Epics, and NPM Registry</title>
<release>11.7</release>
<link href='https://about.gitlab.com/releases/2019/01/22/gitlab-11-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/01/22/gitlab-11-7-released/</id>
<published>2019-01-22T00:00:00+00:00</published>
<updated>2019-01-22T00:00:00+00:00</updated>
<author>
<name>Victor Wu</name>
</author>
<content type='html'>&lt;h2 class=&quot;intro-header&quot; id=&quot;managing-releases-just-got-a-whole-lot-easier&quot;&gt;Managing releases just got a whole lot easier&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 11.7 delivers &lt;a href=&quot;#publish-releases-for-your-projects&quot;&gt;Releases&lt;&#x2F;a&gt; in GitLab Core. Users now have release snapshots that not only include the source code but &lt;em&gt;all&lt;&#x2F;em&gt; related artifacts.
This eliminates the need for manual collection of source code, build output, and other metadata or artifacts associated with a released version of your code. Additionally, Releases sets the stage for broader, more robust release orchestration in the future.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;portfolio-management-supports-more-complex-work-breakdown-structures&quot;&gt;Portfolio Management supports more complex work breakdown structures&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;#multi-level-child-epics&quot;&gt;Multi-level Child Epics&lt;&#x2F;a&gt; are the newest addition to GitLab portfolio management, available in Ultimate. Child Epics enable multi-level work breakdown structures, helping you manage more complex projects and workplans. You can now have an epic containing both issues and epics.
This structure enables a direct connection between planning and actionable issues to implement.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;streamlining-javascript-development-with-npm-registries&quot;&gt;Streamlining JavaScript development with NPM registries&lt;&#x2F;h2&gt;

&lt;p&gt;Gitlab 11.7 Premium delivers &lt;a href=&quot;#npm-registry&quot;&gt;NPM registries&lt;&#x2F;a&gt; directly in GitLab, providing a standard, more secure way to share and version control NPM packages across projects. Simply share the package name and NPM and GitLab handles the rest, all within a single interface!&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-so-much-more&quot;&gt;And so much more&lt;&#x2F;h2&gt;

&lt;p&gt;It is always so hard to pick which features are our top features in our monthly releases, so we are calling out a couple of additional cool features:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;#remediate-vulnerability-with-patch-file&quot;&gt;&lt;strong&gt;Remediate vulnerability with patch file&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;: As you know, GitLab security features help you to detect vulnerabilities. With GitLab 11.7, you now have the ability to remediate that vulnerability and suggest a solution for Node.js projects managed with Yarn. While this is our first official remediation-type feature, you can be sure it is only just the beginning!&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;#api-support-for-kubernetes-integration&quot;&gt;&lt;strong&gt;API integration with Kubernetes&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;: If you are into creating &lt;em&gt;a lot&lt;&#x2F;em&gt; of Kubernetes clusters or consider yourself a Kubernetes ninja, we have a Kubernetes API to greatly reduce manual efforts and make your life a whole lot easier!&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;a href=&quot;#cross-project-pipeline-browsing&quot;&gt;&lt;strong&gt;Cross-project pipeline browsing&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt;: With the ability to view pipelines across projects, the sky&#x27;s the limit on what information is readily at your fingertips with this feature!&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Read on for the complete list of features for GitLab 11.7!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_7&#x2F;11_7-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.6.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/01/17/gitlab-11-6-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/01/17/gitlab-11-6-5-released/</id>
<published>2019-01-17T00:00:00+00:00</published>
<updated>2019-01-17T00:00:00+00:00</updated>
<author>
<name>John Jarvis</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.6.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2019&#x2F;01&#x2F;16&#x2F;critical-security-release-gitlab-11-dot-6-dot-4-released&#x2F;&quot;&gt;GitLab Critical Security Release: 11.6.4&lt;&#x2F;a&gt; and prior.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24156&quot;&gt;Add syntax highlighting to suggestion diff.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24282&quot;&gt;Fix broken templated &quot;Too many changes to show&quot; text&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24291&quot;&gt;Fix requests profiler in admin page not rendering HTML properly.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24346&quot;&gt;Fix no avatar not showing in user selection box.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23994&quot;&gt;Fix diff suggestions removing dashes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9105&quot;&gt;Fix Error 500 when deleting a pipeline via the API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.6.4, 11.5.7, 11.4.14</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/01/16/critical-security-release-gitlab-11-dot-6-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/01/16/critical-security-release-gitlab-11-dot-6-dot-4-released/</id>
<published>2019-01-16T00:00:00+00:00</published>
<updated>2019-01-16T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.6.4, 11.5.7, and 11.4.14 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-repo-read-in-gitlab-project-import&quot;&gt;Arbitrary repo read in Gitlab project import&lt;&#x2F;h2&gt;

&lt;p&gt;The project import feature contained a lack of archive validation which could result in an arbitrary repo read. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-6240&quot;&gt;CVE-2019-6240&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.6.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/01/05/gitlab-11-6-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/01/05/gitlab-11-6-3-released/</id>
<published>2019-01-05T00:00:00+00:00</published>
<updated>2019-01-05T00:00:00+00:00</updated>
<author>
<name>Alex Hanselka</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.6.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;12&#x2F;22&#x2F;gitlab-11-6-released&#x2F;&quot;&gt;this month&#x27;s 11.6.2 release&lt;&#x2F;a&gt; and earlier.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24131&quot;&gt;Fix clone URL not showing if protocol is HTTPS.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;9019&quot;&gt;Fix instance project templates no longer working&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2938&quot;&gt;Fix Docker registry not working with Windows layers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.6.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2019/01/03/gitlab-11-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2019/01/03/gitlab-11-6-2-released/</id>
<published>2019-01-03T00:00:00+00:00</published>
<updated>2019-01-03T00:00:00+00:00</updated>
<author>
<name>Alex Hanselka</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.6.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;12&#x2F;22&#x2F;gitlab-11-6-released&#x2F;&quot;&gt;this month&#x27;s 11.6.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23935&quot;&gt;Hide cluster features that don&#x27;t work yet with Group Clusters.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23939&quot;&gt;Fix a 500 error that could occur until all migrations are done.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24015&quot;&gt;Fix missing Git clone button when protocol restriction setting enabled.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24029&quot;&gt;Fix clone dropdown parent inheritance issues in HAML.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;24078&quot;&gt;Fix content-disposition in blobs and files API endpoint.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed markdown toolbar buttons.&lt;&#x2F;li&gt;
  &lt;li&gt;Adjust line-height of blame view line numbers.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.6.1, 11.5.6, 11.4.13</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/12/31/security-release-gitlab-11-dot-6-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/31/security-release-gitlab-11-dot-6-dot-1-released/</id>
<published>2018-12-31T00:00:00+00:00</published>
<updated>2018-12-31T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.6.1, 11.5.6, and 11.4.13 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;source-code-disclosure-merge-request-diff&quot;&gt;Source code disclosure merge request diff&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request diff feature was missing an authorization control which resulted in source code disclosure of public or internal projects with a repository available to team members only. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20493&quot;&gt;CVE-2018-20493&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.17 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;todos-improper-access-control&quot;&gt;Todos improper access control&lt;&#x2F;h2&gt;

&lt;p&gt;The todos component was vulnerable to an improper access control issue which could&#x27;ve resulted in access to confidential issues or merge requests. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20492&quot;&gt;CVE-2018-20492&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;url-rel-attribute-not-set&quot;&gt;URL &lt;code&gt;rel&lt;&#x2F;code&gt; attribute not set&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;code&gt;rel&lt;&#x2F;code&gt; attribute was not set for some URLs in a markdown field. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20489&quot;&gt;CVE-2018-20489&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; from HackerOne for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.1 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-autocompletion&quot;&gt;Persistent XSS Autocompletion&lt;&#x2F;h2&gt;

&lt;p&gt;An attribute used in autocompletion contained an input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20490&quot;&gt;CVE-2018-20490&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jouko&quot;&gt;@jouko&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-repository-mirroring&quot;&gt;SSRF repository mirroring&lt;&#x2F;h2&gt;

&lt;p&gt;The repository mirroring feature was vulnerable to an SSRF issue. It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20497&quot;&gt;CVE-2018-20497&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;p&gt;By default, this fix forbids importing projects or mirroring repositories in the same network. In order to allow URLs pointing to the local network, the option located in &lt;code&gt;Admin &amp;gt; Settings &amp;gt; Network &amp;gt; Outbound requests &amp;gt; Allow requests to the local network from hooks and services&lt;&#x2F;code&gt; has to be enabled.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.7.0 and later.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated: 2019-01-14:&lt;&#x2F;em&gt; A similar SSRF issue in &lt;code&gt;CI&#x2F;CD Pipelines for External Repositories&lt;&#x2F;code&gt; was also mitigated with this fix. It now respects the &lt;code&gt;Outbound requests&lt;&#x2F;code&gt; setting above. Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;math1as&quot;&gt;@math1as&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-job-token-lfs-error-message-disclosure&quot;&gt;CI job token LFS error message disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The CI job token was being disclosed in the job output due to an LFS error message. It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20495&quot;&gt;CVE-2018-20495&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Nowaker&quot;&gt;Damian Nowak&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;secret-ci-variable-exposure&quot;&gt;Secret CI variable exposure&lt;&#x2F;h2&gt;

&lt;p&gt;Secret CI variables can be exposed by creating a tag with the same name as an existing protected branch. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20488&quot;&gt;CVE-2018-20488&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.3 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-user-ci-job-disclosure&quot;&gt;Guest user CI job disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The CI jobs API endpoint contained an improper access control issue which resulted in guest users being able to access job information. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20494&quot;&gt;CVE-2018-20494&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.4 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-label-reference&quot;&gt;Persistent XSS label reference&lt;&#x2F;h2&gt;

&lt;p&gt;The markdown label references feature contained a lack of input validation and output encoding issue which resulted in a persistent XSS. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20496&quot;&gt;CVE-2018-20496&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jouko&quot;&gt;@jouko&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.10 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-wiki-in-ie-browser&quot;&gt;Persistent XSS wiki in IE browser&lt;&#x2F;h2&gt;

&lt;p&gt;A persistent XSS issue was discovered in wiki markdown pages due to an issue of how Internet Explorer treats a certain configuration of the CSP header. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20491&quot;&gt;CVE-2018-20491&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @ruvlol for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3. GitLab.com was not affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-project-imports-with-lfs&quot;&gt;SSRF in project imports with LFS&lt;&#x2F;h2&gt;

&lt;p&gt;The project imports feature was vulnerable to an SSRF issue which allowed an attacker to make requests to any local network resource accessible from the GitLab server. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20499&quot;&gt;CVE-2018-20499&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-cicd-settings&quot;&gt;Improper access control CI&#x2F;CD settings&lt;&#x2F;h2&gt;

&lt;p&gt;The CI&#x2F;CD settings contained an issue where the runner registration token could not be reset. This was a security risk if one of the maintainers leaves the group and they know the token. This issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20500&quot;&gt;CVE-2018-20500&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.4 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-authorization-control-merge-requests&quot;&gt;Missing authorization control merge requests&lt;&#x2F;h2&gt;

&lt;p&gt;A project member that has been removed from a private project retains control over the state, assignee, milestones, and labels of a merge request and issue. It is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20501&quot;&gt;CVE-2018-20501&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; from HackerOne for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.12 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-access-control-branches-and-tags&quot;&gt;Improper access control branches and tags&lt;&#x2F;h2&gt;

&lt;p&gt;Guest users were able to view branches and tag names, which is normally forbidden. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20498&quot;&gt;CVE-2018-20498&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bull&quot;&gt;@bull&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.10 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-authentication-for-prometheus-alert-endpoint&quot;&gt;Missing authentication for Prometheus alert endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab Prometheus integration alert endpoint was lacking authentication which could result in falsely generated notification emails. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20507&quot;&gt;CVE-2018-20507&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.6 released with Serverless and Group-level Clusters</title>
<release>11.6</release>
<link href='https://about.gitlab.com/releases/2018/12/22/gitlab-11-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/22/gitlab-11-6-released/</id>
<published>2018-12-22T00:00:00+00:00</published>
<updated>2018-12-22T00:00:00+00:00</updated>
<author>
<name>James Ramsay</name>
</author>
<content type='html'>&lt;h2 class=&quot;intro-header&quot; id=&quot;deploy-serverless-workloads-to-any-cloud-via-gitlab&quot;&gt;Deploy serverless workloads to any cloud via GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;Serverless computing dynamically allocates cloud resources whenever a piece of code is executed, optimizing allocation and distribution of the resources used to run your code. It is growing in popularity with developers because it allows them to focus on what matters most, namely writing code, without worrying about the underlying information technology infrastructure.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;topics&#x2F;serverless&#x2F;&quot;&gt;GitLab Serverless&lt;&#x2F;a&gt; uses Knative, a Kubernetes-based platform, to build, deploy, and manage serverless workloads. This feature provides developers with an easy way to build and manage serverless workloads alongside the rest of their code, in a familiar user interface. For businesses, serverless enables a multi-cloud strategy and prevents being locked into a specific cloud provider.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header-h3&quot; id=&quot;gitlab-continues-to-simplify-development-of-cloud-native-applications&quot;&gt;GitLab continues to simplify development of cloud native applications&lt;&#x2F;h2&gt;

&lt;p&gt;With a built-in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;packages&#x2F;container_registry&#x2F;index.html&quot;&gt;Container Registry&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;clusters&#x2F;index.html&quot;&gt;Kubernetes integration&lt;&#x2F;a&gt;, GitLab makes it easier than ever to get started with containers and cloud native development. With 11.6, users will be able to create &lt;a href=&quot;#kubernetes-clusters-for-groups-beta&quot;&gt;Kubernetes clusters for groups&lt;&#x2F;a&gt; that can be used by all the projects contained within the group or sub-groups. This further simplifies cloud native configuration and allow developers to focus on developing great applications.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header-h3&quot; id=&quot;its-the-holidays-get-excited-weve-stuffed-many-more-features-into-116&quot;&gt;It&#x27;s the holidays! Get excited! We&#x27;ve stuffed many more features into 11.6!&lt;&#x2F;h2&gt;

&lt;p&gt;A few of our favorites include &lt;a href=&quot;#suggested-changes&quot;&gt;Suggested Changes&lt;&#x2F;a&gt;, &lt;a href=&quot;#web-terminal-for-web-ide-beta&quot;&gt;Web Terminal for Web IDE&lt;&#x2F;a&gt;, and the &lt;a href=&quot;#vulnerability-chart-for-group-security-dashboards&quot;&gt;Group Security Dashboard Vulnerability Chart&lt;&#x2F;a&gt;. Team contributions are more easily accepted now that changes suggested (when leaving a comment on a merge request diff) can be accepted with a single click. Also, from the Web IDE, you can now launch a Web Terminal, the first server-side evaluation feature of the popular Web IDE. Building upon &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;security_dashboard&#x2F;&quot;&gt;Group Security Dashboards&lt;&#x2F;a&gt; released last month, the new Vulnerability Chart shows the security team how the number of vulnerabilities is changing day by day to provide resolution metrics.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all of the holiday goodies delivered with GitLab 11.6!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_6&#x2F;11_6-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.5.5, 11.4.12, 11.3.14</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/12/20/critical-security-release-gitlab-11-dot-5-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/20/critical-security-release-gitlab-11-dot-5-dot-5-released/</id>
<published>2018-12-20T00:00:00+00:00</published>
<updated>2018-12-20T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.5.5, 11.4.12, and 11.3.14 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-file-read-in-gitlab-project-import&quot;&gt;Arbitrary File read in Gitlab project import&lt;&#x2F;h2&gt;

&lt;p&gt;The project import feature contained a insecure file permissions issue due to how symlinks are processed which could result in an arbitrary file read. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20229&quot;&gt;CVE-2018-20229&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech and @mishre for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.6RC7, 11.5.4, 11.4.11, 11.3.13</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/12/13/critical-security-release-gitlab-11-dot-5-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/13/critical-security-release-gitlab-11-dot-5-dot-4-released/</id>
<published>2018-12-13T00:00:00+00:00</published>
<updated>2018-12-13T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.5.4, 11.4.11, and 11.3.13 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-file-read-in-gitlab-project-import-with-git-lfs&quot;&gt;Arbitrary File read in GitLab project import with Git LFS&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Git LFS contained a validation issue during project import which could allow an attacker to read arbitrary files on a GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-20144&quot;&gt;CVE-2018-20144&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated: 2018-12-17:&lt;&#x2F;em&gt; We have received some questions regarding 11.6 Release Candidates. While, 11.6-RC7 also includes this security fix, but we do not recommend using RCs as they are not part of stable releases.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.5.3, 11.4.10, 11.3.12</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/12/06/critical-security-release-gitlab-11-dot-5-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/06/critical-security-release-gitlab-11-dot-5-dot-3-released/</id>
<published>2018-12-06T00:00:00+00:00</published>
<updated>2018-12-06T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.5.3, 11.4.10, and 11.3.12 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;directory-traversal-in-templates-api&quot;&gt;Directory Traversal in Templates API&lt;&#x2F;h2&gt;

&lt;p&gt;The templates api was vulnerable to a directory traversal issue which could allow an attacker to read arbitrary files on a GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19856&quot;&gt;CVE-2018-19856&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.5.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/12/04/gitlab-11-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/04/gitlab-11-5-2-released/</id>
<published>2018-12-04T00:00:00+00:00</published>
<updated>2018-12-04T00:00:00+00:00</updated>
<author>
<name>Cindy Pallares</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.5.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;11&#x2F;22&#x2F;gitlab-11-5-released&#x2F;&quot;&gt;this month&#x27;s 11.5.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22916&quot;&gt;Fix impersonation token value not displaying after creation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23112&quot;&gt;Fix emoji not rendering in filter dropdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23195&quot;&gt;Fix the dimensions of image diffs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23306&quot;&gt;Correctly handle data-loss scenarios when encrypting columns&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23244&quot;&gt;Fix stuck tooltip on stop env button&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23279&quot;&gt;Allow commenting to resolved non-diff discussions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23314&quot;&gt;Remove Site Statistic&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23308&quot;&gt;Clear BatchLoader context between Sidekiq jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23321&quot;&gt;Update issue boards images for recent cards redesign&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23247&quot;&gt;New Crowdin translations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8543&quot;&gt;Fill timestamp for Approver bulk insertion&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8509&quot;&gt;Fix issues analytics query&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8466&quot;&gt;Exclude code owner from merge request participants to avoid spam&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8494&quot;&gt;Add additional requirements to Security Dashboard&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8459&quot;&gt;Resolve inability to scroll operations dashboard&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2871&quot;&gt;Make remote-syslog template use correct log directory&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.4.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/12/04/gitlab-11-4-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/12/04/gitlab-11-4-9-released/</id>
<published>2018-12-04T00:00:00+00:00</published>
<updated>2018-12-04T00:00:00+00:00</updated>
<author>
<name>Steve Azzopardi</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.4.9 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;10&#x2F;22&#x2F;gitlab-11-4-released&#x2F;&quot;&gt;last month&#x27;s 11.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22916&quot;&gt;Display impersonation token value after creation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;23306&quot;&gt;Correctly handle data-loss scenarios when encrypting columns&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.5.1, 11.4.8, and 11.3.11</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/</id>
<published>2018-11-28T00:00:00+00:00</published>
<updated>2018-11-28T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.5.1, 11.4.8, and 11.3.11 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-at-issue-notes&quot;&gt;IDOR at issue notes&lt;&#x2F;h2&gt;

&lt;p&gt;The issue comments feature contained an authorization bug which could allow an attacker to comment on a confidential issue which they shouldn&#x27;t be allowed to. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2019-5883&quot;&gt;CVE-2019-5883&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;lucky_sen&quot;&gt;@lucky_sen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 6.0 to 11.5.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;view-names-of-private-groups&quot;&gt;View Names of Private Groups&lt;&#x2F;h2&gt;

&lt;p&gt;The Todos dashboard permitted an unauthorized user to view the names of private groups. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19494&quot;&gt;CVE-2018-19494&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ashish_r_padelkar&quot;&gt;@ashish_r_padelkar&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-environments&quot;&gt;Persistent XSS in Environments&lt;&#x2F;h2&gt;

&lt;p&gt;The Environments page contained a lack of input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19493&quot;&gt;CVE-2018-19493&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;xanbanx&quot;&gt;@xanbanx&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-prometheus-integration&quot;&gt;SSRF in Prometheus integration&lt;&#x2F;h2&gt;

&lt;p&gt;The Prometheus integration was vulnerable to an SSRF issue which allowed an attacker to make requests to any local network resource accessible from the GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19495&quot;&gt;CVE-2018-19495&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bull&quot;&gt;@bull&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-promotion-of-milestones&quot;&gt;Unauthorized Promotion of Milestones&lt;&#x2F;h2&gt;

&lt;p&gt;Milestones were vulnerable to an insecure object reference issue where a user with insufficient privileges could promote a project milestone to a group milestone. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19496&quot;&gt;CVE-2018-19496&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sandeep_hodkasia&quot;&gt;@sandeep_hodkasia&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exposure-of-confidential-issue-title&quot;&gt;Exposure of Confidential Issue Title&lt;&#x2F;h2&gt;

&lt;p&gt;The commits listing page in a project permitted an unauthorized user to view the title of a confidential issue. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19577&quot;&gt;CVE-2018-19577&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persisent-xss-in-markdown-fields-via-mermaid-script&quot;&gt;Persisent XSS in Markdown Fields via Mermaid Script&lt;&#x2F;h2&gt;

&lt;p&gt;Fields that accept Markdown contained incomplete input validation and output encoding when accepting Mermaid script, which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19573&quot;&gt;CVE-2018-19573&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-markdown-fields-via-unrecognized-html-tags&quot;&gt;Persistent XSS in Markdown Fields via Unrecognized HTML Tags&lt;&#x2F;h2&gt;

&lt;p&gt;Fields that accept Markdown contained incomplete input validation and output encoding when accepting unrecognized HTML tags, which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19570&quot;&gt;CVE-2018-19570&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;otr&quot;&gt;@otr&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;symlink-race-condition-in-pages&quot;&gt;Symlink Race Condition in Pages&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages had a symlink race condition that would allow unauthorized access to files in the Pages chroot. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19572&quot;&gt;CVE-2018-19572&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;waldi&quot;&gt;Bastian Blank&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE 8.17 &amp;amp; EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-changes-by-guest-user-in-issues&quot;&gt;Unauthorized Changes by Guest User in Issues&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab issues were vulnerable to an insecure object reference issue that allowed a Guest user to make changes to, or delete their own comments after an issue had been made confidential. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19576&quot;&gt;CVE-2018-19576&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sandeep_hodkasia&quot;&gt;@sandeep_hodkasia&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-comments-on-locked-issues&quot;&gt;Unauthorized Comments on Locked Issues&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab issues were vulnerable to an insecure object reference issue that allowed an unauthorized user to make comments after an issue had been locked. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19575&quot;&gt;CVE-2018-19575&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-enforcement-of-token-scope&quot;&gt;Improper Enforcement of Token Scope&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab web interface was vulnerable to an authorization issue that allowed access to the web-UI as a user using their Personal Access Token (PAT) of any scope. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19569&quot;&gt;CVE-2018-19569&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;With this fix, the use of PATs is limited to the API, the RSS feed, and the registry, which could break any existing automation scripts that don&#x27;t use the API. The impact is expected to be limited.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Jan Alsenz of Oneconsult AG for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated: 2018-11-28:&lt;&#x2F;em&gt; We have received reports that this change has impacted how repo files and job artifacts are downloaded for some users. For instructions on how to do so through the API, please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;54572#note_120859334&quot;&gt;our support issue&lt;&#x2F;a&gt;. Thank you to the users participating in this issue. Your feedback is important to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.8 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;crlf-injection-in-project-mirroring&quot;&gt;CRLF Injection in Project Mirroring&lt;&#x2F;h2&gt;

&lt;p&gt;When using the Git protocol, project mirroring was vulnerable to a CRLF injection vulnerability. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19585&quot;&gt;CVE-2018-19585&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;chromium1337&quot;&gt;@chromium1337&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-12&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.18 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-12&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-oauth-authorization&quot;&gt;XSS in OAuth Authorization&lt;&#x2F;h2&gt;

&lt;p&gt;The OAuth authorization process contained a lack of input validation and output encoding which resulted in an XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19574&quot;&gt;CVE-2018-19574&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-13&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-13&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-webhooks&quot;&gt;SSRF in Webhooks&lt;&#x2F;h2&gt;

&lt;p&gt;Webhooks were vulnerable to an SSRF vulnerability that allowed an attacker to make requests to any local network resource accessible from the GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19571&quot;&gt;CVE-2018-19571&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-14&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.18 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-14&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;send-email-on-email-address-change&quot;&gt;Send Email on Email Address Change&lt;&#x2F;h2&gt;

&lt;p&gt;Previously, GitLab did not send an email to the old email address when an email address change was made. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19580&quot;&gt;CVE-2018-19580&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;muon4&quot;&gt;@muon4&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-15&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-15&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;workhorse-logs-contained-tokens&quot;&gt;Workhorse Logs Contained Tokens&lt;&#x2F;h2&gt;

&lt;p&gt;Workhorse was logging access tokens, which allowed administrators with access to the logs to see the tokens of other users. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19583&quot;&gt;CVE-2018-19583&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-16&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-16&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-publishing-of-draft-comments&quot;&gt;Unauthorized Publishing of Draft Comments&lt;&#x2F;h2&gt;

&lt;p&gt;The discussion drafts endpoint, used in merge requests, contained an insecure object reference vulnerability that permitted an unauthorized user to publish the drafts of another user. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19582&quot;&gt;CVE-2018-19582&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;lucky_sen&quot;&gt;@lucky_sen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-17&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-17&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-can-set-weight-of-a-new-issue&quot;&gt;Guest Can Set Weight of a New Issue&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab issues were vulnerable to an insecure object reference issue that allowed a Guest user to set the weight of an issue they created. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19581&quot;&gt;CVE-2018-19581&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-18&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-18&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;disclosure-of-private-groups-members-and-milestones&quot;&gt;Disclosure of Private Group&#x27;s Members and Milestones&lt;&#x2F;h2&gt;

&lt;p&gt;An insecure direct object reference vulnerability in issue boards allowed authenticated, but unauthorized users to view members and milestone details of private groups. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19584&quot;&gt;CVE-2018-19584&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-19&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-19&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persisent-xss-in-operations&quot;&gt;Persisent XSS in Operations&lt;&#x2F;h2&gt;

&lt;p&gt;The Operations page contained a lack of input validation and output encoding which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19579&quot;&gt;CVE-2018-19579&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-20&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.5.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-20&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reporter-can-view-operations-page&quot;&gt;Reporter Can View Operations Page&lt;&#x2F;h2&gt;

&lt;p&gt;Due to incomplete permissions validation, a user with Reporter privileges was permitted to view the Jaeger Tracing Operations page. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19578&quot;&gt;CVE-2018-19578&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;indoappsec?type=user&quot;&gt;@vijay_kumar1110&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-21&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.5.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-21&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-to-redis-3212&quot;&gt;Upgrade to Redis 3.2.12&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Redis used in the Omnibus package was upgraded in the GitLab 11.3 release. This upgrade was previously included in GitLab 11.4 and 11.5 Omnibus packages, and includes several security fixes.
The upgrade to Redis was incorrectly reported in the &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;10&#x2F;29&#x2F;security-release-gitlab-11-dot-4-dot-3-released&#x2F;&quot;&gt;October security release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.5 released with Group Security and Operations Dashboards, and Access Control for Pages</title>
<release>11.5</release>
<link href='https://about.gitlab.com/releases/2018/11/22/gitlab-11-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/11/22/gitlab-11-5-released/</id>
<published>2018-11-22T00:00:00+00:00</published>
<updated>2018-11-22T00:00:00+00:00</updated>
<author>
<name>Fabio Busatto</name>
</author>
<content type='html'>&lt;h2 class=&quot;intro-header&quot; id=&quot;group-dashboard-for-security-teams&quot;&gt;Group dashboard for security teams&lt;&#x2F;h2&gt;

&lt;p&gt;For a long time, developers have used GitLab as a tool to secure their code. But now,
GitLab is making security teams first-class citizens so they can use GitLab to effect better application security and ensure compliance. With 11.5, the
&lt;a href=&quot;#group-security-dashboard&quot;&gt;Group Security Dashboard&lt;&#x2F;a&gt; pulls together all of the information security personnel need into one place, so folks like CISOs,
CIOs, and application security leaders get a specific view designed for them.
The group dashboard has a redesigned look and new visualizations, bringing together
security information across multiple projects and providing a high-level view while
also enabling the ability to drill down into specific reports. With 11.5, we&#x27;re
starting with SAST reports, and we&#x27;ll be adding more to the group dashboard in
the future. Our goal is to build a single tool that security teams can use
instead of needing to switch back and forth between multiple tools.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;new-dashboard-for-operations-teams&quot;&gt;New dashboard for operations teams&lt;&#x2F;h2&gt;

&lt;p&gt;In the same way that the Group Security Dashboard makes security teams first-class citizens, the &lt;a href=&quot;#operations-dashboard&quot;&gt;Operations Dashboard&lt;&#x2F;a&gt; provides a
tailored experience for operations professionals. This instance-wide dashboard
provides a single view across projects to get a summary of each project’s
operational health, including pipeline and alert status.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;control-access-to-gitlab-pages&quot;&gt;Control access to GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;pages&#x2F;&quot;&gt;GitLab Pages&lt;&#x2F;a&gt; is an easy way to
serve static content on the web, making it perfect for use cases such as
documentation for your project. But what about private projects where
documentation and other static artifacts should only be accessed by project
members? In the past, you&#x27;d either have to make your assets public to take
advantage of Pages, or you would not be able to use the feature at all.&lt;&#x2F;p&gt;

&lt;p&gt;Now, in GitLab 11.5, the same access control permissions that apply to your
issues and code can also be applied to static webpages served by GitLab Pages.
Unauthenticated users will get a 404 when visiting the link. As of today,
&lt;a href=&quot;#access-control-for-pages&quot;&gt;access controls for GitLab pages&lt;&#x2F;a&gt; is available for self-managed GitLab,
with GitLab.com support coming soon.&lt;&#x2F;p&gt;

&lt;p&gt;This is a unique feature that we&#x27;re particularly proud of because it comes
from our open source community. Access control for Pages has been one of our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;33422&quot;&gt;most requested features&lt;&#x2F;a&gt;
and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-pages&#x2F;merge_requests&#x2F;94&quot;&gt;the code has been community contributed&lt;&#x2F;a&gt; as well!&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;knative-for-kubernetes&quot;&gt;Knative for Kubernetes&lt;&#x2F;h2&gt;

&lt;p&gt;“Serverless” is a popular, yet often misunderstood industry term. Some folks equate
serverless with &quot;Function as a Service,&quot; or FaaS, but this &lt;a href=&quot;https:&#x2F;&#x2F;martinfowler.com&#x2F;articles&#x2F;serverless.html&quot;&gt;isn&#x27;t quite accurate&lt;&#x2F;a&gt;. In a nutshell, serverless enables a programming paradigm where you are able
to focus on writing business logic without having to understand or even
worry about the underlying infrastructure where your software is deployed.
As such, both functions and applications can be serverless.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;cloud.google.com&#x2F;knative&#x2F;&quot;&gt;Knative&lt;&#x2F;a&gt; is a Kubernetes-based platform
to build, deploy, and manage modern serverless workloads, and GitLab 11.5
comes with the ability to &lt;a href=&quot;#easily-deploy-and-integrate-knative-with-gitlab&quot;&gt;easily deploy and integrate Knative with GitLab&lt;&#x2F;a&gt;. You can now install Knative to your &lt;a href=&quot;&#x2F;solutions&#x2F;kubernetes&#x2F;&quot;&gt;connected Kubernetes cluster&lt;&#x2F;a&gt; with a single click. With GitLab 11.5, you&#x27;ll be able to use Knative for your serverless applications, with
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;43959&quot;&gt;serverless functions coming in 11.6&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Today, Knative is still in alpha, but there are some compelling reasons to deploy applications using Knative as it comes with some powerful functionality out-of-the-box. In particular, Knative manages pod scaling for you so you can automatically scale up, or even scale down to zero without additional configuration. Additionally, Knative comes with eventing built in so using it to deploy microservices makes it easier to manage inter-process communication between your producer and consumer services.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;and-so-much-more&quot;&gt;And so much more!&lt;&#x2F;h2&gt;

&lt;p&gt;With so many great features in this release, we couldn&#x27;t pack them all into
the intro. Be sure to read up on other exciting new features like
&lt;a href=&quot;#parallel-attribute-for-faster-pipelines&quot;&gt;the parallel attribute for faster pipelines&lt;&#x2F;a&gt;,
&lt;a href=&quot;#issue-board-cards-redesigned&quot;&gt;redesigned Issue Board cards&lt;&#x2F;a&gt;, and an initial
&lt;a href=&quot;#open-jaeger-from-gitlab&quot;&gt;Jaeger integration&lt;&#x2F;a&gt;.
We’ve made big improvements in this release to make code review easier and more useful, including the ability to
&lt;a href=&quot;#comment-on-unchanged-lines-in-merge-request&quot;&gt;comment on unchanged lines in merge requests&lt;&#x2F;a&gt;,
&lt;a href=&quot;#preview-merge-request-review-before-submitting-it&quot;&gt;preview merge request reviews before submitting&lt;&#x2F;a&gt;, and
&lt;a href=&quot;#assign-approvers-based-on-code-owners&quot;&gt;assign approvers based on Code Owners&lt;&#x2F;a&gt; along with
&lt;a href=&quot;#review-app-direct-link&quot;&gt;Review App direct links&lt;&#x2F;a&gt;.
Keep reading to see all of the features that are part of this release.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_5&#x2F;11_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.4.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/11/21/gitlab-11-4-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/11/21/gitlab-11-4-7-released/</id>
<published>2018-11-21T00:00:00+00:00</published>
<updated>2018-11-21T00:00:00+00:00</updated>
<author>
<name>Jan Provaznik</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.4.7 for GitLab Community Edition and
Enterprise Edition. This release only contains a fix for GitLab Enterprise
Edition, GitLab Community Edition has no changes compared to 11.4.6.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8248&quot;&gt;Fix code owner suggestion missing in GitLab Starter&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.5.0-rc12, 11.4.6, 11.3.10</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/</id>
<published>2018-11-19T00:00:00+00:00</published>
<updated>2018-11-19T00:00:00+00:00</updated>
<author>
<name>Ethan Strike</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.5.0-rc12, 11.4.6, and 11.3.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-autocompletion&quot;&gt;Persistent XSS Autocompletion&lt;&#x2F;h2&gt;

&lt;p&gt;An attribute used in autocompletion contained an input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18643&quot;&gt;CVE-2018-18643&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-service-template-creation&quot;&gt;Unauthorized service template creation&lt;&#x2F;h2&gt;

&lt;p&gt;The project import feature contained an input validation issue that resulted in the ability for an unauthorized user to create service templates. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-19359&quot;&gt;CVE-2018-19359&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE 8.9 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated: 2018-11-20:&lt;&#x2F;em&gt; We have received some questions regarding the XSS vulnerability in this release and a similar vulnerability reported in October. The fix in this release does correct an incomplete patch in the &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;10&#x2F;29&#x2F;security-release-gitlab-11-dot-4-dot-3-released&#x2F;&quot;&gt;October security release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.4.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/11/05/gitlab-11-4-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/11/05/gitlab-11-4-5-released/</id>
<published>2018-11-05T00:00:00+00:00</published>
<updated>2018-11-05T00:00:00+00:00</updated>
<author>
<name>Jan Provaznik</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.4.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;10&#x2F;22&#x2F;gitlab-11-4-released&#x2F;&quot;&gt;this month&#x27;s 11.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22487&quot;&gt;Fix merge request tree toggle not respecting the users fluid width preference&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22545&quot;&gt;Fix the link to enable usage ping&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22537&quot;&gt;Fix duplicate escape in job sidebar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22493&quot;&gt;Fix missing messages for stuck runner&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22615&quot;&gt;Fix stage dropdown rendering only in English&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22720&quot;&gt;Update gitlab-ui dependency to 1.8.0-hotfix.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;7990&quot;&gt;Add indexes to all geo event foreign keys&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;8007&quot;&gt;Stop batch comment actions showing on commit discussions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.4.4, 11.3.9, 11.2.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/11/01/critical-security-release-gitlab-11-dot-4-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/11/01/critical-security-release-gitlab-11-dot-4-dot-4-released/</id>
<published>2018-11-01T00:00:00+00:00</published>
<updated>2018-11-01T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.4.4, 11.3.9, and 11.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-kubernetes-integration&quot;&gt;SSRF in Kubernetes integration&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab Kubernetes integration was vulnerable to a SSRF issue which could allow an attacker to make requests to access any internal URLs. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18843&quot;&gt;CVE-2018-18843&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.4.3, 11.3.8, and 11.2.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/</id>
<published>2018-10-29T00:00:00+00:00</published>
<updated>2018-10-29T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.4.3, 11.3.8, and 11.2.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;rce-in-gitlab-wiki-api&quot;&gt;RCE in Gitlab Wiki API&lt;&#x2F;h2&gt;

&lt;p&gt;The wiki API contained an input validation issue which resulted in remote code execution. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18649&quot;&gt;CVE-2018-18649&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-hipchat-integration&quot;&gt;SSRF in Hipchat integration&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab Hipchat integration was vulnerable to a SSRF issue which allowed an attacker to make requests to any local network resource accessible from the GitLab server. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18646&quot;&gt;CVE-2018-18646&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;bull&quot;&gt;@bull&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 5.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cleartext-storage-of-personal-access-tokens&quot;&gt;Cleartext storage of personal access tokens&lt;&#x2F;h2&gt;

&lt;p&gt;Personal access tokens were being stored unencrypted as plain text in the database which could result in attackers potentially reading them via SQL injection or other database leaks. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18641&quot;&gt;CVE-2018-18641&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.10.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-exposure-through-stack-trace-error-message&quot;&gt;Information exposure through stack trace error message&lt;&#x2F;h2&gt;

&lt;p&gt;A JSON endpoint was disclosing Gem version information which could result in an attacker discovering vulnerable Gems available on a specific GitLab instance. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18648&quot;&gt;CVE-2018-18648&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-autocomplete&quot;&gt;Persistent XSS autocomplete&lt;&#x2F;h2&gt;

&lt;p&gt;The fragment identifier (hash) of several pages in GitLab contained a lack of input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18643&quot;&gt;CVE-2018-18643&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-exposure-in-stored-browser-history&quot;&gt;Information exposure in stored browser history&lt;&#x2F;h2&gt;

&lt;p&gt;Private project pages had inadequate cache control, which resulted in unauthorized users being able to view them in the browser. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18640&quot;&gt;CVE-2018-18640&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;8ayac&quot;&gt;@8ayac&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-exposure-when-replying-to-issues-through-email&quot;&gt;Information exposure when replying to issues through email&lt;&#x2F;h2&gt;

&lt;p&gt;It was found that when replying to an issue through email, with the GitLab email footer included, a user&#x27;s unsubscribe link would be included in the issue. This information is considered sensitive. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18645&quot;&gt;CVE-2018-18645&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;underyx&quot;&gt;Bence Nagy&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects all versions of GitLab CE&#x2F;EE&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-license-management-and-security-reports&quot;&gt;Persistent XSS in License Management and Security Reports&lt;&#x2F;h2&gt;

&lt;p&gt;The license management and security reports pages contained a lack of input validation and output encoding which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18642&quot;&gt;CVE-2018-18642&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Security Reports - Affects GitLab EE 10.4.0 and later
License Management - Affects GitLab EE 11.0.0 and later&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;metrics-information-disclosure-in-prometheus-integration&quot;&gt;Metrics information disclosure in Prometheus integration&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab Prometheus integration was vulnerable to an indirect object reference issue which allowed an unauthorized user to see private information. This information includes the project name, environment name, metric name, and metric query. Additionally, an unauthorized user could create false alarms. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18644&quot;&gt;CVE-2018-18644&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 11.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-changes-to-a-protected-branchs-access-levels&quot;&gt;Unauthorized changes to a protected branch&#x27;s access levels&lt;&#x2F;h2&gt;

&lt;p&gt;The protected_branches api was vulnerable to an issue which allowed an unauthorized user to remove the &lt;code&gt;merge_access_levels&lt;&#x2F;code&gt; and &lt;code&gt;push_access_levels&lt;&#x2F;code&gt; objects. This could result in the inability of project participants to push or merge into the branch. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-18647&quot;&gt;CVE-2018-18647&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-ruby-to-245&quot;&gt;Upgrade Ruby to 2.4.5&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Ruby used in the Omnibus package was upgraded to version 2.4.5. Included in this Ruby release are several security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-redis-to-3212&quot;&gt;Upgrade Redis to 3.2.12&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Redis used in the Omnibus package was upgraded in the GitLab 11.2 and 11.3 releases. This upgrade was previously included in GitLab 11.4 Omnibus package. Included in this Redis release are several security fixes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.4 released with Merge Request Reviews and Feature Flags</title>
<release>11.4</release>
<link href='https://about.gitlab.com/releases/2018/10/22/gitlab-11-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/22/gitlab-11-4-released/</id>
<published>2018-10-22T00:00:00+00:00</published>
<updated>2018-10-22T00:00:00+00:00</updated>
<author>
<name>James Ramsay</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;re excited to announce the release of GitLab 11.4 with incredible updates to help teams
work together more efficiently. Most teams adopting DevOps are focused on shortening
cycle time, so improvements that reduce waste and extra work are welcome contributions toward
faster delivery and better business results.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 11.4 we&#x27;re making code reviews more efficient with
&lt;a href=&quot;#merge-request-reviews&quot;&gt;Merge Request Reviews&lt;&#x2F;a&gt; and a &lt;a href=&quot;#file-tree-for-browsing-merge-request-diff&quot;&gt;file tree for diffs&lt;&#x2F;a&gt;.
We are introducing &lt;a href=&quot;#create-and-toggle-feature-flags-for-your-applications-alpha&quot;&gt;Feature Flags&lt;&#x2F;a&gt; in alpha.
Auto DevOps and CI is more powerful with &lt;a href=&quot;#support-postgresql-db-migration-and-initialization-for-auto-devops&quot;&gt;PostgreSQL migrations&lt;&#x2F;a&gt; and &lt;a href=&quot;#add-timed-incremental-rollouts-to-auto-devops&quot;&gt;timed incremental rollout&lt;&#x2F;a&gt;.
Even Git is faster with support for &lt;a href=&quot;#git-protocol-v2&quot;&gt;Git protocol v2&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;code-review&quot;&gt;Code review&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;#merge-request-reviews&quot;&gt;Merge Request Reviews&lt;&#x2F;a&gt; will reduce the noise from comments on code and merge requests.
Batch Comments lets a reviewer enter multiple comments on the code or merge request and 
then finalize them in one batch. Now, the people subscribed to the project can more 
efficiently keep track of changes.&lt;&#x2F;p&gt;

&lt;p&gt;Having the right people review and approve code changes is a key step to delivering high-quality code.
Building on Code Owners from the &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;09&#x2F;22&#x2F;gitlab-11-3-released&#x2F;&quot;&gt;11.3 release&lt;&#x2F;a&gt;,
GitLab can now suggest who should review and approve a specific merge request based on the
&lt;code&gt;CODEOWNERS&lt;&#x2F;code&gt; file. This way, you can quickly and efficiently get changes reviewed and approved.
This will also be useful when defining separation of duties and roles on a team, where you want to
have defined reviewers for certain parts of the code.&lt;&#x2F;p&gt;

&lt;p&gt;The addition of the file tree view to the merge request makes it easier and faster for reviewers to
navigate through multiple changed files and then provide their feedback.&lt;&#x2F;p&gt;

&lt;p&gt;Russell Levy, co-founder and CTO of &lt;a href=&quot;http:&#x2F;&#x2F;www.chorus.ai&quot;&gt;Chorus.ai&lt;&#x2F;a&gt;, explains how the reviews and file-tree
view features are helping their team:&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;em&gt;We&#x27;re pretty thorough in code reviews and there are generally 10-20 comments on
a medium-sized merge request, plus a few rounds of conversations based on it. Using
the review feature reduces the noise and interruptions during the review process.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;em&gt;For larger merge requests, the new file tree and diffs feature makes reviews that
much faster, as it makes it easy to jump around the code to understand dependencies.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;feature-flags&quot;&gt;Feature flags&lt;&#x2F;h2&gt;

&lt;p&gt;We are introducing an Alpha version of &lt;a href=&quot;#create-and-toggle-feature-flags-for-your-applications-alpha&quot;&gt;Feature Flags&lt;&#x2F;a&gt;, a feature toggle system. Teams can
now practice Continuous Delivery by deploying new features to production in small batches,
mitigating risk before a full rollout.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;auto-devops-and-cicd&quot;&gt;Auto DevOps and CI&#x2F;CD&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;re also updating the ability for all users to take advantage of having
&lt;a href=&quot;#move-ability-to-use-includes-in-codegitlab-ciymlcode-from-starter-to-core&quot;&gt;Include files in their &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; files&lt;&#x2F;a&gt;, moving it from Starter to Core. This will make it easier
for all teams to leverage this best practice and more efficiently manage their CI&#x2F;CD pipelines.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;extra-polish&quot;&gt;Extra polish&lt;&#x2F;h2&gt;

&lt;p&gt;Together with the wider GitLab community, there are many more wonderful improvements
we have included in this release including a new profile layout, faster access to
your profile status, highlighted &lt;code&gt;@mentions&lt;&#x2F;code&gt;, new quick actions, and the ability
to close epics.&lt;&#x2F;p&gt;

&lt;p&gt;Read on to learn more about all the great features in GitLab 11.4.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_4&#x2F;11_4-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/17/gitlab-11-3-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/17/gitlab-11-3-6-released/</id>
<published>2018-10-17T00:00:00+00:00</published>
<updated>2018-10-17T00:00:00+00:00</updated>
<author>
<name>Bob Van Landuyt</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.3.6 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;09&#x2F;22&#x2F;gitlab-11-3-released&#x2F;&quot;&gt;this month&#x27;s 11.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-enterprise-edition&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;7944&quot;&gt;Fix issue where the default branch is being reset when repository mirroring is enabled&lt;&#x2F;a&gt;. This regression was never introduced in Core.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;patch_versions.html&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.3.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/15/gitlab-11-3-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/15/gitlab-11-3-5-released/</id>
<published>2018-10-15T00:00:00+00:00</published>
<updated>2018-10-15T00:00:00+00:00</updated>
<author>
<name>Bob Van Landuyt</name>
</author>
<content type='html'>&lt;p&gt;Today, we are releasing version 11.3.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;09&#x2F;22&#x2F;gitlab-11-3-released&#x2F;&quot;&gt;this month&#x27;s 11.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21982&quot;&gt;Fix issue when loading discussions on some merge requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;22276&quot;&gt;Fix deleting projects when an export is available&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;7809&quot;&gt;Fix for incorrect milestone dates after changing the milestone on issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;patch_versions.html&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.3.4, 11.2.5, and 11.1.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/05/critical-security-release-11-3-4/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/05/critical-security-release-11-3-4/</id>
<published>2018-10-05T00:00:00+00:00</published>
<updated>2018-10-05T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.3.4, 11.2.5, and 11.1.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-updates&quot;&gt;Git updates&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve included updated Git security versions 2.18.1 and 2.17.2 in this latest release for 11.3.4, 11.2.5, and 11.1.8.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see the Git &lt;a href=&quot;https:&#x2F;&#x2F;public-inbox.org&#x2F;git&#x2F;xmqqy3bcuy3l.fsf@gitster-ct.c.googlers.com&#x2F;T&#x2F;#u&quot;&gt;release notes&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-information-disclosure&quot;&gt;Merge request information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request JSON endpoint was inadvertently disclosing all &lt;code&gt;User&lt;&#x2F;code&gt; record data of a person associated with the discussion. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17939&quot;&gt;CVE-2018-17939&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.3, 11.2, and 11.1.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-namespace-information-disclosure&quot;&gt;Private project namespace information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The epic feature is leaking private project namespaces if someone adds a related issue to the epic. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17976&quot;&gt;CVE-2018-17976&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 - 11.3.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-flavored-markdown-api-information-disclosure&quot;&gt;Gitlab Flavored Markdown API information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The GFM API is missing an authorization control which results in leaking confidential issue titles and private snippet titles. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17975&quot;&gt;CVE-2018-17975&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE 11.0 - 11.3.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.3.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/04/gitlab-11-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/04/gitlab-11-3-3-released/</id>
<published>2018-10-04T00:00:00+00:00</published>
<updated>2018-10-04T00:00:00+00:00</updated>
<author>
<name>Bob Van Landuyt</name>
</author>
<content type='html'>&lt;!-- For detailed instructions on how to complete this, please see https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;release&#x2F;docs&#x2F;blob&#x2F;master&#x2F;general&#x2F;patch&#x2F;blog-post.md --&gt;

&lt;p&gt;Today we are releasing version 11.3.3 for GitLab Community Edition and
Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;09&#x2F;22&#x2F;gitlab-11-3-released&#x2F;&quot;&gt;this month&#x27;s 11.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve skipped releasing 11.3.2, because we found a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;52171&quot;&gt;blocking
regression&lt;&#x2F;a&gt; when
incorrectly picking a change. This has been reverted in 11.3.3.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21727&quot;&gt;Fix link to file in the merge request changes tab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21801&quot;&gt;Fix hidden truncated diff lines not showing when expanded&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21985&quot;&gt;Fix Error 500 when forking projects with Gravatar disabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21875&quot;&gt;Fix importing a project that was just exported&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21770&quot;&gt;Fix auto populating project name when creating project via import URL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;7454&quot;&gt;Fix resetting default branch to master for push mirrors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;7474&quot;&gt;Geo: Fix failing repository verification for multiple shards&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;patch_versions.html&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.3.1, 11.2.4, and 11.1.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/</id>
<published>2018-10-01T00:00:00+00:00</published>
<updated>2018-10-01T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;blockquote&gt;
  &lt;p&gt;Note: 11.1.7 is still vulnerable to these issues because of a mistake tagging the release. Please upgrade to &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;10&#x2F;05&#x2F;critical-security-release-11-3-4&#x2F;&quot;&gt;11.1.8&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;Today we are releasing versions 11.3.1, 11.2.4, and 11.1.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-gcp-access-token-disclosure&quot;&gt;SSRF GCP access token disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab Kubernetes integration was vulnerable to a SSRF issue which allowed for access to any URL accessible from the GitLab server. For example, for users which run GitLab on GCP, an attacker with access to use the GitLab instance would have been able to determine the GCP service token for the GitLab host. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17450&quot;&gt;CVE-2018-17450&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.2 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-on-issue-details&quot;&gt;Persistent XSS on issue details&lt;&#x2F;h2&gt;

&lt;p&gt;The issue details page contained a lack of input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17454&quot;&gt;CVE-2018-17454&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;8ayac&quot;&gt;@8ayac&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;diff-formatter-dos-in-sidekiq-jobs&quot;&gt;Diff formatter DoS in Sidekiq jobs&lt;&#x2F;h2&gt;

&lt;p&gt;The diff formatter using &lt;code&gt;rouge&lt;&#x2F;code&gt; lacks timeout in Sidekiq jobs which can result in a denial of service. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-15472&quot;&gt;CVE-2018-15472&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;waldi&quot;&gt;Bastian Blank&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-information-disclosure-in-events-api-endpoint&quot;&gt;Confidential information disclosure in events API endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;The events API contained insecure direct object reference issue which resulted in disclosure of confidential issues, comments, and titles of public projects. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17449&quot;&gt;CVE-2018-17449&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.3 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;validate_localhost-function-in-url_blockerrb-could-be-bypassed&quot;&gt;&lt;code&gt;validate_localhost&lt;&#x2F;code&gt; function in &lt;code&gt;url_blocker.rb&lt;&#x2F;code&gt; could be bypassed&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;code&gt;validate_localhost&lt;&#x2F;code&gt; function was missing a check for loopback addresses which could result in SSRF issues. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17452&quot;&gt;CVE-2018-17452&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;math1as&quot;&gt;@math1as&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.3 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;slack-integration-csrf-oauth2&quot;&gt;Slack integration CSRF Oauth2&lt;&#x2F;h2&gt;

&lt;p&gt;The Slack integration contained a CSRF issue which could allow an attacker to issue slash commands on behalf of the victim. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17451&quot;&gt;CVE-2018-17451&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&quot;&gt;@ngalog&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;grpcunknown-logging-token-disclosure&quot;&gt;&lt;code&gt;GRPC::Unknown&lt;&#x2F;code&gt; logging token disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;code&gt;GRPC::Unknown&lt;&#x2F;code&gt; exception was disclosing access tokens in Sentry logs. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17453&quot;&gt;CVE-2018-17453&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;idor-merge-request-approvals&quot;&gt;IDOR merge request approvals&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request approvals component contained an insecure direct object reference vulnerability which resulted in disclosure of private group names, avatars, LDAP settings, and descriptions. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17455&quot;&gt;CVE-2018-17455&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;@jobert&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.13 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-packagejson&quot;&gt;Persistent XSS &lt;code&gt;package.json&lt;&#x2F;code&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;When a &lt;code&gt;package.json&lt;&#x2F;code&gt; file is present, the blog-viewer will display a notice when browsing the repository which lacks input validation and output encoding which can result in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17537&quot;&gt;CVE-2018-17537&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-merge-request-project-import&quot;&gt;Persistent XSS merge request project import&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request page contained a lack of input validation and output encoding issue which resulted in a persistent XSS. The issue is now mitigated in the latest release and is assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-17536&quot;&gt;CVE-2018-17536&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;isra17&quot;&gt;@isra17&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.4 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Exposure of Confidential Issues on Public Projects through the Events API </title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/10/01/events-api-security-issue/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/10/01/events-api-security-issue/</id>
<published>2018-10-01T00:00:00+00:00</published>
<updated>2018-10-01T00:00:00+00:00</updated>
<author>
<name>Kathy Wang</name>
</author>
<content type='html'>&lt;h2 id=&quot;summary&quot;&gt;Summary&lt;&#x2F;h2&gt;

&lt;p&gt;On September 20, 2018, we were notified by HackerOne hacker &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&#x2F;&quot;&gt;ngalog&lt;&#x2F;a&gt; of a bug in GitLab Events API code that resulted in exposure of confidential issues within all public projects.&lt;&#x2F;p&gt;

&lt;p&gt;Upon further validation and investigation, we discovered that this exposure dates back to June 22, 2017, with the 9.3 release. GitLab’s Events API was returning private events related to projects that were marked as public during that time frame. These events included information that was marked as private, such as confidential issues and private merge requests, among others. The issue was present in all versions of GitLab between 9.3 and 11.3, and across all deployments, including GitLab.com.&lt;&#x2F;p&gt;

&lt;p&gt;The exposure of these private events was present only through the API, whereas the UI behaved as-intended and filtered these events.&lt;&#x2F;p&gt;

&lt;p&gt;All projects that were marked as public are affected by this exposure. This issue has already been mitigated for all GitLab.com customers. Projects marked as private were not impacted by this issue.&lt;&#x2F;p&gt;

&lt;p&gt;We investigated four months of retained GitLab.com logs, and found no evidence that unauthorized parties accessed any of your private events.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;background&quot;&gt;Background&lt;&#x2F;h2&gt;

&lt;p&gt;The Events API was introduced with the release of GitLab 9.3, and it enabled users to programmatically access the activity log of projects and users. The adoption of this API has not been very wide, topping an average of 180 requests per hour.&lt;&#x2F;p&gt;

&lt;p&gt;Unfortunately, a bug was introduced at release time and the API would not honor the private flag of events related to numerous target types that belonged to public projects. As a result, events for said target types were exposed to potentially unauthenticated and unauthorized parties.&lt;&#x2F;p&gt;

&lt;p&gt;As documented in our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;events.html#target-types&quot;&gt;Events API documentation&lt;&#x2F;a&gt;, existing target types for the Events API are:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Issue&lt;&#x2F;li&gt;
  &lt;li&gt;Milestone&lt;&#x2F;li&gt;
  &lt;li&gt;Merge_request&lt;&#x2F;li&gt;
  &lt;li&gt;Note&lt;&#x2F;li&gt;
  &lt;li&gt;Snippet&lt;&#x2F;li&gt;
  &lt;li&gt;Project&lt;&#x2F;li&gt;
  &lt;li&gt;User&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;For projects that were marked as public, events belonging to private versions of all these target types were mistakenly returned by the  &#x2F;api&#x2F;v4&#x2F;users&#x2F;:id&#x2F;events and &#x2F;api&#x2F;v4&#x2F;projects&#x2F;:id&#x2F;events API endpoints. What this means is that the following parts of a public project were exposed:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Confidential issues&lt;&#x2F;li&gt;
  &lt;li&gt;Private milestones&lt;&#x2F;li&gt;
  &lt;li&gt;Private merge requests&lt;&#x2F;li&gt;
  &lt;li&gt;Private notes&lt;&#x2F;li&gt;
  &lt;li&gt;Private snippets&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;response-and-mitigation&quot;&gt;Response and mitigation&lt;&#x2F;h2&gt;

&lt;p&gt;On September 20, 2018, we learned of the issue from HackerOne security researcher &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ngalog&#x2F;&quot;&gt;ngalog&lt;&#x2F;a&gt;, who is part of our bounty program, and with whom we have a track record of great engagements. Upon assessing the issue, the GitLab Security Team started working with the Create team to mitigate the issue. Besides working on the fix, the Create team also produced a hotfix, which the Production team deployed for GitLab.com on September 21, 2018. By September 24, 2018, the Production team confirmed that the hotfix was successfully deployed across all affected GitLab.com infrastructure.&lt;&#x2F;p&gt;

&lt;p&gt;The discovery of this issue aligned with the release of our planned Security Release on October 1, 2018. In order to avoid any mishaps with its implementation, we decided proceed with the release as originally planned.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;who-was-impacted&quot;&gt;Who was impacted?&lt;&#x2F;h2&gt;

&lt;p&gt;Given the wide time window during which the issue was present (more than a year), we are unable to determine with accuracy the extent of the impact. While we don’t have any indication that the issue was ever misused, we are also unable to say with any certainty that it hasn’t been.&lt;&#x2F;p&gt;

&lt;p&gt;We investigated four months of retained GitLab.com logs, and found no evidence that unauthorized parties accessed any of your private events.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improvements&quot;&gt;Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;Since the discovery of the issue, a cross-functional effort has been executed at GitLab in order to identify and improve on safeguards that could have helped us identify this issue sooner, respond more quickly, and ensure the reliability of our patched systems. As such, we are working on numerous improvements to our internal processes and practices. This includes the following highlights:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Our QA process will improve its focus on &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;www-gitlab-com&#x2F;merge_requests&#x2F;14935&#x2F;&quot;&gt;tests related to confidential data&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;Our Engineering team will &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;security&#x2F;issues&#x2F;211&quot;&gt;create a canary system to alarm on unexpected responses and regressions&lt;&#x2F;a&gt; to security issues within GitLab APIs, and our Security team will monitor this canary system in order to triage and mitigate any discovered security issues.&lt;&#x2F;li&gt;
  &lt;li&gt;Our Production and Release teams will &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;infrastructure&#x2F;issues&#x2F;5116&quot;&gt;define guardrails around deployments time windows&lt;&#x2F;a&gt;, taking in consideration several factors that might impact our ability to respond promptly to issues that arise during deployments.&lt;&#x2F;li&gt;
  &lt;li&gt;Our Production and Release teams will &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;gitlab-patcher&#x2F;issues&#x2F;13&quot;&gt;improve&lt;&#x2F;a&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;gitlab-patcher&#x2F;issues&#x2F;14&quot;&gt;our&lt;&#x2F;a&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;gitlab-patcher&#x2F;issues&#x2F;15&quot;&gt;existing&lt;&#x2F;a&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gl-infra&#x2F;gitlab-patcher&#x2F;issues&#x2F;16&quot;&gt;tooling&lt;&#x2F;a&gt; to address issues that were identified while mitigating this event.&lt;&#x2F;li&gt;
  &lt;li&gt;Several additional improvements that we cannot publicly disclose at this time in order to retain advantage over possible adversaries.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We apologize for the impact this issue has caused our users. GitLab takes your information and your data extremely seriously and have more than quadrupled the size our internal security team in the last six months, with further plans to grow. We will learn from this incident and use it to improve upon our security posture even further.&lt;&#x2F;p&gt;

&lt;p&gt;In keeping with our company value of transparency we also believe in communicating about such incidents clearly and promptly. If you have any questions, please contact us via &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Sincerely,
GitLab Security Team&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated: 2018-10-11&lt;&#x2F;em&gt;: While generating the list of project owners and
maintainers, further analysis showed limited impact to private projects. For
private projects, the impact is limited to those with &lt;code&gt;Guest&lt;&#x2F;code&gt; users. Users
with only &lt;code&gt;Guest&lt;&#x2F;code&gt; permissions would have potentially been able to view
details for the confidential and private items as described. The owners and
maintainers of affected projects were notified, but this note was not
included in the email or the original version of this blog post.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.3 released with Maven Repository and Protected Environments</title>
<release>11.3</release>
<link href='https://about.gitlab.com/releases/2018/09/22/gitlab-11-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/09/22/gitlab-11-3-released/</id>
<published>2018-09-22T00:00:00+00:00</published>
<updated>2018-09-22T00:00:00+00:00</updated>
<author>
<name>Daniel Gruesso</name>
</author>
<content type='html'>&lt;p&gt;With our shipment today of GitLab 11.3, we are excited to announce
support for Maven repositories, Code Owners, Protected Environments, and epic forecasting. These features help
automate controls around environments and code while providing further efficiencies for
Java developers.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;maven-repository&quot;&gt;Maven Repository&lt;&#x2F;h2&gt;

&lt;p&gt;We have expanded our support for Java projects and developers by
building &lt;a href=&quot;#maven-repository&quot;&gt;Maven&lt;&#x2F;a&gt; repositories directly into GitLab.
This provides Java developers with a secure, standardized way to share
version control in Maven libraries and save time by reusing
these libraries across projects. This feature is available with GitLab Premium.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;code-owners-and-protected-environments&quot;&gt;Code Owners and Protected Environments&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Starter now supports the assignment of &lt;a href=&quot;#code-owners&quot;&gt;Code Owners&lt;&#x2F;a&gt; to files
to indicate the appropriate team members responsible for the code. This feature prepares us for futures releases that will enforce
internal controls at the code level.&lt;&#x2F;p&gt;

&lt;p&gt;Available in GitLab Premium, operators can also use &lt;a href=&quot;#protected-environments&quot;&gt;Protected Environments&lt;&#x2F;a&gt;
to set permissions determining who can deploy code to production environments.
This significantly reduces the risk of the wrong person committing something they
shouldn’t and increases overall security of the environment.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;epic-forecasting&quot;&gt;Epic forecasting&lt;&#x2F;h2&gt;

&lt;p&gt;A new Portfolio Management feature in GitLab Ultimate can automatically
&lt;a href=&quot;#epic-forecasting-with-integrated-milestone-dates&quot;&gt;forecast an epic&#x27;s start and end dates&lt;&#x2F;a&gt;
based on the milestone dates of its issues. With this enhancement,
portfolio managers will be able to compare their planned start and end dates against
the work that is scheduled through milestones, gaining visibility into potential
slippage in epic delivery. This will enable faster, better decisions on what can be
delivered and when plans need to be adjusted.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;everyone-can-contribute&quot;&gt;Everyone can contribute&lt;&#x2F;h2&gt;

&lt;p&gt;Many of these improvements were contributed by the greater GitLab community.
We look forward to your feedback and improvements on these great new features.
Together, we make an awesome team! 🏆&lt;&#x2F;p&gt;

&lt;p&gt;Let us know what you think in the comments below. What are you looking
forward to in this release? What can we continue to improve on?&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_3&#x2F;gitlab-11-3-released-cover.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.2.3, 11.1.6, and 11.0.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/08/28/security-release-gitlab-11-dot-2-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/08/28/security-release-gitlab-11-dot-2-dot-2-released/</id>
<published>2018-08-28T00:00:00+00:00</published>
<updated>2018-08-28T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.2.3, 11.1.6, and 11.0.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-pipeline-tooltip&quot;&gt;Persistent XSS in Pipeline Tooltip&lt;&#x2F;h2&gt;

&lt;p&gt;The tooltip of the job inside the CI&#x2F;CD pipeline was not properly sanitized which resulted in a persistent XSS. The issue is now resolved in the latest release and will be assigned a CVE shortly.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlabcom-gcp-endpoints-exposure&quot;&gt;GitLab.com GCP Endpoints Exposure&lt;&#x2F;h2&gt;

&lt;p&gt;Zeroconf endpoints in Google Cloud Platform (GCP) would have been accessible
via webhooks post-migration. The issue is now resolved in the latest release
for gitlab.com.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;avlidienbrunn&quot;&gt;@avlidienbrunn&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab.com and instances deployed to GCP.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-merge-request-changes-view&quot;&gt;Persistent XSS in Merge Request Changes View&lt;&#x2F;h2&gt;

&lt;p&gt;The Merge Request &lt;code&gt;Changes&lt;&#x2F;code&gt; view was not properly sanitizing certain hunk locations which resulted in a persistent XSS. The issue is now resolved in the latest release and will be assigned a CVE shortly.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.1 and 11.2.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sensitive-data-disclosure-in-sidekiq-logs&quot;&gt;Sensitive Data Disclosure in Sidekiq Logs&lt;&#x2F;h2&gt;

&lt;p&gt;The project import url credentials were being output to the Sidekiq logs. The issue is now resolved in the latest release and will be assigned a CVE shortly.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;kevinksd&quot;&gt;@kevinksd&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Johlandabee&quot;&gt;@Johlandabee&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.10.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-csrf-in-system-hooks&quot;&gt;Missing CSRF in System Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;There is a CSRF Vulnerability which allows an attacker to resend requests to multiple hooks. The &quot;resend request&quot; CSRF token is missing. For this reason attacker can trick user of gitlab to perform an unwanted action on a System Hook for which the user is currently authenticated.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sql00&quot;&gt;Lyubomir Tsirkov&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab 2.7.0pre and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;orphaned-upload-files-exposure&quot;&gt;Orphaned Upload Files Exposure&lt;&#x2F;h2&gt;

&lt;p&gt;Through various bugs, it is possible to orphan a project upload file so that it is not tracked by the uploads table. If the project is moved, then it is possible for another user to create a new project with the same path. Exporting that project will contain the orphaned file, and thus exposing data. The issue is now resolved in the latest release and will be assigned a CVE shortly.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.10.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-authorization-control-api-repository-storage&quot;&gt;Missing Authorization Control API Repository Storage&lt;&#x2F;h2&gt;

&lt;p&gt;Regular users are currently able to change the repository storage value using the API. The issue is now resolved in the latest release and will be assigned a CVE shortly.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 8.10 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/08/23/gitlab-11-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/08/23/gitlab-11-2-1-released/</id>
<published>2018-08-23T00:00:00+00:00</published>
<updated>2018-08-23T00:00:00+00:00</updated>
<author>
<name>Jose Ivan Vargas</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.2.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;08&#x2F;22&#x2F;gitlab-11-2-released&#x2F;&quot;&gt;this month&#x27;s 11.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21352&quot;&gt;Fix broken Git over HTTP clones with LDAP users&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21338&quot;&gt;Fix wrong commit count in push event payload&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;21337&quot;&gt;Eliminate unnecessary and duplicate system hook fires&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.2 released with live preview in the Web IDE and Android project import</title>
<release>11.2</release>
<link href='https://about.gitlab.com/releases/2018/08/22/gitlab-11-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/08/22/gitlab-11-2-released/</id>
<published>2018-08-22T00:00:00+00:00</published>
<updated>2018-08-22T00:00:00+00:00</updated>
<author>
<name>Mike Lewis</name>
</author>
<content type='html'>&lt;p&gt;We are super excited to deliver new features with 11.2 that will help you
get started and iterate faster. Today we deliver enhancements to the Web IDE,
support for manifest files to import Android projects, and enable custom
project templates.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;preview-changes-in-the-web-ide&quot;&gt;Preview changes in the Web IDE&lt;&#x2F;h2&gt;

&lt;p&gt;The Web IDE makes it faster and easier to contribute changes to your projects
by providing an advanced code editor with commit staging right within your
browser. With GitLab 11.2 we’ve made it even easier to see the effect of
your code changes and debug even before you commit. You can now
&lt;a href=&quot;#client-side-evaluation-in-web-ide&quot;&gt;preview your JavaScript web app in the Web IDE&lt;&#x2F;a&gt;,
viewing your changes in real time, right next to the code for client-side evaluation.&lt;&#x2F;p&gt;

&lt;p&gt;In addition, with 11.2, you can delete and rename files and switch branches
without ever leaving the Web IDE.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;android-project-import&quot;&gt;Android project import&lt;&#x2F;h2&gt;

&lt;p&gt;Until now, importing complex project structures with multiple sub-structures
was a tedious, time-consuming task. With our &lt;a href=&quot;#support-for-android-project-import&quot;&gt;new support for XML manifest files&lt;&#x2F;a&gt;,
you can now import larger project structures with multiple repositories altogether,
in bulk, including Android OS code from the &lt;a href=&quot;https:&#x2F;&#x2F;source.android.com&quot;&gt;Android Open Source Project (AOSP)&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cloud-native-simplified&quot;&gt;Cloud native simplified&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;a href=&quot;#cloud-native-gitlab-helm-chart-generally-available&quot;&gt;Cloud Native Helm Chart is now generally available&lt;&#x2F;a&gt;
to help you more quickly install GitLab on Kubernetes. This chart features a
more cloud native architecture, with a container for each component of GitLab
and no requirement for shared storage. The result is increased resilience,
scalability, and performance of GitLab on Kubernetes. A
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;&quot;&gt;GitLab Runner&lt;&#x2F;a&gt; is also deployed, making it
easy to get started with GitLab CI&#x2F;CD.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;lots-more&quot;&gt;Lots more!&lt;&#x2F;h2&gt;

&lt;p&gt;Several other additions will help you and your teams handle projects more
efficiently. With 11.2, GitLab administrators can offer
&lt;strong&gt;&lt;a href=&quot;#custom-project-templates-on-the-instance-level&quot;&gt;instance-wide custom project templates&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;,
allowing users to start new projects quickly by automating repetitive setup tasks.&lt;&#x2F;p&gt;

&lt;p&gt;At the same time, features such as issue board
&lt;strong&gt;&lt;a href=&quot;#issue-board-milestone-lists&quot;&gt;milestone lists&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;,
&lt;strong&gt;&lt;a href=&quot;#summed-weights-in-issue-board-list&quot;&gt;summed weights&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;
for issue board lists, &lt;strong&gt;&lt;a href=&quot;#group-milestones-on-dashboard-milestones-list-page&quot;&gt;group milestones on the milestone dashboard page&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;,
and &lt;strong&gt;&lt;a href=&quot;#todos-for-epics&quot;&gt;todos for epics&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt; enable
better work management.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;everyone-can-contribute&quot;&gt;Everyone can contribute&lt;&#x2F;h2&gt;

&lt;p&gt;Many of these improvements were contributed by the greater GitLab community.
We look forward to your feedback and improvements on these great new features.
Together, we make an awesome team! 🏆&lt;&#x2F;p&gt;

&lt;p&gt;Let us know what you think in the comments below. What are you looking
forward to in this release? What can we continue to improve on?&lt;&#x2F;p&gt;

&lt;p&gt;Thanks for being a part of GitLab!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_2&#x2F;gitlab-11-2-released-cover.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.1.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/07/31/gitlab-11-1-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/07/31/gitlab-11-1-4-released/</id>
<published>2018-07-31T00:00:00+00:00</published>
<updated>2018-07-31T00:00:00+00:00</updated>
<author>
<name>Alessio Caiazza</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.1.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;07&#x2F;26&#x2F;security-release-gitlab-11-dot-1-dot-2-released&#x2F;&quot;&gt;this month&#x27;s 11.1.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;We will not release version 11.1.3 due to performance degradations discovered on our staging infrastructure.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20810&quot;&gt;Remove timeouts for long running requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20798&quot;&gt;Fixed IDE not opening JSON files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20704&quot;&gt;Don&#x27;t overflow project&#x2F;group dropdown results&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20377&quot;&gt;Improve projects indexes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6580&quot;&gt;Resolve &quot;bad alignment in merge request widget (code climate, security report, etc.)&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6528&quot;&gt;Resolve &quot;Environments dropdown is showing on the cluster health page&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;To upgrade to GitLab 11.1.4 from the latest 11.1.2 version, no downtime is required. To upgrade without downtime,
please consult the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;documentation on downtimeless upgrades&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This version includes a post-deploy migration.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab.com post-deploy migrations took approximately 20 seconds.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.1.2, 11.0.5, and 10.8.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/07/26/security-release-gitlab-11-dot-1-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/07/26/security-release-gitlab-11-dot-1-dot-2-released/</id>
<published>2018-07-26T00:00:00+00:00</published>
<updated>2018-07-26T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.1.2, 11.0.5, and 10.8.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;markdown-dos&quot;&gt;Markdown DoS&lt;&#x2F;h2&gt;

&lt;p&gt;An &lt;code&gt;11.1.0&lt;&#x2F;code&gt; regression caused Markdown rendering times to slow exponentially, possibly leading to a denial of service. This issue is now resolved in the latest release and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14601&quot;&gt;CVE-2018-14601&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 11.1.0.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-prometheus-metrics&quot;&gt;Information Disclosure Prometheus Metrics&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Prometheus metrics was disclosing private project pathnames. This also affected the Prometheus instances on &lt;code&gt;dashboards.gitlab.com&lt;&#x2F;code&gt;. The issue is now resolved in the latest release and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14602&quot;&gt;CVE-2018-14602&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;csrf-in-system-hooks&quot;&gt;CSRF in System Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;The &quot;Test&quot; feature of the System Hooks component contained low severity CSRF vulnerability. The issue is now resolved in the latest release and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14603&quot;&gt;CVE-2018-14603&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;sql00&quot;&gt;Lyubomir Tsirkov&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 2.7.0pre and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-pipeline-tooltip&quot;&gt;Persistent XSS Pipeline Tooltip&lt;&#x2F;h2&gt;

&lt;p&gt;The tooltip of the job inside the CI&#x2F;CD pipeline was not properly sanitized and resulted in a persistent XSS. The issue is now resolved in the latest release and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14604&quot;&gt;CVE-2018-14604&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-branch-name-via-web-ide&quot;&gt;Persistent XSS in Branch Name via Web IDE&lt;&#x2F;h2&gt;

&lt;p&gt;The branch name was not properly sanitized when committing a file via the Web IDE which resulted in a persistent XSS. The issue is now resolved in the latest release and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14605&quot;&gt;CVE-2018-14605&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-milestone-promotion&quot;&gt;Persistent XSS Milestone Promotion&lt;&#x2F;h2&gt;

&lt;p&gt;When promoting a Milestone, the name of the Milestone is not sanitized properly which results in the notification to trigger a persistent XSS. The issue is now resolved in the latest release and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14606&quot;&gt;CVE-2018-14606&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.6 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-updates&quot;&gt;Mattermost Updates&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has been updated to version 5.0.2, and it contains a security fix that&#x27;s also been backported to 4.10.2.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;Mattermost security updates page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.1.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/07/24/gitlab-11-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/07/24/gitlab-11-1-1-released/</id>
<published>2018-07-24T00:00:00+00:00</published>
<updated>2018-07-24T00:00:00+00:00</updated>
<author>
<name>Felipe Artur</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.1.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;07&#x2F;22&#x2F;gitlab-11-1-released&#x2F;&quot;&gt;this month&#x27;s 11.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, GitLab.com Free and higher tiers:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20711&quot;&gt;Add missing Gitaly &lt;code&gt;branch_update&lt;&#x2F;code&gt; &lt;code&gt;nil&lt;&#x2F;code&gt; checks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6599&quot;&gt;Resolve &quot;Geo: Unable to disable verification on the secondary&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6567&quot;&gt;Resolve &quot;Geo: Uninitialized constant &lt;code&gt;Gitlab::Geo::ImportExportDownloader&lt;&#x2F;code&gt;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2650&quot;&gt;Export PYTHONPATH and ICU_DATA to gitaly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;#zero-downtime-updates&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for updates.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.1 released with Security Dashboards and enhanced code search</title>
<release>11.1</release>
<link href='https://about.gitlab.com/releases/2018/07/22/gitlab-11-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/07/22/gitlab-11-1-released/</id>
<published>2018-07-22T00:00:00+00:00</published>
<updated>2018-07-22T00:00:00+00:00</updated>
<author>
<name>Andreas Kämmerle</name>
</author>
<content type='html'>&lt;p&gt;In GitLab 11.1 we are shipping increased security visibility with dashboards and views to give you contextual information in the right place at the right time along with better code search, a heap of UX improvements, and a lot more!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;increased-visibility-for-your-security-team&quot;&gt;Increased visibility for your security team&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab is designed for collaboration. Our mission is for everyone to contribute, and specifically we&#x27;ve designed a tool so that Product Management, Engineering, Quality Assurance, Operations, and Security can all collaborate together. It’s why we&#x27;ve built the entire software development and operations lifecycle into a single application. And it’s why we’ve built the Merge Request to be a powerful tool for collaboration.&lt;&#x2F;p&gt;

&lt;p&gt;But sometimes, the Merge Request isn’t the right view for your needs.&lt;&#x2F;p&gt;

&lt;p&gt;MRs are great when you want to see how a discrete change is affecting your app. But what if you want a higher-level view? Sometimes you want visibility into how all current security issues are affecting a branch in aggregate. The new &lt;a href=&quot;#security-dashboard-for-projects&quot;&gt;Security Dashboard&lt;&#x2F;a&gt; now gives you this visibility. This lets you make decisions about priority so you can focus remediation efforts on the most important vulnerabilities. Instead of having to collate reports across Merge Requests, now it’s all in one place. We see this as being especially helpful for security operations and engineering. They now have a specific view in GitLab to help them get their job done. Working right from the dashboard, security teams can adjust the criticality weight of vulnerabilities, creating issues to remediate critical items while dismissing others so they don’t repeatedly show up in reports.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;find-what-youre-looking-for-faster&quot;&gt;Find what you’re looking for faster&lt;&#x2F;h2&gt;

&lt;p&gt;Robust code searching capabilities are fundamental to developer productivity. Whether you are a new developer on a project or simply trying to navigate a large code base before adding a new feature, search is the way you become familiar with the key areas you need to understand. While code search has been available for a long time in GitLab, today, we&#x27;ve made it even better. With enhancements to the &lt;a href=&quot;#file-name-and-path-filters-for-advanced-code-search&quot;&gt;advanced search syntax&lt;&#x2F;a&gt;, you can now filter by filename, path, and extension, enabling you to find the right files more quickly.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;even-more&quot;&gt;Even more!&lt;&#x2F;h2&gt;

&lt;p&gt;In addition to great new security functionality, we’ve also shipped an improved UX with a &lt;a href=&quot;#merge-request-widget-info-and-pipeline-sections-redesign&quot;&gt;redesigned Merge Request widget&lt;&#x2F;a&gt;, a &lt;a href=&quot;#view-merge-request-description-in-the-web-ide&quot;&gt;Merge Request panel in the Web IDE&lt;&#x2F;a&gt;, &lt;a href=&quot;#contribution-analytics-redesign&quot;&gt;redesigned contribution analytics&lt;&#x2F;a&gt;, and more!&lt;&#x2F;p&gt;

&lt;p&gt;Read on to see all features now available in GitLab 11.1.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_1&#x2F;gitlab-11-1-released-cover.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 11.0.4, 10.8.6, and 10.7.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/</id>
<published>2018-07-17T00:00:00+00:00</published>
<updated>2018-07-17T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.0.4, 10.8.6, and 10.7.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;remote-code-execution-vulnerability-in-gitlab-projects-import&quot;&gt;Remote Code Execution Vulnerability in GitLab Projects Import&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab projects import component contained a vulnerability which allowed an attacker to write files to arbitrary directories on the server and that could result in remote code execution. The vulnerability has now been mitigated and is assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-14364&quot;&gt;CVE-2018-14364&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @nyangawa of Chaitin Tech for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.9.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;additional-workarounds&quot;&gt;Additional Workarounds&lt;&#x2F;h3&gt;
&lt;ol&gt;
  &lt;li&gt;Go to &lt;code&gt;&#x2F;admin&#x2F;application_settings&lt;&#x2F;code&gt; of your GitLab instance.&lt;&#x2F;li&gt;
  &lt;li&gt;Under &quot;Import sources&quot;, uncheck the &quot;GitLab export&quot; checkbox.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &lt;code&gt;Save&lt;&#x2F;code&gt;.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/07/05/gitlab-11-0-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/07/05/gitlab-11-0-3-released/</id>
<published>2018-07-05T00:00:00+00:00</published>
<updated>2018-07-05T00:00:00+00:00</updated>
<author>
<name>Filipa Lacerda</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.0.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;06&#x2F;22&#x2F;gitlab-11-0-released&#x2F;&quot;&gt;this month&#x27;s 11.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20175&quot;&gt;Revert merge request widget button max height&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20191&quot;&gt;Implement upload copy when moving an issue with upload on object storage&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20204&quot;&gt;Fix broken &#x27;!&#x27; support to autocomplete MRs in &lt;code&gt;GFM&lt;&#x2F;code&gt; fields&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20276&quot;&gt;Restore showing Elasticsearch and Geo status on dashboard.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20280&quot;&gt;Fix merge request page rendering error when its target&#x2F;source branch is missing&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20188&quot;&gt;Fix sidebar collapse breapoints for job and wiki pages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20229&quot;&gt;Fix size of code blocks in headings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20187&quot;&gt;Fix loading screen for search autocomplete dropdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20251&quot;&gt;Fix ambiguous &lt;code&gt;due_date&lt;&#x2F;code&gt; column for Issue scopes.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20263&quot;&gt;Always serve favicon from main GitLab domain so that CI badge can be drawn over it.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20270&quot;&gt;Fix tooltip flickering bug.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;&quot;&gt;Fix refreshing cache keys for open issues count.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20269&quot;&gt;Replace deprecated bs.affix in merge request tabs with sticky polyfill.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;&quot;&gt;Prevent pipeline job tooltip from scrolling off dropdown container.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20280&quot;&gt;Fix 500 Error when attempting to view MR after its target branch was deleted&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19904&quot;&gt;Fix issue count not updating for project members&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20192&quot;&gt;Fix No UI element to edit group label&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20171&quot;&gt;Fix Tooltips scroll along the list within Pipeline jobs dropdown on MR widget&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20235&quot;&gt;Fix Tooltips flicker when highlighting award emoji&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 11.0.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/06/27/gitlab-11-0-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/06/27/gitlab-11-0-2-released/</id>
<published>2018-06-27T00:00:00+00:00</published>
<updated>2018-06-27T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 11.0.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;06&#x2F;22&#x2F;gitlab-11-0-released&#x2F;&quot;&gt;this month&#x27;s 11.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19568&quot;&gt;Adds feature automation for project wiki creation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19810&quot;&gt;Fix: Serve favicon image always from the main GitLab domain to avoid issues with CORS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20006&quot;&gt;Fix diff comment alignment for parallel code additions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20010&quot;&gt;Fix Prometheus installation on Clusters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20035&quot;&gt;Fix navigation bar links get underline style when active&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20037&quot;&gt;Fix custom logo rendering improperly on sign-in page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20048&quot;&gt;Skips generation of MO files&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20049&quot;&gt;Fix multiple active tabs when Crowd or LDAP is in use&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20053&quot;&gt;Allow omnibus to disable sourcemaps in memory constrained environments&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20065&quot;&gt;Restore custom hooks for wiki&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20109&quot;&gt;Bump sprockets to &lt;code&gt;3.7.2&lt;&#x2F;code&gt; to address &lt;code&gt;CVE-2018-3760&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20110&quot;&gt;Remove top padding on GPG popovers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19548&quot;&gt;Fix notifications when MR becomes unmergeable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20061&quot;&gt;Enforce setting string as value of the CI&#x2F;CD variable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20076&quot;&gt;Show a reCAPTCHA on signin page if custom header is set&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20125&quot;&gt;Notify conflict only for opened&#x2F;locked merge requests&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19501&quot;&gt;Add support for verifying remote uploads, artifacts, and LFS objects in check rake tasks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19989&quot;&gt;Use Go &lt;code&gt;1.10&lt;&#x2F;code&gt; for source installations&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20163&quot;&gt;Fix alert button styling so that they don&#x27;t show up white&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20075&quot;&gt;Enable webpack nodeEnv optimization&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20162&quot;&gt;Fix sorting by name on explore projects page.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;20174&quot;&gt;Fix a performance bottleneck in rendering wiki pages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6209&quot;&gt;Fix admin group plan row alignment&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6215&quot;&gt;Fix multiple active tabs when Crowd or LDAP is in use&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6178&quot;&gt;Geo: Fix load balancing configuration not working with Geo tracking database&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 11.0.1, 10.8.5, and 10.7.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/</id>
<published>2018-06-25T00:00:00+00:00</published>
<updated>2018-06-25T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 11.0.1, 10.8.5, and 10.7.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;wiki-xss&quot;&gt;Wiki XSS&lt;&#x2F;h2&gt;

&lt;p&gt;The wiki contains a persistent XSS issue due to a lack of output encoding affecting a specific markdown feature. The issue is now resolved in the latest release. It has been assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-12606&quot;&gt;CVE-2018-12606&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 7.11 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sanitize-gem-updates&quot;&gt;Sanitize gem updates&lt;&#x2F;h2&gt;

&lt;p&gt;The sanitize gem is updated to version 4.6.4 due to versions &amp;lt; 4.6.3 being affected by &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-3740&quot;&gt;CVE-2018-3740&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 6.8.0 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-url_forparams&quot;&gt;XSS in url_for(params)&lt;&#x2F;h2&gt;

&lt;p&gt;The usage of &lt;code&gt;url_for&lt;&#x2F;code&gt; contained a XSS issue due to it allowing arbitrary protocols as a parameter. The issue is now resolved in the latest release. It has been assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-12605&quot;&gt;CVE-2018-12605&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 only. This is already fixed in 10.8 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;content-injection-via-username&quot;&gt;Content injection via username&lt;&#x2F;h2&gt;

&lt;p&gt;The username field contained an input validation issue which resulted in HTML content injection on several pages and could lead to phishing attacks. The issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to @talaohu28 for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 4.1 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;activity-feed-publicly-displaying-internal-project-names&quot;&gt;Activity feed publicly displaying internal project names&lt;&#x2F;h2&gt;

&lt;p&gt;The activity feed was disclosing membership and project-level events of internal projects, even when logged out. The issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;ppjet6&quot;&gt;@ppjet6&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.7 - 11.0.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-charts&quot;&gt;Persistent XSS in charts&lt;&#x2F;h2&gt;

&lt;p&gt;The charts feature contained a persistent XSS issue due to a lack of output encoding. The issue is now resolved in the latest release. It has been assigned to &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-12607&quot;&gt;CVE-2018-12607&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;@fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.5 and later.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 11.0 released with Auto DevOps and License Management</title>
<release>11.0</release>
<link href='https://about.gitlab.com/releases/2018/06/22/gitlab-11-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/06/22/gitlab-11-0-released/</id>
<published>2018-06-22T00:00:00+00:00</published>
<updated>2018-06-22T00:00:00+00:00</updated>
<author>
<name>Marcia Ramos</name>
</author>
<content type='html'>&lt;figure class=&quot;video_container&quot;&gt;
&lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;EcFOx-FBrlQ&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;Writing and delivering quality software poses many challenges.
First, you must solve tough business problems and craft great code.
But the challenges don&#x27;t stop there. You have to ensure your code
is fast, secure, and bug-free. You will need to build, integrate,
test, secure, review, configure, and deploy your code. Creating
and managing this pipeline is time consuming and complex.&lt;&#x2F;p&gt;

&lt;p&gt;Beyond making it easy to host and collaborate on public and private
repositories, GitLab also simplifies the rest of the process by
offering the whole delivery toolchain, built in. And now, it&#x27;s not
only built in, it&#x27;s automated. Simply commit your code and
&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;stages-devops-lifecycle&#x2F;auto-devops&#x2F;&quot;&gt;&lt;strong&gt;Auto DevOps&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; can do the rest. Auto DevOps is a pre-built, fully
featured CI&#x2F;CD pipeline that automates the entire delivery process.
It is Generally Available and ready for prime time in GitLab 11.0.&lt;&#x2F;p&gt;

&lt;p&gt;Other key features we have released in GitLab 11.0 include
&lt;strong&gt;License Management&lt;&#x2F;strong&gt; to automatically detect licenses of
your project&#x27;s dependencies; enhanced &lt;strong&gt;Security Testing&lt;&#x2F;strong&gt;
of your code, containers, and dependencies; further &lt;strong&gt;Kubernetes&lt;&#x2F;strong&gt;
integration features; an enhanced &lt;strong&gt;Web IDE&lt;&#x2F;strong&gt;; enhanced
&lt;strong&gt;Epic and Roadmap&lt;&#x2F;strong&gt; views; &lt;strong&gt;Incremental Rollouts&lt;&#x2F;strong&gt;; and much more.&lt;&#x2F;p&gt;



&lt;p&gt;First, some more detail about these key features.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;#auto-devops-generally-available&quot;&gt;Auto DevOps&lt;&#x2F;a&gt; covers the end-to-end
lifecycle:&lt;&#x2F;strong&gt;
Simply commit your code to GitLab, then Auto DevOps does the rest:
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-build&quot;&gt;building&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-test&quot;&gt;testing&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-code-quality&quot;&gt;code quality scanning&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-sast&quot;&gt;security scanning&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-license-management&quot;&gt;license scanning&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-review-apps&quot;&gt;packaging&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-dast&quot;&gt;performance testing&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-deploy&quot;&gt;deploying&lt;&#x2F;a&gt;, and
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;#auto-monitoring&quot;&gt;monitoring&lt;&#x2F;a&gt;
your application.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;“GitLab is a key part of our software-delivery processes and because
of them, we’ve improved our delivery velocity by four times and made
it immensely easier for our teams to collaborate,” said Chris Hill,
head of systems engineering for infotainment at Jaguar Land Rover.&lt;&#x2F;p&gt;

  &lt;p&gt;“We’re excited about Auto DevOps, because it will allow us to focus
on writing code and business value. GitLab can then handle the rest;
automatically building, testing, deploying, and even monitoring our
application.”&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;figure class=&quot;video_container&quot;&gt;
&lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;0Tc0YYBxqi4&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;#license-management&quot;&gt;License Management&lt;&#x2F;a&gt; (software composition analysis):&lt;&#x2F;strong&gt;
Software is often a complex amalgamation of code that includes external components
(libraries, frameworks, and utilities). Each component typically includes
specific license permissions and limitations, so you need to track and manage
these dependencies for your application. GitLab 11.0 includes License Management
(software composition analysis) built into the Merge Request so you can track
and manage the included licenses.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Security:&lt;&#x2F;strong&gt; This month we continue to improve GitLab&#x27;s built-in security
capabilities so you can &quot;shift security left&quot; and catch vulnerabilities early
via integrated Static and Dynamic Application Security Testing, along with
Dependency and Container Scanning. Specifically, we’ve extended coverage of
Static Analysis Security Testing (SAST) to
&lt;a href=&quot;#sast-for-net-and-scala&quot;&gt;include Scala and .Net&lt;&#x2F;a&gt;. We’re also including more
details in the SAST reports so you can get insight about specific issues
right there.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Kubernetes:&lt;&#x2F;strong&gt; As part of our ongoing effort to improve the integration
with Kubernetes and make it easy for you to manage and monitor Kubernetes
from GitLab, there are several new features. Most notably, when you need
to debug or check on a pod, you can review the
&lt;a href=&quot;#view-kubernetes-pod-logs&quot;&gt;Kubernetes pod logs&lt;&#x2F;a&gt; directly from GitLab&#x27;s
deployment board.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;GitLab Web IDE:&lt;&#x2F;strong&gt; The more work you can do directly from the IDE, the
more productive you can be. Now, you are able to
&lt;a href=&quot;#cicd-pipeline-status-and-job-traces-in-the-web-ide&quot;&gt;view your CI&#x2F;CD pipelines from the IDE&lt;&#x2F;a&gt;
and get immediate feedback if a pipeline fails. Switching tasks
can be disruptive, so the updated Web IDE makes it easy to quickly switch
to the next merge request, to create, improve, or review without leaving
the Web IDE. This way, you can stay in the flow of writing and reviewing
code changes.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Navigate Epics &#x2F; Roadmaps:&lt;&#x2F;strong&gt; When you want to visualize how
&lt;a href=&quot;#roadmap-date-ranges&quot;&gt;Epics and Roadmaps flow over time&lt;&#x2F;a&gt;, it can be helpful
to change the time scale and zoom out. We’ve updated the Epic&#x2F;Roadmap navigation
interface to make it easier to see the big picture and make planning easier.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;11_0&#x2F;gitlab-11-0-released-cover.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.8.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/06/07/gitlab-10-8-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/06/07/gitlab-10-8-4-released/</id>
<published>2018-06-07T00:00:00+00:00</published>
<updated>2018-06-07T00:00:00+00:00</updated>
<author>
<name>Filipa Lacerda</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.8.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;05&#x2F;22&#x2F;gitlab-10-8-released&#x2F;&quot;&gt;this month&#x27;s 10.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;
&lt;ul&gt;
  &lt;li&gt;No new changes.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;available-in-gitlab-premium-and-ultimate&quot;&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5909&quot;&gt;Treat external authorization service 403 response status as failure&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5964&quot;&gt;Display 403 error and response message when access is denied by external authorization service&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5976&quot;&gt;Validate external authorization classification label exists when updating project classification&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5997&quot;&gt;Fix breadcrumb and external authorization classification label being hidden by system message&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a new migration that should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.8.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/06/01/gitlab-10-8-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/06/01/gitlab-10-8-3-released/</id>
<published>2018-06-01T00:00:00+00:00</published>
<updated>2018-06-01T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.8.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;05&#x2F;22&#x2F;gitlab-10-8-released&#x2F;&quot;&gt;this month&#x27;s 10.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19021&quot;&gt;Optimize database version method&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19196&quot;&gt;Adds migration to ensure all remote mirror columns get created&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19087&quot;&gt;Upgrade workhorse to v4.2.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19222&quot;&gt;Bump rugged to 0.27.1 for security fixes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19226&quot;&gt;Fix local storage not being cleared after creating a new issue&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19143&quot;&gt;Fix encoding of branch names on compare and new merge request page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19125&quot;&gt;Fix assumption of GitLab installation as a git working copy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19151&quot;&gt;Upgrades Gitaly to 0.100.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5772&quot;&gt;Geo: Fixes repository verification getting stuck when all projects have been verified at least once&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5835&quot;&gt;Geo: Make &lt;code&gt;Geo::PruneEventLogWorker&lt;&#x2F;code&gt; delete rows more gently&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a new migration that should not require any downtime.
This migration should only affect users who went from EE to CE and had issues upgrading to &lt;code&gt;10.8.0&lt;&#x2F;code&gt; to &lt;code&gt;10.8.2&lt;&#x2F;code&gt;.
GitLab.com migrations took approximately 0 minutes.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_in&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 10.8.2, 10.7.5, and 10.6.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/05/29/security-release-gitlab-10-dot-8-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/05/29/security-release-gitlab-10-dot-8-dot-2-released/</id>
<published>2018-05-29T00:00:00+00:00</published>
<updated>2018-05-29T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.8.2, 10.7.5, and 10.6.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-updates&quot;&gt;Git updates&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve included updated Git security versions 2.16.4 and 2.14.4 in this latest release for 10.8.2, 10.7.5, and 10.6.6.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see &lt;a href=&quot;https:&#x2F;&#x2F;public-inbox.org&#x2F;git&#x2F;xmqqy3g2flb6.fsf@gitster-ct.c.googlers.com&#x2F;&quot;&gt;Git release notes&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;removing-public-deploy-keys-regression&quot;&gt;Removing public deploy keys regression&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;deploy_keys.html#delete-deploy-key&quot;&gt;delete deploy key&lt;&#x2F;a&gt; operation contained a security issue which could allow an attacker to delete shared deploy keys. The issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Christian Seelheim for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.1.6 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;users-can-update-their-password-without-entering-current-password&quot;&gt;Users can update their password without entering current password&lt;&#x2F;h2&gt;

&lt;p&gt;The settings page contained an unverified password change weakness which could&#x27;ve been used to reset a user&#x27;s password without knowing the user&#x27;s current password. This only worked if either the attacker had hijacked a victim&#x27;s session or had access to a victim&#x27;s email address to intercept a password reset token.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 1.0 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss---selecting-users-as-allowed-merge-request-approvers&quot;&gt;Persistent XSS - Selecting users as allowed merge request approvers&lt;&#x2F;h2&gt;

&lt;p&gt;The merge request approvers dropdown in GitLab EE contained a persistent xss issue which is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;phillycheeze&quot;&gt;phillycheeze&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 9.1 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss---multiple-locations-of-user-selection-drop-downs&quot;&gt;Persistent XSS - Multiple locations of user selection drop downs&lt;&#x2F;h2&gt;

&lt;p&gt;The user select drop down contained a persistent xss issue in GitLab EE which is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;phillycheeze&quot;&gt;phillycheeze&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 9.1 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;include-directive-in-gitlab-ciyml-allows-ssrf-requests&quot;&gt;&lt;code&gt;include&lt;&#x2F;code&gt; directive in .gitlab-ci.yml allows SSRF requests&lt;&#x2F;h2&gt;

&lt;p&gt;Arbitrary GET request could be performed against internal resources due to &lt;code&gt;include&lt;&#x2F;code&gt; directive in .gitlab-ci.yml. Data exfiltration potential is limited to resources that respond with a YAML file following certain constraints. This issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab EE 10.5 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;permissions-issue-in-merge-requests-create-service&quot;&gt;Permissions issue in Merge Requests Create Service&lt;&#x2F;h2&gt;

&lt;p&gt;Users which were not project members could create merge requests via a fork for internal projects. This issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.6.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;arbitrary-assignment-of-project-fields-using-import-project&quot;&gt;Arbitrary assignment of project fields using &quot;Import project&quot;&lt;&#x2F;h2&gt;

&lt;p&gt;Any project model database column can be controlled on import by fields in the &lt;code&gt;project.json&lt;&#x2F;code&gt; of an exported project. This issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 10.4 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.8.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/05/24/gitlab-10-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/05/24/gitlab-10-8-1-released/</id>
<published>2018-05-24T00:00:00+00:00</published>
<updated>2018-05-24T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.8.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;05&#x2F;22&#x2F;gitlab-10-8-released&#x2F;&quot;&gt;this month&#x27;s 10.8 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19039&quot;&gt;Fixes runtime errors related to modifying frozen strings&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19047&quot;&gt;Fixes wrong value on CI_DEPLOY_USER environment variable&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18989&quot;&gt;Handle connection errors on environment&#x27;s prometheus clients properly&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19053&quot;&gt;Fixes error when deleting an empty list of refs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18930&quot;&gt;Fix system hook not firing for blocked users when LDAP sign-in is used&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18979&quot;&gt;Makes &lt;code&gt;GenericCommitStatus&lt;&#x2F;code&gt; responds to &lt;code&gt;Presentable&lt;&#x2F;code&gt; methods&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18982&quot;&gt;Fixes 500 error viewing admin page due to statement timeouts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19029&quot;&gt;Fixes dropdown actions in mini pipeline graphs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19085&quot;&gt;Bump prometheus-client-mmap to 0.9.3&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18948&quot;&gt;Fixes IDE file finder ordering&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19038&quot;&gt;Fixes web IDE review &amp;amp; commit editors getting into incorrect state&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19110&quot;&gt;Render 404 when prometheus adapter is disabled in Prometheus metrics controller&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19109&quot;&gt;Fixes upgrade to 10.8.0-ce.0 fails because of AddIndexesToProjectMirrorData&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19115&quot;&gt;Fixed U2F authentication when used with LDAP&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5724&quot;&gt;Add Group&#x27;s GL.com plan name to payload of system hook&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5758&quot;&gt;Fixes dependency scanning report with vulnerability without CVE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5704&quot;&gt;Geo: Fixes repo, wiki, and upload replication when renaming a namespace that has subgroups, without hashed storage enabled&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5722&quot;&gt;Geo: Verification information section shows incorrect data values for the primary node in Geo admin screen&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5768&quot;&gt;Geo: Prevent removing project registry records&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5777&quot;&gt;Geo: Exclude tables that start with &lt;code&gt;pg_&lt;&#x2F;code&gt; from FDW check&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a new migration that should not require any downtime.
GitLab.com migrations took approximately 0 minutes.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt; to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.8 released with incremental rollouts, plus open source push mirroring</title>
<release>10.8</release>
<link href='https://about.gitlab.com/releases/2018/05/22/gitlab-10-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/05/22/gitlab-10-8-released/</id>
<published>2018-05-22T00:00:00+00:00</published>
<updated>2018-05-22T00:00:00+00:00</updated>
<author>
<name>Jeremy Watson</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;re super excited to share a host of awesome additions now available in GitLab 10.8! We&#x27;ve improved release automation, sped up security vulnerability remediation, open sourced a highly requested paid feature, and plenty more.&lt;&#x2F;p&gt;



&lt;h3 class=&quot;intro-header&quot; id=&quot;deploy-with-confidence&quot;&gt;Deploy with confidence&lt;&#x2F;h3&gt;

&lt;p&gt;Releasing new features always comes with a bit of anxiety. Even with stringent pre-release testing, a change to your production codebase can result in unforeseen effects. Our new &lt;a href=&quot;#incremental-rollout-deployments&quot;&gt;Incremental Rollouts&lt;&#x2F;a&gt; feature helps developers deploy code with confidence by exposing changes to only a subset of users. Instead of rolling out to your entire user base all at once, incremental rollouts lets you gradually deploy to an increasing portion of your Kubernetes pods. If problems do occur, you can roll back without affecting the entire user base. We&#x27;re excited to provide an improved way to protect users and manage the unexpected, so you&#x27;re free to deploy more frequently.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header&quot; id=&quot;push-mirroring-is-now-open-source&quot;&gt;Push Mirroring is now open source&lt;&#x2F;h3&gt;

&lt;p&gt;When we &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;04&#x2F;22&#x2F;gitlab-8-7-released&#x2F;#remote-mirrors-ee-only&quot;&gt;first released Push Mirroring&lt;&#x2F;a&gt;, it was introduced as a paid feature. Since then, it has been one of the features that is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18732&quot;&gt;most requested&lt;&#x2F;a&gt; to be moved into our open source codebase. We take these requests seriously, and view having a balance between paid and open source features as &lt;a href=&quot;&#x2F;company&#x2F;stewardship&#x2F;&quot;&gt;good stewardship&lt;&#x2F;a&gt;. Today, we&#x27;re happy to share that &lt;a href=&quot;#push-mirroring-now-open-source&quot;&gt;Push Mirroring has been open sourced&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;This opens up a few key use cases for GitLab Core users including freelance development and migration. Freelance developers can now mirror each of their clients repos. While folks migrating to GitLab from other git-based repositories can now take advantage of push mirroring to ease the migration path.&lt;&#x2F;p&gt;

&lt;p&gt;Whenever possible, we like to open source features to not only encourage greater usage of GitLab, but also to encourage more folks to &lt;a href=&quot;&#x2F;community&#x2F;contribute&#x2F;&quot;&gt;contribute to open source software&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;ship-securely-faster&quot;&gt;Ship securely faster&lt;&#x2F;h3&gt;

&lt;p&gt;Keeping track of vulnerabilities without automation can be next to impossible. GitLab&#x27;s built-in security functionality includes   &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;sast&#x2F;&quot;&gt;SAST&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;dast&#x2F;&quot;&gt;DAST&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;container_scanning&#x2F;&quot;&gt;container scanning&lt;&#x2F;a&gt;, and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;dependency_scanning&#x2F;&quot;&gt;dependency scanning&lt;&#x2F;a&gt; to keep you on top of vulnerabilities and ship secure code. And today, we&#x27;re improving the experience.&lt;&#x2F;p&gt;

&lt;p&gt;When a vulnerability appears in a report you&#x27;ll want to take action to either fix it or potentially ignore it if it&#x27;s a false positive. Now with &lt;a href=&quot;#interactive-feedback-in-security-reports-alpha&quot;&gt;Interactive Security Reports&lt;&#x2F;a&gt;, you&#x27;ll have the ability to take action right from the security report to either dismiss a vulnerability or create an issue to remediate it. By enabling users to take swifter action on vulnerabilities, we can help developers ship better, safer code.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;over-to-you&quot;&gt;Over to you!&lt;&#x2F;h3&gt;

&lt;p&gt;We couldn&#x27;t be more excited to get these changes to you and to hear your feedback. Let us know what you think in the comments below – what are you looking forward to in this release? What can we continue to improve on?&lt;&#x2F;p&gt;

&lt;p&gt;Thanks for being a part of GitLab ❤️&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_8&#x2F;10_8-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.7.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/05/22/gitlab-10-7-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/05/22/gitlab-10-7-4-released/</id>
<published>2018-05-22T00:00:00+00:00</published>
<updated>2018-05-22T00:00:00+00:00</updated>
<author>
<name>Filipa Lacerda</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.7.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;04&#x2F;22&#x2F;gitlab-10-7-released&#x2F;&quot;&gt;this month&#x27;s 10.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Libre, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19053&quot;&gt;Fix error when deleting an empty list of refs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;19016&quot;&gt;Bumps &lt;code&gt;grpc&lt;&#x2F;code&gt; to 1.11.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5543&quot;&gt;Fix: Geo: BaseSyncService should prune the @geo-temporary directory before fetching.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5643&quot;&gt;Does not log failed sign-in attempts when in a GitLab read-only instance.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.7.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/05/03/gitlab-10-7-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/05/03/gitlab-10-7-3-released/</id>
<published>2018-05-03T00:00:00+00:00</published>
<updated>2018-05-03T00:00:00+00:00</updated>
<author>
<name>Filipa Lacerda</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.7.3 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;04&#x2F;22&#x2F;gitlab-10-7-released&#x2F;&quot;&gt;this month&#x27;s 10.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Libre, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18092&quot;&gt;Fixed wrong avatar URL when the avatar is on object storage.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18462&quot;&gt;Fix errors on pushing to an empty repository.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18543&quot;&gt;Update &lt;code&gt;doorkeeper&lt;&#x2F;code&gt; to 4.3.2 to fix GitLab OAuth authentication.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18580&quot;&gt;Ports &lt;code&gt;omniauth-jwt&lt;&#x2F;code&gt; gem onto GitLab OmniAuth Strategies suite.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;!18599&quot;&gt;Fix redirection error for applications using OpenID.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18586&quot;&gt;Fix commit trailer rendering when Gravatar is disabled.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18624&quot;&gt;Fix &lt;code&gt;file_store&lt;&#x2F;code&gt; for artifacts and lfs when saving.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18544&quot;&gt;Fix users not seeing labels from private groups when being a member of a child project.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5470&quot;&gt;Geo - Fix undefined method pending_delete for nil class.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5495&quot;&gt;Geo: Admin page will not crash with 500 because of InvalidSignatureTimeError.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5481&quot;&gt;Fix DB LB errors when escaping input.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2483&quot;&gt;Add support for the -daemon-inplace-chroot command-line flag to GitLab Pages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Summary of limited download archive unauthorized access of repositories on GitLab.com</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/05/02/download-archive-security-vulnerability/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/05/02/download-archive-security-vulnerability/</id>
<published>2018-05-02T00:00:00+00:00</published>
<updated>2018-05-02T00:00:00+00:00</updated>
<author>
<name>Kathy Wang</name>
</author>
<content type='html'>&lt;h2 id=&quot;summary&quot;&gt;Summary&lt;&#x2F;h2&gt;

&lt;p&gt;From April 17, 2018 to April 24, 2018, a limited number of public and private repositories may have been inadvertently downloaded by unauthorized users on GitLab.com. GitLab user Lee Pugh notified us of this issue on April 23, 2018. The affected users represent 0.04 percent of our GitLab.com user base. While files generated by users would be unique for that repository, a recent change to support a use case to download the latest copy of the repository with the same filename inadvertently introduced this vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability affected GitLab.com users, and was mitigated as of April 23, 2018. None of the our on-prem users are affected by this vulnerability. We have notified the affected users via email, and are implementing a series of security enhancements to prevent such issues from happening again.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;accidental-unauthorized-access-of-download-archives&quot;&gt;Accidental unauthorized access of download archives&lt;&#x2F;h2&gt;

&lt;p&gt;From April 17, 2018 to April 24, 2018, a subset of GitLab.com users were potentially affected by a security vulnerability where a limited number of public and private repositories may have been inadvertently downloaded by unauthorized users.&lt;&#x2F;p&gt;

&lt;p&gt;Prior to v10.7.0, a unique hash value was always included in the request for the archive file  to processed by Workhorse, the subsystem responsible for performing slower operations on Git repositories. This meant any file generated by the user would generally be unique for that repository. With the release of v10.7.0, the &lt;code&gt;append_sha&lt;&#x2F;code&gt; parameter was made optional. The motivation of the change was to support the use case where the latest copy of the repository could be downloaded with the same filename.&lt;&#x2F;p&gt;

&lt;p&gt;However, this introduced a problem - a repository download archive request without this parameter will return the ArchivePath value without a unique ID. As a result of this change, an archive request for a second project with the same name will point to the same archive file. This vulnerability was mitigated in production within hours of discovery by disabling feature flags controlling the caching behavior. The vulnerability has been patched in the &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;04&#x2F;30&#x2F;security-release-gitlab-10-dot-7-dot-2-released&#x2F;&quot;&gt;latest Security Release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h2&gt;

&lt;p&gt;There is no evidence of malicious activity for the accidental unauthorized access of download archives. However, the detailed audit logs for our log aggregator only cover part of the seven days in question. Potentially affected users have received email notifications accordingly. Although there is no evidence to suggest it happened, in the worst case, a private repository could have been accidentally downloaded.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mitigations&quot;&gt;Mitigations&lt;&#x2F;h2&gt;

&lt;p&gt;Since the discovery, we have worked to investigate and mitigate all of these related security issues. We are continually improving our security processes and logging mechanisms to ensure that similar incidents will not occur again. These improvements include:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Increase logging retention periods&lt;&#x2F;li&gt;
  &lt;li&gt;Fine-grain access controls to all logging infrastructure&lt;&#x2F;li&gt;
  &lt;li&gt;Add unit&#x2F;integration tests to ensure consistent coding practices&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;If your project or account is potentially affected by this security issue, you will receive an email notification listing affected projects.&lt;&#x2F;p&gt;

&lt;p&gt;We apologize for the impact this issue has caused our users. GitLab takes your information and your data extremely seriously. We will learn from this incident and use it to improve upon our security even further.&lt;&#x2F;p&gt;

&lt;p&gt;In keeping with our company value of transparency we also believe in communicating about such incidents clearly and promptly. If you have any questions, please contact &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#101;&amp;#099;&amp;#117;&amp;#114;&amp;#105;&amp;#116;&amp;#121;&amp;#064;&amp;#103;&amp;#105;&amp;#116;&amp;#108;&amp;#097;&amp;#098;&amp;#046;&amp;#099;&amp;#111;&amp;#109;&quot;&gt;&amp;#115;&amp;#101;&amp;#099;&amp;#117;&amp;#114;&amp;#105;&amp;#116;&amp;#121;&amp;#064;&amp;#103;&amp;#105;&amp;#116;&amp;#108;&amp;#097;&amp;#098;&amp;#046;&amp;#099;&amp;#111;&amp;#109;&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 10.7.2, 10.6.5, and 10.5.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/04/30/security-release-gitlab-10-dot-7-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/04/30/security-release-gitlab-10-dot-7-dot-2-released/</id>
<published>2018-04-30T00:00:00+00:00</published>
<updated>2018-04-30T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.7.2, 10.6.5, and 10.5.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-move-issue-using-project-namespace&quot;&gt;Persistent XSS in &#x27;Move Issue&#x27; using project namespace&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;code&gt;Move Issue&lt;&#x2F;code&gt; feature contained a persistent XSS vulnerability that is now resolved in the latest release. This issue has been assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-10379&quot;&gt;CVE-2018-10379&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.5 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;download-archive-allowing-unauthorized-private-repo-access&quot;&gt;Download Archive allowing unauthorized private repo access&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;code&gt;Download Archive&lt;&#x2F;code&gt; feature contained an improper authorization issue which is fixed in this release. Affected users will receive an email notification, and a separate blog post will be published with further details regarding this issue and its impact.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-updates&quot;&gt;Mattermost Updates&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve included respective Mattermost security versions in 10.5 and 10.6. The omnibus-gitlab package for 10.7.0, already contains the Mattermost security update.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;Mattermost security updates page&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.7.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/04/23/gitlab-10-7-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/04/23/gitlab-10-7-1-released/</id>
<published>2018-04-23T00:00:00+00:00</published>
<updated>2018-04-23T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.7.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;04&#x2F;22&#x2F;gitlab-10-7-released&#x2F;&quot;&gt;this month&#x27;s 10.7 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18345&quot;&gt;Retry icon is misaligned in pipelines graph actions&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18359&quot;&gt;Changes the ID for the performance bar to correctly sticky the stat bar to the top&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18350&quot;&gt;Fixed IDE sidebar not being scrollable in FireFox&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18362&quot;&gt;Remove confirm box when redirecting to new merge request form in IDE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18370&quot;&gt;Fix raw HTML being shown on the MR page from Performance widget&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18322&quot;&gt;Validate project path prior to hitting the database.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17792&quot;&gt;Fix skeleton placeholder on diff has white background&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18157&quot;&gt;Optimise rendering of Markdown documents that belong to different projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18419&quot;&gt;Fix regularly error message (&lt;em&gt;Error getting performance bar results&lt;&#x2F;em&gt;) seeing in production&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18400&quot;&gt;Fix a case with empty secret CI&#x2F;CD variables&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18393&quot;&gt;Fix URLs in the link header for &lt;code&gt;GET &#x2F;projects&#x2F;:id&#x2F;repository&#x2F;contributors&lt;&#x2F;code&gt; when no value is passed for &lt;code&gt;order_by&lt;&#x2F;code&gt; or &lt;code&gt;sort&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18421&quot;&gt;Fix loading state not showing in IDE tree list&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18408&quot;&gt;Add product badges to docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18417&quot;&gt;Fix &lt;code&gt;Trace::HttpIO&lt;&#x2F;code&gt; can not render multi-byte chars&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18422&quot;&gt;Fix regression around new SHA widget in &quot;New Merge Request&quot; Screen&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18443&quot;&gt;Fix Markdown typo in Web IDE docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18404&quot;&gt;Fixed web IDE not working for sub-groups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18471&quot;&gt;Fix N+1 queries when loading participants for a commit note&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18468&quot;&gt;Fix specifying a non-default ref when requesting an archive using the legacy URL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18360&quot;&gt;Fix direct_upload for old records&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18473&quot;&gt;Respect visibility options and description when importing project from template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18460&quot;&gt;Fix issues without links when added from boards new issue  modal&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18492&quot;&gt;Fix text from the diff is showing within a table header inside the discussion after the discussion is resolved&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18173&quot;&gt;Add an API endpoint to download git repository snapshots&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18510&quot;&gt;Fix gitaly-proto version for gitlab-ce v10.7.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18523&quot;&gt;Removes  &#x27;Job log message&#x27; from build trace&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18543&quot;&gt;Update doorkeeper&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5340&quot;&gt;Fix missing border top in codeclimate report&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5400&quot;&gt;Avoid wrong closing dates being caught by the query on Burndown charts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5360&quot;&gt;Fix Epic timeline bar misalignment when start date is in last timeframe month and end date is out of range&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18444&quot;&gt;Geo: Fix statement timeout counting local job artifacts&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5356&quot;&gt;Geo: Document steps to enable FDW if running from before 10.4&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5319&quot;&gt;Geo: Improve SSH key replication step documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5348&quot;&gt;Geo: Fixes high number of sequential scans in project_repository_states&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5385&quot;&gt;Geo: Add extra reconfigure step in docs to enable FDW&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5411&quot;&gt;Geo: Add back job artifacts sync status to &#x2F;admin&#x2F;geo_nodes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5428&quot;&gt;Geo: Fix &lt;code&gt;NULL&lt;&#x2F;code&gt; insert attempts for &lt;code&gt;missing_on_primary&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5352&quot;&gt;Geo: Fix enabled wiki counts with FDW enabled (impacts synced, out-of-sync, and verified wiki counts)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a new migration that should not require any downtime.
GitLab.com migrations took approximately 12 minutes. There are no background
migrations.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.7 released with open source Web IDE and SAST for Go and C&#x2F;C++!</title>
<release>10.7</release>
<link href='https://about.gitlab.com/releases/2018/04/22/gitlab-10-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/04/22/gitlab-10-7-released/</id>
<published>2018-04-22T00:00:00+00:00</published>
<updated>2018-04-22T00:00:00+00:00</updated>
<author>
<name>Joshua Lambert</name>
</author>
<content type='html'>&lt;p&gt;Contributing features, reviewing changes, and deploying code is a day in the life of a developer.
Today we are making these tasks easier and more efficient with an amazing Web IDE, more flexible pipelines, additional security testing, and so much more.&lt;&#x2F;p&gt;



&lt;h2 class=&quot;intro-header&quot; id=&quot;web-ide-is-now-open-source-and-generally-available&quot;&gt;Web IDE is now open source and generally available&lt;&#x2F;h2&gt;

&lt;p&gt;At GitLab, we want everyone to be able to contribute, whether you are working on your first commit and getting familiar with git, or an experienced developer reviewing a stack of changes. Setting up a local development environment, or needing to stash changes and switch branches locally, can add friction to the development process. Using the Web IDE you can change multiple files, preview Markdown, review the changes and commit directly all from a browser. You can even open the diff from a merge request and get a side by side view of the changes. The Web IDE
is generally available in 10.7 and &lt;a href=&quot;#web-ide-is-now-open-source&quot;&gt;is now open source&lt;&#x2F;a&gt;, so everyone can benefit.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;deploy-tokens&quot;&gt;Deploy Tokens&lt;&#x2F;h3&gt;

&lt;p&gt;For any organization working with &lt;a href=&quot;https:&#x2F;&#x2F;www.docker.com&#x2F;what-container&quot;&gt;containers&lt;&#x2F;a&gt;,
their registry is a key component in their infrastructure. It serves as a versioned
repository, providing an easy and secure way of interacting with
your container images. A common use for the registry is to serve images to an orchestrator
like &lt;a href=&quot;https:&#x2F;&#x2F;kubernetes.io&#x2F;&quot;&gt;Kubernetes&lt;&#x2F;a&gt;. It&#x27;s important for Kubernetes to have access on an ongoing basis.
For example, Kubernetes will pull an image on initial deployment, any time a pod restarts, or when scaling additional pods.&lt;&#x2F;p&gt;

&lt;p&gt;Previously there were two ways to grant access to the registry and repository. One way is the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;new_ci_build_permissions_model.html#job-token&quot;&gt;CI job token&lt;&#x2F;a&gt; which provides temporary access for length of the job, after which it expires. &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;personal_access_tokens.html&quot;&gt;Personal Access Tokens&lt;&#x2F;a&gt; provide long term access but are tied to a specific user. When using the CI Job Token, Kubernetes loses access once the CI job has completed, so ongoing events like pod restarts and scaling fail. Using Personal Access Tokens is also undesirable, because access has to be either shared with a user, or a separate service account must be created which takes up a license.&lt;&#x2F;p&gt;

&lt;p&gt;To address these needs more cleanly we have added &lt;a href=&quot;#deploy-tokens&quot;&gt;Deploy Tokens&lt;&#x2F;a&gt;, providing long lived read-only authentication. With a Deploy Token, Kubernetes can now get the images it needs, when it needs them, without being associated with a particular user or having unnecessary access rights.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;cicd-flow-control-based-on-variables&quot;&gt;CI&#x2F;CD flow control based on variables&lt;&#x2F;h3&gt;

&lt;p&gt;A company&#x27;s CI&#x2F;CD service is the engine of their software engineering process,
performing a wide variety of roles from building and testing software, deploying
it to production, and frequently more creative tasks as well. With such a varied
and open-ended set of uses, it is important for users to be able to run specific
jobs only when they need to. GitLab CI&#x2F;CD already provides a rich set of options
for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;jobs&#x2F;job_control.html#specify-when-jobs-run-with-only-and-except&quot;&gt;managing flow control&lt;&#x2F;a&gt;,
but there were some use cases like a nightly build that were not easy to address. In 10.7 jobs can now be
started based on the &lt;a href=&quot;#variables-support-in-only-and-except-keywords&quot;&gt;value of specific variables&lt;&#x2F;a&gt;, enabling new use cases like jobs specific to particular a
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipelines&#x2F;schedules.html&quot;&gt;pipeline schedule&lt;&#x2F;a&gt; or &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;triggers&#x2F;#making-use-of-trigger-variables&quot;&gt;API trigger&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;sast-for-go-and-cc-languages&quot;&gt;SAST for Go and C&#x2F;C++ languages&lt;&#x2F;h3&gt;

&lt;p&gt;As part of &lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;10&#x2F;09&#x2F;gitlab-raises-20-million-to-complete-devops&#x2F;&quot;&gt;Complete DevOps&lt;&#x2F;a&gt;, we are providing a great set of security tools out of the box. &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;application_security&#x2F;sast&#x2F;&quot;&gt;Static Application Security Testing (SAST)&lt;&#x2F;a&gt; analyzes your source code for known vulnerabilities, and outputs the results directly on the merge request for easy review. In order to analyze your code however, SAST needs to have support for your language. For this reason we have been broadening the scope of SAST, and now &lt;a href=&quot;#sast-for-go-and-cc&quot;&gt;support Go and C&#x2F;C++&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_7&#x2F;10_7-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.6.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/04/09/gitlab-10-6-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/04/09/gitlab-10-6-4-released/</id>
<published>2018-04-09T00:00:00+00:00</published>
<updated>2018-04-09T00:00:00+00:00</updated>
<author>
<name>Mayra Cabrera</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.6.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;03&#x2F;22&#x2F;gitlab-10-6-released&#x2F;&quot;&gt;this month&#x27;s 10.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18023&quot;&gt;Fix listing commit branch&#x2F;tags that contain special characters&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17992&quot;&gt;Fix certificate misses intermediates validation error&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18045&quot;&gt;Reference parsing conflicting with auto-linking&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18053&quot;&gt;Fix code quality example documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18034&quot;&gt;Remove jump to discussion button on issues page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17726&quot;&gt;Fix promoting labels and milestones copy text&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18076&quot;&gt;Fix background pipeline stages migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18099&quot;&gt;Free open file descriptors and &lt;code&gt;libgit2&lt;&#x2F;code&gt; buffers in UpdatePagesService&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18098&quot;&gt;Fix wrong error handling in update page service&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18064&quot;&gt;Fix 404 in group boards when moving issue between lists&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;18206&quot;&gt;Override Prometheus service name to fix integration with GitLab.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4966&quot;&gt;Fix Scoped Boards bug filtering by No Milestone&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5158&quot;&gt;Add &lt;code&gt;Gitlab::ExclusiveLease&lt;&#x2F;code&gt; to &lt;code&gt;ObjectStorage#use_file&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17904&quot;&gt;Resolve &quot;Multiple clusters: incorrect cluster details injected - environment scope is ignored&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5007&quot;&gt;Geo: Log JID for sync related jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5171&quot;&gt;Geo: Fix inconsistent project registry queries&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5076&quot;&gt;Geo: Fix project rename when wiki does not exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 10.6.3, 10.5.7, and 10.4.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/04/04/security-release-gitlab-10-dot-6-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/04/04/security-release-gitlab-10-dot-6-dot-3-released/</id>
<published>2018-04-04T00:00:00+00:00</published>
<updated>2018-04-04T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.6.3, 10.5.7, and 10.4.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-issue-comments-in-slack-mattermost-and-webhook-integrations&quot;&gt;Confidential issue comments in Slack, Mattermost, and webhook integrations&lt;&#x2F;h2&gt;

&lt;p&gt;Comments on confidential issues were previously sent to webhooks and integrations when notifications were configured to send notes or comments. This applied to custom webhooks, Slack, and Mattermost notifications.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve introduced a new option to control the sending of confidential notes as well as an option for specifying a different channel for Slack and Mattermost.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.6 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-milestones-data-milestone-id&quot;&gt;Persistent XSS in milestones data-milestone-id&lt;&#x2F;h2&gt;

&lt;p&gt;The milestone dropdown feature contained a persistent XSS issue that is now resolved in the latest release. This issue has been assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-9244&quot;&gt;CVE-2018-9244&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 9.2 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-in-filename-of-merge-request&quot;&gt;Persistent XSS in filename of merge request&lt;&#x2F;h2&gt;

&lt;p&gt;Filenames in the changes tab contained a persistent XSS issue that is now resolved in the latest release. This issue has been assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-9243&quot;&gt;CVE-2018-9243&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;fransrosen&quot;&gt;fransrosen&lt;&#x2F;a&gt; for responsibly reporting this vulnerability to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affects GitLab CE&#x2F;EE 8.4 and up.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes one database migration, which can be run without downtime. This migration adds a column to the
&lt;code&gt;services&lt;&#x2F;code&gt; table. Another background migration is launched to populate this value.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.6.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/29/gitlab-10-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/29/gitlab-10-6-2-released/</id>
<published>2018-03-29T00:00:00+00:00</published>
<updated>2018-03-29T00:00:00+00:00</updated>
<author>
<name>Filipa Lacerda</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.6.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves one regression in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;03&#x2F;22&#x2F;gitlab-10-6-released&#x2F;&quot;&gt;this month&#x27;s 10.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17988&quot;&gt;Cloning a repository over HTTPS with LDAP credentials causes a HTTP 401 Access denied&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17965&quot;&gt;Don&#x27;t capture trailing punctuation when autolinking&lt;&#x2F;a&gt;
    &lt;ul&gt;
      &lt;li&gt;Note: This was released in GitLab Premium and Ultimate in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;tags&#x2F;v10.6.1&quot;&gt;10.6.1&lt;&#x2F;a&gt; by mistake. We are now including it in GitLab Core.&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.6.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/28/gitlab-10-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/28/gitlab-10-6-1-released/</id>
<published>2018-03-28T00:00:00+00:00</published>
<updated>2018-03-28T00:00:00+00:00</updated>
<author>
<name>Filipa Lacerda</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.6.1 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;03&#x2F;22&#x2F;gitlab-10-6-released&#x2F;&quot;&gt;this month&#x27;s 10.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17862&quot;&gt;Prevent auto-retry &lt;code&gt;AccessDenied&lt;&#x2F;code&gt; error from stopping transition to failed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17962&quot;&gt;Fix 500 error when trying to resolve non-ASCII conflicts in the editor&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17890&quot;&gt;Add indexes for user activity queries&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17837&quot;&gt;Add documentation for Runner IP address&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17965&quot;&gt;Don&#x27;t capture trailing punctuation when autolinking&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5003&quot;&gt;Fix LDAP group sync permission override UI&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5063&quot;&gt;Hard failing a mirror no longer fails for a blocked user&#x27;s personal project&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5077&quot;&gt;Define a chat responder for the Slack app&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5069&quot;&gt;Geo: Avoid rescheduling the same project again in a backfill condition&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5104&quot;&gt;Geo: Mark disabled wikis as fully synced.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5119&quot;&gt;Geo: Fix excessive updates to file_registry when wiki is disabled.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5100&quot;&gt;Geo: Recovery from temporary directory doesn&#x27;t work if the namespace directory doesn&#x27;t exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5018&quot;&gt;Geo: Resolve &quot;undefined method &#x27;log_transfer_error&#x27;&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;5058&quot;&gt;Geo: Log Geo Prometheus metrics from the primary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2387&quot;&gt;Pages: if &lt;code&gt;logformat&lt;&#x2F;code&gt; set to &lt;code&gt;json&lt;&#x2F;code&gt;, do not append timestamps with &lt;code&gt;svlogd&lt;&#x2F;code&gt;.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2391&quot;&gt;Downgrade &lt;code&gt;jemalloc&lt;&#x2F;code&gt; to 4.2.1 to avoid segfaults in Ruby&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Summary of limited GitLab credentials exposed in an internal logging system</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/26/summary-of-limited-gitlab-credentials-exposed/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/26/summary-of-limited-gitlab-credentials-exposed/</id>
<published>2018-03-26T00:00:00+00:00</published>
<updated>2018-03-26T00:00:00+00:00</updated>
<author>
<name>Kathy Wang</name>
</author>
<content type='html'>&lt;h2 id=&quot;summary&quot;&gt;Summary&lt;&#x2F;h2&gt;

&lt;p&gt;From February 19, 2018 to March 19, 2018, some GitLab.com personal access tokens and third-party credentials were inadvertently exposed publicly via an unprotected logging dashboard. The affected users represent approximately 0.5 percent of our GitLab.com user base. While the dashboard was originally protected from unauthorized access, a recent configuration change made this internal system publically accessible.&lt;&#x2F;p&gt;



&lt;p&gt;Upon further review, we discovered a limited number of tokens and third-party credentials were incorrectly stored in this system. We’ve already mitigated all issues that led to this exposure. Our audit logs only cover a portion of the time the dashboard was exposed, but only one login resulted in a deep query that resulted in a personal access token being exposed. This activity was positively linked to the user that immediately disclosed the issue to us. As such, we have no evidence that any of the affected credentials were used in a malicious manner.&lt;&#x2F;p&gt;

&lt;p&gt;We have notified the affected users via email to update their credentials and are implementing a series of security enhancements to prevent such issues from happening again. Note that self-managed GitLab customers are entirely unaffected, as their credentials are stored in their own database and this logging functionality is off by default in self-managed instances.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;credentials-written-to-logs&quot;&gt;Credentials written to logs&lt;&#x2F;h2&gt;

&lt;p&gt;On February 28, 2018 we discovered internally that GitLab’s Gitaly service was, in certain circumstances, mishandling the sanitization of private third-party credentials for push-mirrored and imported repositories. These unscrubbed credentials were then sent to our logging system (ELK) and our exception management system (Sentry).&lt;&#x2F;p&gt;

&lt;p&gt;During the investigation, we realized that some other credentials were also leaking into our HAProxy load balancers logs. These were personal access tokens used for GitLab API access when passed via query parameters in an HTTP request. Additionally, credentials that allow access to some third-party Git repositories were leaked into the logs. These have been fixed in the following:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&#x2F;merge_requests&#x2F;624&quot;&gt;Sanitize URLs before logging them&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-cookbooks&#x2F;gitlab_fluentd&#x2F;merge_requests&#x2F;7&quot;&gt;Sanitize private_token field in HA Proxy logs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-cookbooks&#x2F;gitlab-oauth2-proxy&#x2F;merge_requests&#x2F;10&quot;&gt;Reconfigure OAuth mechanism, removing ‘*’ email domain access&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;exposure-of-logs&quot;&gt;Exposure of logs&lt;&#x2F;h2&gt;

&lt;p&gt;On March 19, 2018, GitLab user Ryan Hefner discovered an authentication misconfiguration on our internal logging dashboard. A configuration change was made incorrectly on February 19, 2018, which resulted in potential public read-only access to the centralized, internal logging server for GitLab. This misconfiguration was resolved immediately upon notification.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab uses an OAuth proxy service to authenticate all access to our internal logging infrastructure. Previously, this proxy service had been correctly configured to only allow access to authorized GitLab engineers. However, in the course of migrating this proxy service to our new cloud infrastructure, we inadvertently introduced a misconfiguration that allowed anyone with a valid Google account read-only access to our internal logging server, instead of the intended behavior of allowing only authorized GitLab engineering accounts.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h2&gt;

&lt;p&gt;There is no evidence of user credential abuse. However, the audit logs for the dashboard only cover seven of the 30 days in question. The only audit log activity accessing sensitive information was from the user that immediately reported the issue to GitLab. We found no evidence of abuse against the API itself. Regardless, we are taking every precaution, and strongly recommending all affected Gitlab.com users rotate their personal access tokens. Affected users have received further instructions via email notifications, accordingly.&lt;&#x2F;p&gt;

&lt;p&gt;Although there is no evidence to suggest it happened, in the worst case an attacker could have gained access and obtained personal access tokens used in API calls between February 19, 2018 and March 19, 2018.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mitigations&quot;&gt;Mitigations&lt;&#x2F;h2&gt;

&lt;p&gt;Since the discovery, we have worked to investigate and mitigate all of these related security issues. We are continually improving our security processes and logging mechanisms to ensure that similar incidents will not occur again. These improvements are:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Increase logging retention periods&lt;&#x2F;li&gt;
  &lt;li&gt;Fine-grain access controls to all logging infrastructure&lt;&#x2F;li&gt;
  &lt;li&gt;Regular, periodic audits of all our logs&lt;&#x2F;li&gt;
  &lt;li&gt;Adding mandatory review of any security-relevant changes by a GitLab Application Security engineer&lt;&#x2F;li&gt;
  &lt;li&gt;Document this process in our runbooks to ensure repeatability&lt;&#x2F;li&gt;
  &lt;li&gt;An additional measure we won&#x27;t disclose because informing adversaries could render it less effective&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;If your project or account is affected by this security issue, you will receive an email notification listing affected projects with steps to rotate your personal access tokens. To proactively change them visit this page: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;profile&#x2F;personal_access_tokens&quot;&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;profile&#x2F;personal_access_tokens&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We apologize for the impact this issue has caused our users. GitLab takes your information and your data extremely seriously. We have quadrupled the size of our internal security team in the last six months and have further plans to grow. We will learn from this incident and use it to improve upon our security even further.&lt;&#x2F;p&gt;

&lt;p&gt;In keeping with our company value of transparency we also believe in communicating about such incidents clearly and promptly. If you have any questions, please contact &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#101;&amp;#099;&amp;#117;&amp;#114;&amp;#105;&amp;#116;&amp;#121;&amp;#064;&amp;#103;&amp;#105;&amp;#116;&amp;#108;&amp;#097;&amp;#098;&amp;#046;&amp;#099;&amp;#111;&amp;#109;&quot;&gt;&amp;#115;&amp;#101;&amp;#099;&amp;#117;&amp;#114;&amp;#105;&amp;#116;&amp;#121;&amp;#064;&amp;#103;&amp;#105;&amp;#116;&amp;#108;&amp;#097;&amp;#098;&amp;#046;&amp;#099;&amp;#111;&amp;#109;&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.6 released with CI&#x2F;CD for GitHub and deeper Kubernetes integration</title>
<release>10.6</release>
<link href='https://about.gitlab.com/releases/2018/03/22/gitlab-10-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/22/gitlab-10-6-released/</id>
<published>2018-03-22T00:00:00+00:00</published>
<updated>2018-03-22T00:00:00+00:00</updated>
<author>
<name>Victor Wu</name>
</author>
<content type='html'>&lt;p&gt;Continuous integration, continuous delivery, and continuous deployment form the backbone of modern DevOps. GitLab features built-in CI&#x2F;CD that has received a lot of positive attention from &lt;a href=&quot;http:&#x2F;&#x2F;blog.thehumangeo.com&#x2F;gitlab-autoscale-runners.html&quot;&gt;developers&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;06&#x2F;07&#x2F;continuous-integration-ticketmaster&#x2F;&quot;&gt;enterprises&lt;&#x2F;a&gt;, and &lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;09&#x2F;27&#x2F;gitlab-leader-continuous-integration-forrester-wave&#x2F;&quot;&gt;analysts&lt;&#x2F;a&gt; alike.&lt;&#x2F;p&gt;

&lt;p&gt;But one thing that was missing was that you couldn&#x27;t use GitLab CI&#x2F;CD with GitHub.  Well today, we’ve fixed that.&lt;&#x2F;p&gt;



&lt;h2 class=&quot;intro-header&quot; id=&quot;introducing-gitlab-cicd-for-github&quot;&gt;Introducing GitLab CI&#x2F;CD for GitHub&lt;&#x2F;h2&gt;

&lt;p&gt;While GitLab works best when you use it &lt;a href=&quot;&#x2F;handbook&#x2F;product&#x2F;single-application&#x2F;&quot;&gt;all end-to-end&lt;&#x2F;a&gt;, we also seek to &lt;a href=&quot;&#x2F;direction&#x2F;#plays-well-with-others&quot;&gt;play well with others&lt;&#x2F;a&gt;. In this spirit, we’ve added &lt;a href=&quot;&#x2F;solutions&#x2F;github&#x2F;&quot;&gt;CI&#x2F;CD integration with GitHub&lt;&#x2F;a&gt;, and more generally the ability
to &lt;a href=&quot;#gitlab-cicd-for-external-repos&quot;&gt;integrate CI&#x2F;CD with other external repos&lt;&#x2F;a&gt; like Bitbucket as well. We see four primary audiences that this functionality is designed for. &lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;open-source-projects&quot;&gt;Open source projects&lt;&#x2F;h3&gt;

&lt;p&gt;If you have a public, open source project on GitHub you can now take advantage of free CI&#x2F;CD on GitLab.com. As part of our commitment to open source, we offer all public projects our highest tier features (Gold) for free. While other CI&#x2F;CD vendors limit you to running a handful of concurrent jobs, &lt;a href=&quot;https:&#x2F;&#x2F;GitLab.com&quot;&gt;GitLab.com&lt;&#x2F;a&gt; gives open source projects hundreds of concurrent jobs with 50,000 free CI pipeline minutes per month.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;large-enterprises&quot;&gt;Large Enterprises&lt;&#x2F;h3&gt;

&lt;p&gt;When we talk to our largest customers they tell us that they often have many teams using many different tools. They want to standardize on GitLab for CI&#x2F;CD but code is stored in GitLab, GitHub, and other repos. This feature now allows enterprises to use common CI&#x2F;CD pipelines across all of their different repos. This is a key audience and why we’ve made CI&#x2F;CD for GitHub part of our self-managed Premium plan.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;anyone-using-githubcom&quot;&gt;Anyone using GitHub.com&lt;&#x2F;h3&gt;

&lt;p&gt;While GitLab is designed to use SCM &amp;amp; CI&#x2F;CD in the same application, we understand the appeal of using GitLab CI&#x2F;CD with GitHub version control. So, for the next year we are making the GitLab CI&#x2F;CD for GitHub feature a part of our &lt;a href=&quot;https:&#x2F;&#x2F;GitLab.com&quot;&gt;GitLab.com&lt;&#x2F;a&gt; Free tier. That means anyone using GitHub from personal projects and startups to SMBs can use GitLab CI&#x2F;CD for free. Starting at 2000 free CI pipeline minutes per month, folks can also &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;runners&#x2F;runners_scope.html#specific-runners&quot;&gt;add their own Runners&lt;&#x2F;a&gt; or upgrade plans to get more.&lt;&#x2F;p&gt;

&lt;h3 class=&quot;intro-header-h3&quot; id=&quot;gemnasium-customers&quot;&gt;Gemnasium customers&lt;&#x2F;h3&gt;

&lt;p&gt;We recently &lt;a href=&quot;&#x2F;press&#x2F;releases&#x2F;2018-01-30-gemnasium-acquisition.html&quot;&gt;acquired Gemnasium&lt;&#x2F;a&gt;. While we are super excited about having such a great team join our ranks, we also want to take care of folks that were using Gemnasium and provide them a migration path. We’ve already &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;22&#x2F;gitlab-10-5-released&#x2F;#gemnasium-dependency-checks&quot;&gt;shipped Gemnasium features&lt;&#x2F;a&gt; as part of our built-in security scanning. Now, GitLab CI&#x2F;CD for GitHub allows Gemnasium customers that were using GitHub + Gemnasium to begin using GitLab CI&#x2F;CD for their security needs without needing to migrate their code.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;kubernetes-on-gitlab-keeps-getting-better&quot;&gt;Kubernetes on GitLab keeps getting better&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab continues to invest in integrating with containerization. In 10.4 we release &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;01&#x2F;22&#x2F;gitlab-10-4-released&#x2F;#gitlab-clusters-now-generally-available&quot;&gt;Kubernetes Cluster Integration and GKE Integration to General Availability&lt;&#x2F;a&gt;. With this release, we make it even easier for users to use Kubernetes with GitLab. You can now &lt;a href=&quot;#quick-deploy-of-gitlab-runner-to-kubernetes-cluster&quot;&gt;deploy a GitLab Runner to your connected Kubernetes cluster with a single click&lt;&#x2F;a&gt;. You can also &lt;a href=&quot;#kubernetes-cluster-monitoring&quot;&gt;monitor your connected Kubernetes cluster from within GitLab&lt;&#x2F;a&gt; itself. And you can now also &lt;a href=&quot;#ingress-ip-address-on-kubernetes-cluster-page&quot;&gt;see the IP address of an Ingress controller connected to your Kubernetes cluster&lt;&#x2F;a&gt;, again, right inside GitLab!&lt;&#x2F;p&gt;

&lt;style&gt;
@media (min-width: 768px) {
  .intro-header-h3 {
    font-size: 28px !important;
  }
}
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_6&#x2F;10_6-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Critical Security Release: 10.5.6, 10.4.6, and 10.3.9</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/20/critical-security-release-gitlab-10-dot-5-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/20/critical-security-release-gitlab-10-dot-5-dot-6-released/</id>
<published>2018-03-20T00:00:00+00:00</published>
<updated>2018-03-20T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.5.6, 10.4.6, and 10.3.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;The vulnerability details will be made public on our issue tracker in approximately 30 days.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more information regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-in-services-and-web-hooks&quot;&gt;SSRF in services and web hooks&lt;&#x2F;h2&gt;

&lt;p&gt;There were multiple server-side request forgery issues in the Services feature. An attacker could make requests to servers within the same network of the GitLab instance. This could lead to information disclosure, authentication bypass, or potentially code execution. This issue has been assigned &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2018-8801&quot;&gt;CVE-2018-8801&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;@jobert&lt;&#x2F;a&gt; from &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for reporting this.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Affects GitLab CE&#x2F;EE 8.3 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-auth0-integration-issue&quot;&gt;Gitlab Auth0 integration issue&lt;&#x2F;h2&gt;

&lt;p&gt;There was an issue with the GitLab &lt;code&gt;omniauth-auth0&lt;&#x2F;code&gt; configuration which resulted in the Auth0 integration signing in the wrong users.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;trondhindenes&quot;&gt;Trond Hindenes&lt;&#x2F;a&gt; for reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Affects GitLab CE 8.6 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;update-2018-03-21-700pm-utc&quot;&gt;Update (2018-03-21 7:00PM UTC)&lt;&#x2F;h4&gt;

&lt;p&gt;In order to address the SSRF issue, we created a new checkbox setting to allow outbound requests to local networks (IPv4 and IPv6 private address ranges). This is currently unchecked by default.&lt;&#x2F;p&gt;

&lt;p&gt;The setting is located in &lt;code&gt;Admin area-&amp;gt;Settings-&amp;gt;Outbound Requests&lt;&#x2F;code&gt;. If you need to allow outbound requests to your local network for hooks and services, please enable this checkbox. Note that by checking this, your GitLab instance will be vulnerable to the SSRF issue mentioned above.&lt;&#x2F;p&gt;

&lt;p&gt;To provide a more flexible and improved solution, we may add a configurable whitelist at a future date.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;update-2018-03-23-900am-utc&quot;&gt;Update (2018-03-23 9:00AM UTC)&lt;&#x2F;h4&gt;

&lt;p&gt;If you are currently using Auth0, the configuration will need to be updated slightly.&lt;&#x2F;p&gt;

&lt;p&gt;Check the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;auth0.html&quot;&gt;Auth0 integration documentation&lt;&#x2F;a&gt; for the correct syntax.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.5.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/19/gitlab-10-5-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/19/gitlab-10-5-5-released/</id>
<published>2018-03-19T00:00:00+00:00</published>
<updated>2018-03-19T00:00:00+00:00</updated>
<author>
<name>Ian Baum</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.5.5 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;22&#x2F;gitlab-10-5-released&#x2F;&quot;&gt;this month&#x27;s 10.5 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17576&quot;&gt;Fix delete milestone button showing up for all users&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17632&quot;&gt;Add index on section_name_id on ci_build_trace_sections table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17563&quot;&gt;Adding missing indexes migrations from taggings table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17685&quot;&gt;Fix code and wiki search results when filename is non-ASCII&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17658&quot;&gt;Fix moving local, unhashed upload or pages directories during group transfer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4927&quot;&gt;Geo: Fix Wiki resync when Wiki repository does not exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2349&quot;&gt;Resolve &quot;consul service postgresql_service failing on db host - no access to &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;node&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does include new migrations.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing March 20, 2018 Critical Security Update</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/16/gitlab-critical-release-preannouncement/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/16/gitlab-critical-release-preannouncement/</id>
<published>2018-03-16T00:00:00+00:00</published>
<updated>2018-03-16T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;On Tuesday, March 20th, 2018 at 23:59 UTC, we will publish a critical GitLab
security update. More details will be forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;, including which
versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.5.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/09/gitlab-10-5-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/09/gitlab-10-5-4-released/</id>
<published>2018-03-09T00:00:00+00:00</published>
<updated>2018-03-09T00:00:00+00:00</updated>
<author>
<name>Mark Fletcher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.5.4 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;22&#x2F;gitlab-10-5-released&#x2F;&quot;&gt;this month&#x27;s 10.5 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17183&quot;&gt;Fix for &quot;Leave Group&quot; functionality&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17291&quot;&gt;Fix encoding error when copying Git attributes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17293&quot;&gt;Gitaly fix for when &lt;code&gt;GRPC::Unavailable&lt;&#x2F;code&gt; encountered&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17312&quot;&gt;Fix bug for displaying issues and merge requests in groups&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17313&quot;&gt;Fix issue with trace artifact migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17360&quot;&gt;Fix bug for issue edit shortcut&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17372&quot;&gt;Fix for Prometheus Cluster application&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17377&quot;&gt;Fix bug when editing Prometheus Service template&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17413&quot;&gt;Fix bug when searching for code or wiki files containing non-ASCII data&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17419&quot;&gt;Fix for open-ended parameter&#x27;s in lograge causing elastic memory issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17462&quot;&gt;Performance improvements for Todos&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17476&quot;&gt;Fix performance regression introduced by Snippets changes&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4495&quot;&gt;Fix bug for Merge Request approvals&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4747&quot;&gt;Resolve &quot;&lt;code&gt;RepositoryRemoveRemoteWorker.perform_async&lt;&#x2F;code&gt; being called from transaction&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4624&quot;&gt;Fix for object storage migrate&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4757&quot;&gt;Mark empty repos as synced in Geo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4761&quot;&gt;Updates for Geo file transfer log&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4677&quot;&gt;Fix bug for Geo WikiSyncService when attempting to sync projects that have no Wiki&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4727&quot;&gt;Synchronisation fixes for Geo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2327&quot;&gt;Fix bug where Let&#x27;s Encrypt integration does not serve intermediate certificate&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include new migrations.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 10.5.3, 10.4.5, 10.3.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/03/06/security-10-5-3-plus-10-4-5-plus-10-3-8-1st-blog-post/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/03/06/security-10-5-3-plus-10-4-5-plus-10-3-8-1st-blog-post/</id>
<published>2018-03-06T00:00:00+00:00</published>
<updated>2018-03-06T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.5.3, 10.4.5, and 10.3.8 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;



&lt;p&gt;This security release blog post is the first part of two. The second blog will be posted in approximately 30 days, and it will detail the vulnerability findings.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details regarding this release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;2fa-weakness&quot;&gt;2FA weakness&lt;&#x2F;h2&gt;

&lt;p&gt;The two factor authentication feature contained a security weakness
potentially resulting in abuse of recovery codes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 7.4.0 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;geo-failover-weak-file-permissions&quot;&gt;Geo: failover weak file permissions&lt;&#x2F;h2&gt;

&lt;p&gt;A weak file permissions issue affecting the GitLab Geo feature was discovered which could potentially result in low-privileged users triggering a failover.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab EE 8.7.0 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;For existing installations, you will need to edit the PostgreSQL &lt;code&gt;recovery.conf&lt;&#x2F;code&gt; file (in Omnibus GitLab it&#x27;s located at &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;postgresql&#x2F;data&#x2F;recovery.conf&lt;&#x2F;code&gt;) for all Geo secondary nodes:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;trigger_file&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&#x2F;tmp&#x2F;postgresql.trigger&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# &amp;lt;- remove this line&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;We strongly recommend that all installations running an affected version above be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-gitlab-pages&quot;&gt;Open redirect GitLab Pages&lt;&#x2F;h2&gt;

&lt;p&gt;An open redirect issue was discovered on GitLab Pages which could result in assisting phishing campaigns to have a more trustworthy appearance.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;pankajj736&quot;&gt;pankajj736&lt;&#x2F;a&gt; on HackerOne for reporting this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 10.3 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-authorization-group-lock&quot;&gt;Improper authorization group lock&lt;&#x2F;h2&gt;

&lt;p&gt;The group lock feature contained an improper authorization issue which could result in accidental sharing of a project.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.5 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;push-rules-denial-of-service&quot;&gt;Push rules denial of service&lt;&#x2F;h2&gt;

&lt;p&gt;A lack of input validation issue was discovered in the push rules feature which could result in a denial of service of the platform.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab EE 9.1 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-ids&quot;&gt;CVE IDs&lt;&#x2F;h3&gt;

&lt;p&gt;We are working on obtaining CVE numbers for these vulnerabilities and will update the blog post accordingly when we&#x27;ve obtained that information.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.5.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/02/27/gitlab-10-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/27/gitlab-10-5-2-released/</id>
<published>2018-02-27T00:00:00+00:00</published>
<updated>2018-02-27T00:00:00+00:00</updated>
<author>
<name>Mark Fletcher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.5.2 for GitLab Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;22&#x2F;gitlab-10-5-released&#x2F;&quot;&gt;this month&#x27;s 10.5 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-community-edition-and-enterprise-edition&quot;&gt;GitLab Community Edition and Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Available in GitLab Core, Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17140&quot;&gt;Avoid slow File Lock checks when not used&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17098&quot;&gt;Only check LFS integrity for first branch in push&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17053&quot;&gt;Fix bug for MR stating &quot;Could not connect to the CI server&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17267&quot;&gt;Fix bug when loading an invalid upload URL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17268&quot;&gt;Fix bug when checking for a repo in GitAccessWiki&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17302&quot;&gt;Enable &quot;Legacy Authorization&quot; by default when creating a Cluster on GCP&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17217&quot;&gt;Fix stacked progress bar bug&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17200&quot;&gt;Fix bug when attempting to update tracked field for read-only DB&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17231&quot;&gt;Fix bug to allow branchnames to be named the same as the commit it points to&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17235&quot;&gt;Fix bug for sidekiq metrics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17260&quot;&gt;Fix issue with CI cache key being empty when variable used as the key&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17228&quot;&gt;Fix bug where diff errors displayed unnecessarily&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17088&quot;&gt;Improve query performance for &lt;code&gt;Dashboard::SnippetsController#index&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17190&quot;&gt;Performance improvements when searching for Project members&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17158&quot;&gt;Improve performance of searching for and auto completing of users&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17213&quot;&gt;Performance improvements regarding feature flags&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in GitLab Starter, Premium, and Ultimate:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4621&quot;&gt;Fix performance bar bug&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Available in &lt;a href=&quot;&#x2F;pricing&#x2F;premium&#x2F;&quot;&gt;GitLab Premium&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;ultimate&#x2F;&quot;&gt;Ultimate&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4588&quot;&gt;Fix Geo bug uninitialized constant &lt;code&gt;Gitlab::Geo::SignatureTimeInvalidError&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab&quot;&gt;Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2309&quot;&gt;Fix bug where &lt;code&gt;nginx[&#x27;redirect_http_to_https&#x27;&lt;&#x2F;code&gt; is ignored&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2292&quot;&gt;Geo: Support a custom database login for PostgreSQL FDW to work with pgbouncer&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does include new migrations, but should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-subscriptions&quot;&gt;GitLab subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;Access to GitLab Starter, Premium, and Ultimate features is granted by a paid &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;sign up for GitLab.com&lt;&#x2F;a&gt;
to use GitLab&#x27;s own infrastructure.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.5.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/02/22/gitlab-10-5-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/22/gitlab-10-5-1-released/</id>
<published>2018-02-22T00:00:00+00:00</published>
<updated>2018-02-22T00:00:00+00:00</updated>
<author>
<name>Ian Baum</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.5.1 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a regression in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;22&#x2F;gitlab-10-5-released&#x2F;&quot;&gt;this month&#x27;s 10.5 release&lt;&#x2F;a&gt;. This issue only potentially affects instances being upgraded that are using
a non-default value for &lt;code&gt;git_data_dirs&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;omnibus&quot;&gt;Omnibus:&lt;&#x2F;h2&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;3188&quot;&gt;General 500 error after 10.5 update&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.5 released with Let&#x27;s Encrypt integration, Gemnasium dependency checks, and CI&#x2F;CD external files</title>
<release>10.5</release>
<link href='https://about.gitlab.com/releases/2018/02/22/gitlab-10-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/22/gitlab-10-5-released/</id>
<published>2018-02-22T00:00:00+00:00</published>
<updated>2018-02-22T00:00:00+00:00</updated>
<author>
<name>Fabio Busatto</name>
</author>
<content type='html'>&lt;p&gt;In this month’s release of GitLab 10.5 we’ve added capabilities to encrypt GitLab traffic easily, improve application security, scaling CI&#x2F;CD management, and so much more.&lt;&#x2F;p&gt;



&lt;h2 class=&quot;intro-header&quot; id=&quot;secure-gitlab-deployments-in-less-time&quot;&gt;Secure GitLab deployments in less time&lt;&#x2F;h2&gt;

&lt;p&gt;HTTPS is a pillar of internet security and a must-have if your GitLab instance is exposed to the public internet. It provides two key benefits. First, traffic is encrypted to and from the server, protecting credentials and other sensitive data from potential eavesdropping. Second, it allows users to verify the site identity. Without a verified identity it&#x27;s possible for users to log into the wrong site. These capabilities are particularly important for mobile and remote users, who often use public unsecured Wi-Fi increasing the risk of snooping or interacting with a malicious site.&lt;&#x2F;p&gt;

&lt;p&gt;Although HTTPS provides great security, setting up HTTPS and requesting certificates can be a hassle involving credit cards and key management.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;letsencrypt.org&#x2F;&quot;&gt;Let’s Encrypt&lt;&#x2F;a&gt; is a free, automated, and open certificate authority. With GitLab 10.5 we’ve added &lt;a href=&quot;#instant-ssl-with-lets-encrypt-for-gitlab&quot;&gt;Let’s Encrypt integration&lt;&#x2F;a&gt;, allowing you to enable instant SSL certificates with a single option. Enabling Let’s Encrypt on your GitLab instance ensures traffic to your GitLab instance is encrypted and the identity of your site is verified. The Let’s Encrypt integration is available on both paid and open source GitLab.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;scale-your-pipeline-management&quot;&gt;Scale your pipeline management&lt;&#x2F;h2&gt;

&lt;p&gt;Today, we’re releasing a simple feature with powerful implications.&lt;&#x2F;p&gt;

&lt;p&gt;Running DevOps in an enterprise environment comes with some unique challenges. For many of our largest customers, the DevOps team is responsible for providing CI&#x2F;CD pipelines to a large number of development teams throughout the organization. Previously, this was a painful process to manage. There wasn’t a scalable way to distribute reusable pipeline configuration which meant code needed to be manually copied between multiple &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; files in multiple projects. This was a labor-intensive and error-prone process. Additionally, it didn&#x27;t provide adequate controls to ensure testing and deployment is consistently enforced for each repo.&lt;&#x2F;p&gt;

&lt;p&gt;Starting with 10.5, you can now &lt;a href=&quot;#include-external-files-in-cicd-pipeline-definition&quot;&gt;include external files in CI&#x2F;CD pipeline definition&lt;&#x2F;a&gt;. Included files can be either local (contained in the same repo) or remote (accessible via HTTP&#x2F;HTTPS).  Including local files allows a large and complex &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; to be broken up in to modular chunks that are easier to maintain. Remote files allow these modular chunks to be distributed across thousands (or potentially millions) of repositories. Now there’s a simple, consistent, and maintainable way to distribute pipeline configuration.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;better-security-testing-with-gemnasium&quot;&gt;Better security testing with Gemnasium&lt;&#x2F;h2&gt;

&lt;p&gt;Less than a month ago, &lt;a href=&quot;&#x2F;press&#x2F;releases&#x2F;2018-01-30-gemnasium-acquisition.html&quot;&gt;GitLab acquired Gemnasium&lt;&#x2F;a&gt;. As promised, we haven’t wasted any time in bringing Gemnasium’s advanced dependency-checking functionality to GitLab users. Often, when companies make acquisitions, they tend to create bolt-on additions or package functionality as separate offerings. GitLab’s vision is to provide a &lt;a href=&quot;&#x2F;direction&#x2F;#single-application&quot;&gt;single application architecture&lt;&#x2F;a&gt; so that dev, QA, security, and ops can work concurrently off the same data in the same interface. In this spirit we’ve &lt;a href=&quot;#gemnasium-dependency-checks&quot;&gt;integrated Gemnasium’s technology&lt;&#x2F;a&gt; seamlessly into GitLab CI&#x2F;CD, supercharging security testing.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to advanced algorithms and a larger vulnerability database, GitLab now provides more complete results in JavaScript, Ruby, and Python. We’ve also added PHP and Java support so you have five languages total.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;see-all-the-features&quot;&gt;See all the features&lt;&#x2F;h2&gt;

&lt;p&gt;This post highlights 26 enhancements (18 of which are available in open source GitLab!) For the full list of improvements see the &lt;a href=&quot;#changelog&quot;&gt;changelog&lt;&#x2F;a&gt;. Or read on to learn more about all of the key features shipped in 10.5!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_5&#x2F;10_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Pages Security Fix Notification</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/02/21/pages-security-fix-rollout/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/21/pages-security-fix-rollout/</id>
<published>2018-02-21T00:00:00+00:00</published>
<updated>2018-02-21T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;On February 5, we disabled the ability to add custom domains in GitLab Pages due to security concerns. Today, we have re-enabled that ability after deploying a feature that requires GitLab.com users to verify ownership of the domains. Users can now once again configure domains and update TLS certificates.&lt;&#x2F;p&gt;



&lt;p&gt;To learn more about the original issue please view the &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;05&#x2F;gitlab-pages-custom-domain-validation&#x2F;&quot;&gt;previous post&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;user-impact&quot;&gt;User impact&lt;&#x2F;h1&gt;

&lt;p&gt;Upon adding a custom domain to their Pages site, users are now &lt;strong&gt;required&lt;&#x2F;strong&gt; to verify domain ownership by adding a DNS TXT record containing a token generated by GitLab. This ensures the domain is controlled by that user when GitLab Pages checks for the existence of that TXT record containing the token. When updating DNS records, it may take time for it to fully propagate (sometimes up to 24-48 hours).&lt;&#x2F;p&gt;

&lt;p&gt;Once a custom domain has been added and verified, GitLab Pages will periodically need to re-verify these TXT records. This is handled automatically and is necessary for validating the user maintains ownership of that domain.&lt;&#x2F;p&gt;

&lt;p&gt;Current custom domain users will be &lt;strong&gt;required&lt;&#x2F;strong&gt; to verify ownership of their existing domain within a 30-day grace period.&lt;&#x2F;p&gt;

&lt;p&gt;Unverified custom domains cannot be claimed by a repository. If previously claimed and unable to be re-verified within 7 days, the custom domain will be relinquished.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;timeline-of-issues-and-mitigation&quot;&gt;Timeline of issues and mitigation&lt;&#x2F;h1&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;2017-12-11 - HackerOne Researcher bnchandrapal discloses &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;296907&quot;&gt;first report&lt;&#x2F;a&gt;, we decide not to fix anything at this time.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-01 - GitLab and HackerOne Researcher bnchandrapal agree to publicly disclose the &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;296907&quot;&gt;first report&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-04 - HackerOne Researcher &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;edoverflow&quot;&gt;edoverflow&lt;&#x2F;a&gt; submits &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;312118&quot;&gt;second report&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-05 - GitLab posts &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;02&#x2F;05&#x2F;gitlab-pages-custom-domain-validation&#x2F;&quot;&gt;blog post&lt;&#x2F;a&gt; to inform customers of the &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;296907&quot;&gt;security issue and current plan&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-08 - GitLab awards HackerOne researcher &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;edoverflow&quot;&gt;edoverflow&lt;&#x2F;a&gt; a high severity bounty for the &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;312118&quot;&gt;second report&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-12 - &lt;a href=&quot;https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16358544&quot;&gt;HackerNews reports&lt;&#x2F;a&gt; on the GitLab blog post.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-12 - GitLab awards HackerOne researcher bnchandrapal a high severity bounty for the &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;296907&quot;&gt;first report&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-20 - Per blog post, GitLab planned to roll out the domain ownership verification mechanism to mitigate the &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;296907&quot;&gt;first report&lt;&#x2F;a&gt;; however, the fix requires additional testing&#x2F;verification.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-21 - GitLab makes &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;312118&quot;&gt;second report&lt;&#x2F;a&gt; by researcher &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;edoverflow&quot;&gt;edoverflow&lt;&#x2F;a&gt; public.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-02-21 - GitLab begins phased rollout of domain ownership verification mechanism.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;2018-03-01 - Estimated date of completion for the domain ownership verification mechanism rollout.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.4.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/02/16/gitlab-10-dot-4-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/16/gitlab-10-dot-4-dot-4-released/</id>
<published>2018-02-16T00:00:00+00:00</published>
<updated>2018-02-16T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing GitLab version 10.4.4.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;01&#x2F;22&#x2F;gitlab-10-4-released&#x2F;&quot;&gt;this month&#x27;s 10.4
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16795&quot;&gt;Fix 500 error when loading a merge request with an invalid comment.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16854&quot;&gt;Cleanup new branch&#x2F;merge request form in issues.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16877&quot;&gt;Fix GitLab import leaving group_id on ProjectLabel.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16881&quot;&gt;Fix forking projects when no restricted visibility levels are defined application-wide.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17019&quot;&gt;Resolve PrepareUntrackedUploads PostgreSQL syntax error.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;17054&quot;&gt;Fixed error 500 when removing an identity with synced attributes and visiting the profile page.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Validate user namespace before saving so that errors persist on model.&lt;&#x2F;li&gt;
  &lt;li&gt;LDAP Person no longer throws exception on invalid entry.&lt;&#x2F;li&gt;
  &lt;li&gt;Fix JIRA not working when a trailing slash is included.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16807&quot;&gt;Update Nokogiri to 1.8.2.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP&#x2F;EEU:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4206&quot;&gt;Handle empty event timestamp and larger memory units.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP&#x2F;EEU:&lt;&#x2F;strong&gt; Allow project to be set up to push to and pull from same mirror.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP&#x2F;EEU:&lt;&#x2F;strong&gt; Geo: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4144&quot;&gt;Fix log cursor failing to process a CI job artifact event&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP&#x2F;EEU:&lt;&#x2F;strong&gt; Geo: Reset force_redownload flag after successful sync.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP&#x2F;EEU:&lt;&#x2F;strong&gt; Geo: Fix redownload repository recovery when there is no local repository.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes one new migration, and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 10.4.3, 10.3.7, and 10.2.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/02/07/gitlab-security-10-4-3-plus-10-3-7-plus-10-2-8-blog/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/07/gitlab-security-10-4-3-plus-10-3-7-plus-10-2-8-blog/</id>
<published>2018-02-07T00:00:00+00:00</published>
<updated>2018-02-07T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.4.3, 10.3.7, and 10.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;This security release blog post is the first part of two. The second blog will be posted in approximately 30 days, and it will detail the vulnerability findings.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details regarding this release.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;snippetfinder-information-disclosure&quot;&gt;SnippetFinder information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab SnippetFinder component contained an information disclosure which allowed access to snippets restricted to &lt;code&gt;Only team members&lt;&#x2F;code&gt; or configured as &lt;code&gt;disabled&lt;&#x2F;code&gt;. The issue is now resolved in the latest version.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 7.4.0 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ldap-api-authorization-issue&quot;&gt;LDAP API authorization issue&lt;&#x2F;h2&gt;

&lt;p&gt;An LDAP API endpoint contained an authorization vulnerability which unintentionally disclosed bulk LDAP groups data. This issue is now fixed in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 6.1.0 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-mermaid-markdown&quot;&gt;Persistent XSS mermaid markdown&lt;&#x2F;h2&gt;

&lt;p&gt;The mermaid markdown feature contained a persistent XSS issue that is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;totally_unknown&quot;&gt;Nils Juenemann&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 10.3 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;insecure-direct-object-reference-todo-api&quot;&gt;Insecure direct object reference Todo API&lt;&#x2F;h2&gt;

&lt;p&gt;The Todo API was vulnerable to an insecure direct object reference issue which resulted in an information disclosure of confidential data.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.5 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-import-access-control-issue&quot;&gt;GitHub import access control issue&lt;&#x2F;h2&gt;

&lt;p&gt;An improper access control weakness issue was discovered in the GitHub import feature. The issue allowed an attacker to create projects under other accounts which they shouldn&#x27;t have access to. The issue is now resolved in the latest version.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.1 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;protected-variables-information-disclosure&quot;&gt;Protected variables information disclosure&lt;&#x2F;h2&gt;

&lt;p&gt;The CI jobs protected tag feature contained a vulnerability which resulted in an information disclosure of protected variables. The issue is now resolved in the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Wes Cossick of &lt;a href=&quot;https:&#x2F;&#x2F;www.sparksuite.com&#x2F;&quot;&gt;Sparksuite&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.1 and up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-ids&quot;&gt;CVE IDs&lt;&#x2F;h3&gt;

&lt;p&gt;We are working on obtaining CVE numbers for these vulnerabilities and will update the blog post accordingly when we&#x27;ve obtained that information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Pages Security Issue Notification</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/02/05/gitlab-pages-custom-domain-validation/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/02/05/gitlab-pages-custom-domain-validation/</id>
<published>2018-02-05T00:00:00+00:00</published>
<updated>2018-02-05T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;h2 id=&quot;issue-summary&quot;&gt;Issue Summary&lt;&#x2F;h2&gt;

&lt;p&gt;When a user adds a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;pages&#x2F;custom_domains_ssl_tls_certification&#x2F;index.html#adding-your-custom-domain-to-gitlab-pages&quot;&gt;custom domain&lt;&#x2F;a&gt; to their Pages site, no validation was being performed to ensure the domain was owned by that user. This issue allows an attacker to discover DNS records already pointing to the GitLab Page IP address which haven&#x27;t been claimed and potentially hijack them. This issue impacts all users who have created and then deleted custom domains using GitLab Pages, but still have the DNS records active.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;customer-remediation-steps&quot;&gt;Customer Remediation Steps&lt;&#x2F;h2&gt;

&lt;p&gt;Our customers should check if they are using the GitLab Pages service with a custom domain and review their DNS records which point to the GitLab Pages IP &lt;code&gt;52.167.214.135&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you notice any of your DNS records pointing to that IP address and you&#x27;re no longer using or intending to use the Gitlab Pages service, please remove those specific DNS records.&lt;&#x2F;p&gt;

&lt;p&gt;If you are intending to use the GitLab Pages service and notice that your custom domain has already been claimed or &quot;hijacked&quot;, please contact us at security@gitlab.com.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-remediation-strategy&quot;&gt;GitLab Remediation Strategy&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve currently disabled the feature to add custom domains until we&#x27;ve deployed the patch. In the meantime, the GitLab team is working to provide a more complete &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29497&quot;&gt;validation&lt;&#x2F;a&gt; of custom domains in the GitLab Pages service as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;Our mitigation strategy will consist of implementing domain verification mechanisms on all new and existing GitLab Pages domains, utilizing checks on customer DNS TXT records. This mechanism will be detailed in GitLab Pages documentation when implemented.&lt;&#x2F;p&gt;

&lt;p&gt;There will be a transition plan for current customers once the domain verification mechanisms are active. Stay tuned for further details.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;update-2018-02-07-1000pm-utc&quot;&gt;Update (2018-02-07 10:00PM UTC)&lt;&#x2F;h4&gt;

&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29497&quot;&gt;issue&lt;&#x2F;a&gt; referenced above is currently confidential and will be made public after the fix is implemented in 10.5.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;update-2018-02-14-700pm-utc&quot;&gt;Update (2018-02-14 7:00PM UTC)&lt;&#x2F;h4&gt;

&lt;p&gt;The domain verification mechanism will be deployed by the 20th of February in the 10.4 security release. The feature to add custom domains will be re-enabled, and once again users will be able to configure domains and update TLS certificates.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;update-2018-02-21-1200am-utc&quot;&gt;Update (2018-02-21 12:00AM UTC)&lt;&#x2F;h4&gt;

&lt;p&gt;The domain verification mechanism rollout will be phased, starting with GitLab.com, beginning on 2&#x2F;21. We expect that rollout will be completed end of week 2&#x2F;26, based on current projections.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.4.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/31/gitlab-10-dot-4-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/31/gitlab-10-dot-4-dot-2-released/</id>
<published>2018-01-31T00:00:00+00:00</published>
<updated>2018-01-31T00:00:00+00:00</updated>
<author>
<name>Mark Fletcher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing GitLab version 10.4.2.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;01&#x2F;22&#x2F;gitlab-10-4-released&#x2F;&quot;&gt;this month&#x27;s 10.4
release&lt;&#x2F;a&gt; and prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15804&quot;&gt;Fix bugs preventing copy&#x2F;paste on iOS&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16618&quot;&gt;Fix Gitlab::Database::Grant.create_and_execute_trigger? so it uses has_table_privilege() on PostgreSQL&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16637&quot;&gt;Fix bug for Gitaly::CommitService: Encoding::UndefinedConversionError&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16531&quot;&gt;Fix bug in security release with deploy keys migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16740&quot;&gt;Fix bug regarding cleaning runner cache on Windows&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16714&quot;&gt;Fix bug for project import failures&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16724&quot;&gt;Fix bug in webpack_helper&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16485&quot;&gt;Fix visibility of &quot;Allow users to request access&quot; option in public projects&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4082&quot;&gt;Fix cancelling of board settings modal&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4229&quot;&gt;Fix bugs when moving an issue&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4196&quot;&gt;Fix bugs with Admin Dashboard view&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4236&quot;&gt;Fix incorrect OPENSSH_EXPECTED_COMMAND on gitlab:geo:check task&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4249&quot;&gt;Fix high rate of config.lock file errors on Geo testbed&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4278&quot;&gt;Fix bugs with issue ordering in Epics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4142&quot;&gt;Fix Epic issue item reordering to handle different scenarios&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.4.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/26/gitlab-10-dot-4-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/26/gitlab-10-dot-4-dot-1-released/</id>
<published>2018-01-26T00:00:00+00:00</published>
<updated>2018-01-26T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing GitLab version 10.4.1.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;01&#x2F;22&#x2F;gitlab-10-4-released&#x2F;&quot;&gt;this month&#x27;s 10.4
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16242&quot;&gt;Ensure that users can reclaim a namespace or project path that is blocked by an orphaned route&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16560&quot;&gt;Correctly escape UTF-8 path elements for uploads&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16584&quot;&gt;Fix issues when rendering groups and their children&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16595&quot;&gt;Fix bug in which projects with forks could not change visibility settings from Private to Public&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16601&quot;&gt;Fix Error 500 when repository has no avatar&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16518&quot;&gt;Add a confirmation when navigating away from an unsaved inline edit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16211&quot;&gt;Rework indexes on &lt;code&gt;redirect_routes&lt;&#x2F;code&gt;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16520&quot;&gt;Remove unnecessary query from labels dropdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4080&quot;&gt;Web IDE is now EEU-only&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4186&quot;&gt;Fix route for Geo &#x27;Repair authentication&#x27;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4202&quot;&gt;Fix failed LDAP logins when &lt;code&gt;sync_ssh_keys&lt;&#x2F;code&gt; is included in config&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-omnibus-gitlab&quot;&gt;Bug fixes for Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2233&quot;&gt;Update gitlab-monitor to 2.5.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2232&quot;&gt;Add GitLab pages status page configuration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes one new migration, and should &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;not require any
downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/23/gitlab-10-dot-3-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/23/gitlab-10-dot-3-dot-6-released/</id>
<published>2018-01-23T00:00:00+00:00</published>
<updated>2018-01-23T00:00:00+00:00</updated>
<author>
<name>Tiago Botelho</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing GitLab version 10.3.6.&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;01&#x2F;18&#x2F;gitlab-10-3-5-released&#x2F;&quot;&gt;this month&#x27;s 10.3.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16537&quot;&gt;Fix Mermaid drawings not loading on some browsers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16356&quot;&gt;Resolve &quot;Incorrect default merge request title when Jira activated&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16440&quot;&gt;Prevent RevList failing on non UTF8 paths&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16422&quot;&gt;Set target_branch to the ref branch when creating MR from issue&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16397&quot;&gt;Fix Route validation when conflicting permanent redirects exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16427&quot;&gt;Fixing request json mime type&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16237&quot;&gt;Fix 500 error when visiting a commit where the blobs do not exist (nil blobs)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16280&quot;&gt;Fix hooks not being set up properly for bare import Rake task&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16244&quot;&gt;Fix custom name in branch creation for issue in Firefox&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16205&quot;&gt;Prevent excessive DB load due to faulty DeleteConflictingRedirectRoutesRange background migration&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16197&quot;&gt;Fixing bug related to wiki last version&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16115&quot;&gt;Resolve &quot;gitlab-rake gitlab:import:repos schedules an import&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16281&quot;&gt;Fix changes dropdown ellipsis working across browsers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16193&quot;&gt;Resolve &quot;Error 500 trying to view a merge request JSON: undefined method binary? for nil:NilClass&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16243&quot;&gt;Resolve &quot;Branch name omitted due to bad UTF-8 conversion by Gitaly ref handler&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16188&quot;&gt;Do not run ee_compat_check on security branches&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16214&quot;&gt;Avoid leaving a push event empty if payload cannot be created&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16175&quot;&gt;Update prometheus gem to version that publishes +Inf bucket in accordance with Prometheus docs.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16068&quot;&gt;Fixed abuse reports link url&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16123&quot;&gt;Gracefully handle garbled URIs in Markdown&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16106&quot;&gt;Clarify Auto DevOps pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16019&quot;&gt;Refactor user, project and group docs when changing namespace&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16058&quot;&gt;Add CI YML example for Browser Performance Testing in CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16001&quot;&gt;Fix shortcut links on help page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3836&quot;&gt;Mention Auto SAST in merge request SAST docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3800&quot;&gt;Multiple kubernetes clusters documentation&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3852&quot;&gt;Add Browser Performance Testing docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4059&quot;&gt;Resolve &quot;Fix Geo::RepositoriesCleanUpWorker to work with hashed storage&quot;&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3870&quot;&gt;Update dashboard image&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;4112&quot;&gt;Fix JS bundle not running on the Cluster update&#x2F;destroy pages&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3987&quot;&gt;Fix 500 error when visiting a commit where the blobs do not exist (nil blobs)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3872&quot;&gt;Clarify Auto DevOps pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3742&quot;&gt;Replace explicit service configuration with roles&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3841&quot;&gt;Use &#x27;preload&#x27; in export to CSV&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3802&quot;&gt;Improve bidirectional mirroring docs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-omnibus-gitlab&quot;&gt;Bug fixes for Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2183&quot;&gt;Specify initial tag of QA image for pushing to dockerhub&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2185&quot;&gt;Use dash instead of spaces in cache keys and build jobs&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;not require any
downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.4 released with Dynamic Application Security Testing and Web IDE (beta)</title>
<release>10.4</release>
<link href='https://about.gitlab.com/releases/2018/01/22/gitlab-10-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/22/gitlab-10-4-released/</id>
<published>2018-01-22T00:00:00+00:00</published>
<updated>2018-01-22T00:00:00+00:00</updated>
<author>
<name>James Ramsay</name>
</author>
<content type='html'>&lt;p&gt;In this month&#x27;s release of GitLab 10.4 – the first of 2018 – we&#x27;ve added
capabilities to improve planning, testing, merge requests, and deployment. This
release also includes new security testing capabilities and the first iteration of
our Web IDE, part of our ambitious product vision for
&lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;10&#x2F;11&#x2F;from-dev-to-devops&#x2F;&quot;&gt;Complete DevOps&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 class=&quot;intro-header&quot; id=&quot;security-testing&quot;&gt;Security testing&lt;&#x2F;h2&gt;

&lt;p&gt;As part of Complete Devops, we want to offer powerful security tools out of the
box. We recently released static application security testing and are now
expanding that with
&lt;a href=&quot;#dynamic-application-security-testing-dast&quot;&gt;Dynamic Application Security Testing (DAST)&lt;&#x2F;a&gt;
and
&lt;a href=&quot;#sast-for-docker-containers&quot;&gt;Static Application Security Testing (SAST) for Docker Containers&lt;&#x2F;a&gt;.
DAST, SAST for Docker Containers, and Browser Performance Testing have also
been added as a best practice to Auto DevOps.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;faster-editing&quot;&gt;Faster editing&lt;&#x2F;h2&gt;

&lt;p&gt;&quot;If you can do it in less than two minutes, do it now&quot; states the two-minute
rule of &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Getting_Things_Done&quot;&gt;Getting Things Done&lt;&#x2F;a&gt;.
Writing a small fix or correcting a typo should be fast, but this is rarely the
case when we need to stash changes and switch to a different context.&lt;&#x2F;p&gt;

&lt;p&gt;Delaying a fix or waiting to address feedback on a merge request increases
cycle time, and it&#x27;s even worse for distributed teams where hours quickly become days,
all for avoiding a &lt;code&gt;git stash&lt;&#x2F;code&gt;. The &lt;a href=&quot;#web-ide-editor-beta&quot;&gt;new editor&lt;&#x2F;a&gt;, which is
the first release of the GitLab Web IDE,
makes it easier to contribute changes like these from the GitLab interface.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;see-all-the-features&quot;&gt;See all the features&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve also shipped many exciting improvements this month to Epics, Merge
Requests, Geo, Runner, Git LFS, SSH, Monitoring, and Auto DevOps.&lt;&#x2F;p&gt;

&lt;p&gt;Read on to learn more about all of the key features shipped in 10.4!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_4&#x2F;10_4-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.3.5, 10.2.7, and 10.1.7 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/18/gitlab-10-3-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/18/gitlab-10-3-5-released/</id>
<published>2018-01-18T00:00:00+00:00</published>
<updated>2018-01-18T00:00:00+00:00</updated>
<author>
<name>Oswaldo Ferreira</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.3.5, 10.2.7, and 10.1.7 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a regression causing an error when running migrations on MySQL database, which was introduced
on &lt;a href=&quot;&#x2F;releases&#x2F;2018&#x2F;01&#x2F;16&#x2F;gitlab-10-dot-3-dot-4-released&quot;&gt;the latest security release patch&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix bug in security release with deploy keys migration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16531&quot;&gt;!16531&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions include a fix for an existing migration, which adds and updates a column on &lt;code&gt;deploy_keys&lt;&#x2F;code&gt; table.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Security Release: 10.3.4, 10.2.6, and 10.1.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/16/gitlab-10-dot-3-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/16/gitlab-10-dot-3-dot-4-released/</id>
<published>2018-01-16T00:00:00+00:00</published>
<updated>2018-01-16T00:00:00+00:00</updated>
<author>
<name>James Ritchey</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.3.4, 10.2.6, and 10.1.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, including two
that prevent remote code execution, and we strongly recommend that all GitLab
installations be upgraded to one of these versions immediately.&lt;&#x2F;p&gt;

&lt;p&gt;This security release blog post is the first part of two. The second blog will
be posted in approximately 30 days, and it will detail the vulnerability
findings.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details regarding this release.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;remote-code-execution-vulnerability-in-gitlab-projects-import&quot;&gt;Remote Code Execution Vulnerability in GitLab Projects Import&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab projects import component contained a vulnerability which allowed
an attacker to write files to arbitrary directories on the server and that
could result in remote code execution. The vulnerability has now been
mitigated and is assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0915&quot;&gt;CVE-2017-0915&lt;&#x2F;a&gt; and &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2018-3710&quot;&gt;CVE-2018-3710&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;b0bby_tables&quot;&gt;Brian Neel&lt;&#x2F;a&gt;
for responsibly disclosing these issues to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.9.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;additional-workarounds&quot;&gt;Additional Workarounds&lt;&#x2F;h4&gt;

&lt;ol&gt;
  &lt;li&gt;Go to &lt;code&gt;&#x2F;admin&#x2F;application_settings&lt;&#x2F;code&gt; of your GitLab instance.&lt;&#x2F;li&gt;
  &lt;li&gt;Under &quot;Import sources&quot;, uncheck the &quot;GitLab export&quot; checkbox.&lt;&#x2F;li&gt;
  &lt;li&gt;Click &lt;code&gt;Save&lt;&#x2F;code&gt;.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;gitlab-ci-runner-can-read-and-poison-cache-of-all-other-projects&quot;&gt;GitLab CI Runner Can Read and Poison Cache of All Other Projects&lt;&#x2F;h2&gt;

&lt;p&gt;A path traversal vulnerability was found in the CI runner, which allowed a
malicious user to read and poison other project caches. The issue is now
remediated and has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0918&quot;&gt;CVE-2017-0918&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.4.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-1&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;jupyter-notebook-xss&quot;&gt;Jupyter Notebook XSS&lt;&#x2F;h2&gt;

&lt;p&gt;Projects that have Jupyter Notebooks could execute external JavaScript. This XSS
vulnerability was caused by unsanitized output in Jupyter Notebooks. The output
is now correctly sanitized before being rendered. This issue has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0923&quot;&gt;CVE-2017-0923&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.1.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-2&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sensitive-fields-exposed-to-admins--masters-in-the-services-api&quot;&gt;Sensitive Fields Exposed to Admins &#x2F; Masters in the Services API&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;services.html&quot;&gt;Services API&lt;&#x2F;a&gt; responses
were exposing sensitive fields to the Admins and Masters of the service&#x27;s
project. We now filter out those sensitive fields from the Services API
responses. This issue has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0925&quot;&gt;CVE-2017-0925&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;WarX&quot;&gt;Artur Jan Fijałkowski&lt;&#x2F;a&gt; for responsibly
disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.0.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-3&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;login-with-disabled-oauth-provider-via-post&quot;&gt;Login with Disabled OAuth Provider via POST&lt;&#x2F;h2&gt;

&lt;p&gt;OAauth providers are configured per instance and can be disabled from the Admin settings page under &quot;Sign-in Restrictions&quot;.&lt;&#x2F;p&gt;

&lt;p&gt;It was possible to login with a disabled OAuth provider when bypassing the form with a malicious request.
A check has been added to prevent this. This issue has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0926&quot;&gt;CVE-2017-0926&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;stevenorman&quot;&gt;Steve Norman&lt;&#x2F;a&gt; for responsibly
disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.8.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-4&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-in-label-dropdown&quot;&gt;XSS in Label Dropdown&lt;&#x2F;h2&gt;

&lt;p&gt;A persistent XSS vulnerability was discovered in the issue&#x2F;merge request sidebar label dropdown. Label names inside the sidebar label dropdown are now escaped. This issue has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0924&quot;&gt;CVE-2017-0924&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;c05m0ch405&quot;&gt;c05m0ch405&lt;&#x2F;a&gt; for responsibly disclosing this issue to us through HackerOne.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.0.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-5&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;critical-sql-injection-in-milestonefinder&quot;&gt;Critical SQL Injection in MilestoneFinder&lt;&#x2F;h2&gt;

&lt;p&gt;A SQL injection vulnerability was discovered in the MilestoneFinder component. The affected SQL query has now been mitigated. This issue has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0914&quot;&gt;CVE-2017-0914&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-6&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 9.4.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-6&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;critical-vulnerability-with-command-injection-via-webhooks&quot;&gt;Critical Vulnerability with Command Injection via Webhooks&lt;&#x2F;h2&gt;

&lt;p&gt;A new line injection vulnerability was discovered in the Webhook component that allowed an attacker to inject non-HTTP commands in a TCP stream. The issue has now been mitigated and assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0916&quot;&gt;CVE-2017-0916&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-7&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.8.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-7&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-ci-job-output&quot;&gt;Cross-site scripting (XSS) vulnerability in CI job output&lt;&#x2F;h2&gt;

&lt;p&gt;A persistent XSS vulnerability was discovered in the CI job component, and the issue has now been resolved by performing stricter input validation. This issue has been assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0917&quot;&gt;CVE-2017-0917&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-8&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 10.1.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-8&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;guest-users-can-give-deploy-keys-in-other-projects-write-access&quot;&gt;Guest Users Can Give Deploy Keys in Other Projects Write Access&lt;&#x2F;h2&gt;

&lt;p&gt;An improper authorization vulnerability was discovered in the deployment keys component which resulted in unauthorized use of deployment keys by guest users. The issue has now been resolved and is assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0927&quot;&gt;CVE-2017-0927&lt;&#x2F;a&gt;.
This change altered the &lt;code&gt;&#x2F;deploy_keys&lt;&#x2F;code&gt; API endpoint, which no longer returns &lt;code&gt;can_push&lt;&#x2F;code&gt; attribute. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;blob&#x2F;v10.3.4-ee&#x2F;doc&#x2F;api&#x2F;deploy_keys.md&quot;&gt;our updated documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-9&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.16.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-9&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;milestone-authorization-issue-on-boards&quot;&gt;Milestone Authorization Issue on Boards&lt;&#x2F;h2&gt;

&lt;p&gt;An authorization bypass vulnerability was discovered in the Boards component which resulted in an information disclosure. The issue has now been resolved and is assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0922&quot;&gt;CVE-2017-0922&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-10&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab EE 9.1.0 - 9.5.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE 10.0.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-10&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;authorization-issue-when-creating-merge-requests&quot;&gt;Authorization Issue When Creating Merge Requests&lt;&#x2F;h2&gt;

&lt;p&gt;A vulnerability regarding authorization to create merge requests allowed users to see names of private projects, which also extended to already forked projects. The issue is now mitigated and is assigned to &lt;a href=&quot;http:&#x2F;&#x2F;www.cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=2017-0920&quot;&gt;CVE-2017-0920&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-11&quot;&gt;Versions Affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE and EE 8.8.0 - 10.1.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.2.0 - 10.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE and EE 10.3.0 - 10.3.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;remediation-11&quot;&gt;Remediation&lt;&#x2F;h3&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running an affected version above to be upgraded to the latest version as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade Barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions include a migration to add a column to &lt;code&gt;deploy_keys&lt;&#x2F;code&gt; table and
a post-deploy migration to populate it. No downtime is required.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing January 16, 2018 Critical Security Update</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/12/gitlab-critical-release-preannouncement/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/12/gitlab-critical-release-preannouncement/</id>
<published>2018-01-12T00:00:00+00:00</published>
<updated>2018-01-12T00:00:00+00:00</updated>
<author>
<name>Stan Hu</name>
</author>
<content type='html'>&lt;p&gt;On Tuesday, January 16th, 2018 at 23:59 UTC, we will publish a critical GitLab
security update. More details will be forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;, including which
versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.3.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2018/01/02/gitlab-10-3-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2018/01/02/gitlab-10-3-3-released/</id>
<published>2018-01-02T00:00:00+00:00</published>
<updated>2018-01-02T00:00:00+00:00</updated>
<author>
<name>Oswaldo Ferreira</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.3.3 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;12&#x2F;22&#x2F;gitlab-10-3-released&#x2F;&quot;&gt;this month&#x27;s 10.3.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix 404 errors after a user edits an issue description and solves the reCAPTCHA (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16167&quot;&gt;!16167&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix links to old commits in merge request comments (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16152&quot;&gt;!16152&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Gracefully handle orphaned write deploy keys in &#x2F;internal&#x2F;post_receive (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16127&quot;&gt;!16127&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Unmark Gitaly features as OPT_OUT until the gRPC proxy issue is fixed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16155&quot;&gt;!16155&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.3.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/12/28/gitlab-10-3-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/12/28/gitlab-10-3-2-released/</id>
<published>2017-12-28T00:00:00+00:00</published>
<updated>2017-12-28T00:00:00+00:00</updated>
<author>
<name>Tiago Nuno Lopes Sarmento Botelho</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.3.2 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a migration issue introduced in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;12&#x2F;22&#x2F;gitlab-10-3-released&#x2F;&quot;&gt;this month&#x27;s 10.3.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16141&quot;&gt;Fix migration for removing orphaned issues.moved_to_id values in MySQL and PostgreSQL.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version fixes an existing migration that failed for instances running
MySQL, but this version should not require additional downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.3.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/12/27/gitlab-10-3-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/12/27/gitlab-10-3-1-released/</id>
<published>2017-12-27T00:00:00+00:00</published>
<updated>2017-12-27T00:00:00+00:00</updated>
<author>
<name>Tiago Nuno Lopes Sarmento Botelho</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.3.1 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;12&#x2F;22&#x2F;gitlab-10-3-released&#x2F;&quot;&gt;this month&#x27;s 10.3.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16128&quot;&gt;Fix Error 500s with anonymous clones for a project that has moved.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16006&quot;&gt;Don&#x27;t link LFS-objects multiple times.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15881&quot;&gt;Reduce cardinality of some of GitLab&#x27;s Prometheus metrics and fix observed duration reporting.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16108&quot;&gt;Execute project hooks and services after commit when moving an issue.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15973&quot;&gt;Fix cluster environment missing.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;16138&quot;&gt;Use Concurrent::AtomicReference instead AtomicFixnum&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3794&quot;&gt;Geo: Show sync percent on bar graph and count within tooltips.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-omnibus-gitlab&quot;&gt;Bug fixes for Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2140&quot;&gt;Make it possible to configure an external Geo tracking database.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2157&quot;&gt;Process reconfigure failures and print out a message.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2158&quot;&gt;Remove unused redis bin gitlab-shell configuration.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2159&quot;&gt;Bump bundled git version to 2.14.3 a2b4bedf.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2165&quot;&gt;Update pgbouncer recipe to better handle initial configuration.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2169&quot;&gt;Render gitaly-ruby memory settings.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2137&quot;&gt;Add a runit service to probe repository storages.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.3 released with Static Application Security Testing and Browser Performance Testing</title>
<release>10.3</release>
<link href='https://about.gitlab.com/releases/2017/12/22/gitlab-10-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/12/22/gitlab-10-3-released/</id>
<published>2017-12-22T00:00:00+00:00</published>
<updated>2017-12-22T00:00:00+00:00</updated>
<author>
<name>Mark Pundsack</name>
</author>
<content type='html'>&lt;p&gt;In this month’s release of GitLab 10.3 we’ve added new ways to ensure that your
code changes are both secure and fast, enhanced your planning and collaboration
workflow, and improved your ability to build and ship.&lt;&#x2F;p&gt;



&lt;h2 class=&quot;intro-header&quot; id=&quot;security-and-testing&quot;&gt;Security and testing&lt;&#x2F;h2&gt;

&lt;p&gt;Not too long ago, we announced our ambitious &lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;10&#x2F;09&#x2F;gitlab-raises-20-million-to-complete-devops&#x2F;&quot;&gt;vision for Complete
DevOps&lt;&#x2F;a&gt; and with
GitLab 10.3 we&#x27;re adding several exciting new features that help bring that
vision to life. &lt;a href=&quot;#static-application-security-testing-sast&quot;&gt;Static Application Security
Testing&lt;&#x2F;a&gt; and &lt;a href=&quot;#browser-performance-testing&quot;&gt;Browser Performance
Testing&lt;&#x2F;a&gt; expand the scope of your CI&#x2F;CD pipeline
with security and performance checks, respectively. SAST
has already been added as a best practice to Auto DevOps, with Browser
Performance Testing soon to follow.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;discussion-and-collaboration&quot;&gt;Discussion and collaboration&lt;&#x2F;h2&gt;

&lt;p&gt;In 10.3, we also include &lt;a href=&quot;#merge-request-commit-discussions&quot;&gt;Merge Request Commit Discussions&lt;&#x2F;a&gt; to allow you to start a
conversation on specifics commits within a merge request.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to our &lt;a href=&quot;#mvp&quot;&gt;MVP&lt;&#x2F;a&gt;, you can now
&lt;a href=&quot;#customize-branch-name-when-creating-merge-request-from-issue&quot;&gt;customize the branch name when you start a merge request from an issue&lt;&#x2F;a&gt;. This
improvement is important to allow you to rapidly start MRs directly from
issues without having to break your branching strategy.&lt;&#x2F;p&gt;

&lt;p&gt;Sometimes an image is worth a million words. With GitLab 10.3, we added
support for &lt;a href=&quot;#flow-charts-sequence-diagrams-and-gantt-diagrams-in-gitlab-flavored-markdown-gfm-with-mermaid&quot;&gt;flow charts, sequence diagrams, and Gantt diagrams in GitLab Flavored Markdown (GFM) with Mermaid&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;build-and-ship&quot;&gt;Build and ship&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 10.3 adds support for &lt;a href=&quot;#multiple-kubernetes-clusters-per-project-beta&quot;&gt;multiple Kubernetes clusters per
project&lt;&#x2F;a&gt;, which enables a common
best practice of keeping your production cluster isolated from your dev and test
cluster(s).&lt;&#x2F;p&gt;

&lt;p&gt;With 10.3 we&#x27;re shipping an enhancement to Auto DevOps. Now, when you enable
Auto DevOps for your project, the &lt;a href=&quot;#automatically-run-first-pipeline-when-enabling-auto-devops&quot;&gt;first pipeline will run automatically&lt;&#x2F;a&gt;,
without needing to trigger it manually.&lt;&#x2F;p&gt;

&lt;p&gt;Artifacts can expire or be manually deleted so we&#x27;re introducing &lt;a href=&quot;#strict-check-on-artifacts-dependencies&quot;&gt;strict checking on artifact dependencies&lt;&#x2F;a&gt;, so that jobs
will fail if their dependencies cannot be found.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;see-all-the-features&quot;&gt;See all the features&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;re also shipping improvements to Merge Requests, Epics, Milestones,
Repository Mirroring, API, Geo, Runner, Protected Branches, Quick Actions, and
Issue Boards.&lt;&#x2F;p&gt;

&lt;p&gt;Read on to see everything that was released in GitLab 10.3!&lt;&#x2F;p&gt;

&lt;p&gt;We thank you for helping us to create great software with GitLab in 2017! We wish
you a Merry Christmas, happy holidays, and a new year full of great surprises!
Cheers!&lt;&#x2F;p&gt;

&lt;style type=&quot;text&#x2F;css&quot;&gt;
  .intro-header {
    font-size: 33px !important;
  }
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_3&#x2F;10_3-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.2.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/12/18/gitlab-10-2-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/12/18/gitlab-10-2-5-released/</id>
<published>2017-12-18T00:00:00+00:00</published>
<updated>2017-12-18T00:00:00+00:00</updated>
<author>
<name>Michael Teiva Kozono</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.2.5 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;11&#x2F;22&#x2F;gitlab-10-2-released&#x2F;&quot;&gt;this month&#x27;s 10.2 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15595&quot;&gt;Create a fork network for forks with a deleted source.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15653&quot;&gt;Correctly link to a forked project from the new fork page.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15671&quot;&gt;Fix the fork project functionality for projects with hashed storage.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15698&quot;&gt;Fix &lt;code&gt;updateEndpoint&lt;&#x2F;code&gt; undefined error for &lt;code&gt;issue_show&lt;&#x2F;code&gt; app root.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15889&quot;&gt;Fix broken illustration images for monitoring page empty states.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15735&quot;&gt;Fix related branches&#x2F;Merge requests failing to load when the hostname setting is changed.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15823&quot;&gt;Fix &lt;code&gt;gitlab:import:repos&lt;&#x2F;code&gt; Rake task moving repositories into the wrong location.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15678&quot;&gt;Gracefully handle case when repository&#x27;s root ref does not exist.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3499&quot;&gt;Visualize whether board filters are applied.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-omnibus-gitlab&quot;&gt;Bug fixes for Omnibus GitLab&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;2084&quot;&gt;Reduce memory usage if running a Geo secondary node&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;performance-improvements-for-community-and-enterprise-editions&quot;&gt;Performance improvements for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15613&quot;&gt;Keep track of all circuitbreaker keys in a set.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15629&quot;&gt;Only load branch names for protected branch checks.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15475&quot;&gt;Optimize API &lt;code&gt;&#x2F;groups&#x2F;:id&#x2F;projects&lt;&#x2F;code&gt; by preloading associations.&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;downtime to update&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.2.4, 10.1.5, and 10.0.7 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/12/08/gitlab-10-dot-2-dot-4-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/12/08/gitlab-10-dot-2-dot-4-security-release/</id>
<published>2017-12-08T00:00:00+00:00</published>
<updated>2017-12-08T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.2.4, 10.1.5, and 10.0.7 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including a fix for a difficult to exploit
Cross-Site Scripting (XSS) vulnerability, a fix for an API bug that could leak the
names of private projects, a fix for a private email disclosure vulnerability, and a fix
for a bug that could allow users without access to a project to create issues in that
project.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend that all GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;user-without-access-to-private-wiki-can-see-it-on-the-project-page-36679&quot;&gt;User without access to private Wiki can see it on the project page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36679&quot;&gt;#36679&lt;&#x2F;a&gt;)&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;mburtscher&quot;&gt;Matthias Burtscher&lt;&#x2F;a&gt; reported that it was possible for a user to see a private
Wiki on the project page without having the corresponding permission.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Versions affected:&lt;&#x2F;strong&gt; GitLab CE+EE 8.12.0–10.0.6, 10.1.0–10.1.4, 10.2.0–10.2.3&lt;&#x2F;p&gt;

&lt;h2 id=&quot;e-mail-address-disclosure-through-member-search-fields-34910&quot;&gt;E-mail address disclosure through member search fields (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;34910&quot;&gt;#34910&lt;&#x2F;a&gt;)&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;pstch&quot;&gt;Hugo Geoffroy&lt;&#x2F;a&gt; reported via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; that it was possible to find out the
full e-mail address of any user by brute-forcing the member search field.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Versions affected:&lt;&#x2F;strong&gt; GitLab CE+EE 8.6.0–10.0.6, 10.1.0–10.1.4, 10.2.0–10.2.3&lt;&#x2F;p&gt;

&lt;h2 id=&quot;groups-api-leaks-private-projects-39134&quot;&gt;Groups API leaks private projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;39134&quot;&gt;#39134&lt;&#x2F;a&gt;)&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that users were able to list private projects
they had no access to by using the Groups API.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Versions affected:&lt;&#x2F;strong&gt; GitLab CE+EE 4.2.0–10.0.6, 10.1.0–10.1.4, 10.2.0–10.2.3&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-possible-by-editing-a-comment-40706&quot;&gt;Cross-Site Scripting (XSS) possible by editing a comment (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;40706&quot;&gt;#40706&lt;&#x2F;a&gt;)&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;compass-security.com&quot;&gt;Sylvain Heiniger&lt;&#x2F;a&gt; reported via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; that it was possible for arbitrary
JavaScript code to be executed when editing a comment.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Versions affected:&lt;&#x2F;strong&gt; GitLab CE+EE 10.0.0–10.0.6, 10.1.0–10.1.4, 10.2.0–10.2.3&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-api-allows-any-user-to-create-a-new-issue-even-when-issues-are-restricted-or-disabled-30663&quot;&gt;Issue API allows any user to create a new issue even when issues are restricted or disabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30663&quot;&gt;#30663&lt;&#x2F;a&gt;)&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;0xbsec&quot;&gt;Mohammad Hasbini&lt;&#x2F;a&gt; reported that any user could create a new issues in a project
even when issues were disabled or restricted to team members in the project settings.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Versions affected:&lt;&#x2F;strong&gt; GitLab CE+EE 8.12.0–10.0.6, 10.1.0–10.1.4, 10.2.0–10.2.3&lt;&#x2F;p&gt;

&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.2.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/12/05/gitlab-10-2-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/12/05/gitlab-10-2-3-released/</id>
<published>2017-12-05T00:00:00+00:00</published>
<updated>2017-12-05T00:00:00+00:00</updated>
<author>
<name>Michael Teiva Kozono</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.2.3 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;11&#x2F;22&#x2F;gitlab-10-2-released&#x2F;&quot;&gt;this month&#x27;s 10.2 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;bug-fixes-for-community-and-enterprise-editions&quot;&gt;Bug fixes for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix hashed storage for Import&#x2F;Export uploads (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15482&quot;&gt;!15482&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Ensure that &lt;code&gt;rake gitlab:cleanup:repos&lt;&#x2F;code&gt; task does not mess with hashed repositories (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15520&quot;&gt;!15520&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Ensure that &lt;code&gt;rake gitlab:cleanup:dirs&lt;&#x2F;code&gt; task does not mess with hashed repositories (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15600&quot;&gt;!15600&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix WIP system note not being created (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15528&quot;&gt;!15528&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix link text from group context (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15565&quot;&gt;!15565&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix defaults for MR states and merge statuses (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15594&quot;&gt;!15594&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix pulling and pushing using a personal access token with the sudo scope (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15571&quot;&gt;!15571&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;bug-fixes-for-enterprise-editions&quot;&gt;Bug fixes for Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix viewing default push rules on a Geo secondary (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3559&quot;&gt;!3559&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix Geo wiki sync error not increasing retry count (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3569&quot;&gt;!3569&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; Disable Autocomplete for Epics (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3504&quot;&gt;!3504&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; Fix Epic fullscreen editing (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3437&quot;&gt;!3437&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; Fix tasklist for Epics (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3435&quot;&gt;!3435&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;performance-improvements-for-community-and-enterprise-editions&quot;&gt;Performance improvements for Community and Enterprise Editions&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Drastically improve Project Search performance by no longer searching namespace name (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15590&quot;&gt;!15590&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Reuse authors when rendering event Atom feeds (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15630&quot;&gt;!15630&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Optimise StuckCiJobsWorker using cheap SQL query outside, and expensive inside (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15527&quot;&gt;!15527&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;downtime to update&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.2.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/28/gitlab-10-2-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/28/gitlab-10-2-2-released/</id>
<published>2017-11-28T00:00:00+00:00</published>
<updated>2017-11-28T00:00:00+00:00</updated>
<author>
<name>Winnie Hellmann</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.2.2 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;11&#x2F;22&#x2F;gitlab-10-2-released&#x2F;&quot;&gt;this month&#x27;s 10.2.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Impersonation no longer gets stuck on password change (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15497&quot;&gt;gitlab-ce!15497&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Backport ability to enable&#x2F;disable file attachments in issuable form (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15433&quot;&gt;gitlab-ce!15433&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Lock codeclimate to version 0.69.0 in Auto DevOps template (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-yml&#x2F;merge_requests&#x2F;117&quot;&gt;gitlab-ci-yml!117&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix bug in GcpClusters to Clusters::Cluster migration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15566&quot;&gt;gitlab-ce!15566&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Hide &lt;code&gt;section_start&lt;&#x2F;code&gt; and &lt;code&gt;section_end&lt;&#x2F;code&gt; in pipeline emails (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15534&quot;&gt;gitlab-ce!15534&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix missing MR widget status icons (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15533&quot;&gt;gitlab-ce!15533&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Use arrays in &lt;code&gt;Ci::Pipeline#latest_builds_with_artifacts&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15525&quot;&gt;gitlab-ce!15525&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix reply quote keyboard shortcut on MRs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15523&quot;&gt;gitlab-ce!15523&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix blank states using old css (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15521&quot;&gt;gitlab-ce!15521&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Update composite pipelines index to include &quot;id&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15519&quot;&gt;gitlab-ce!15519&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Use Redis cache for branch existence checks (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15513&quot;&gt;gitlab-ce!15513&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix translation of &lt;code&gt;TagsPage|Tags&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15512&quot;&gt;gitlab-ce!15512&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix bitbucket wiki import with hashed storage enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15490&quot;&gt;gitlab-ce!15490&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix promoting milestone updating all issuables without milestone (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15487&quot;&gt;gitlab-ce!15487&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Don&#x27;t move project repository&#x2F;attachments when using hashed storage (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15479&quot;&gt;gitlab-ce!15479&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Add logs for monitoring the merge process (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15425&quot;&gt;gitlab-ce!15425&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Make Issue Boards sidebar subscriptions async (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15364&quot;&gt;gitlab-ce!15364&lt;&#x2F;a&gt; &#x2F; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3442&quot;&gt;gitlab-ee!3442&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Label addition&#x2F;removal are not going to be redacted wrongfully in the API (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15080&quot;&gt;gitlab-ce!15080&lt;&#x2F;a&gt; &#x2F; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3478&quot;&gt;gitlab-ee!3478&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Temporarily force disable prometheus metrics (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15549&quot;&gt;gitlab-ce!15549&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Fix incorrect merge in GitLab QA entry page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15540&quot;&gt;gitlab-ce!15540&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Ignore hashed repos (for now) when using &lt;code&gt;rake gitlab:cleanup:repos&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15520&quot;&gt;gitlab-ce!15520&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; FileUploader should use Hashed Storage only when project is migrated (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15526&quot;&gt;gitlab-ce!15526&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Optimize read-only middleware so that it does not consume as much CPU (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15504&quot;&gt;gitlab-ce!15504&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Mark all gitaly features as opt-in (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15522&quot;&gt;gitlab-ce!15522&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Account shared runner minutes to top-level namespace (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3262&quot;&gt;gitlab-ee!3262&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Ensure that LFS object deletions are communicated to the secondary (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3481&quot;&gt;gitlab-ee!3481&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Document a failure mode for large repositories (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3500&quot;&gt;gitlab-ee!3500&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Move the primary node checkbox below the URL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3483&quot;&gt;gitlab-ee!3483&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Add hashed storage warning (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3480&quot;&gt;gitlab-ee!3480&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Cap the &lt;code&gt;retry_at&lt;&#x2F;code&gt; value to prevent out of range timestamps (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3461&quot;&gt;gitlab-ee!3461&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Fix in-progress repository syncs counting as failed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3424&quot;&gt;gitlab-ee!3424&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Geo: Enable RequestStore in IssuesController spec to prevent N+1 warnings (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3356&quot;&gt;gitlab-ee!3356&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; Don&#x27;t use &lt;code&gt;issuable_sort&lt;&#x2F;code&gt; cookie for Epics collection (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3502&quot;&gt;gitlab-ee!3502&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; Improve documentation for Epics (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3482&quot;&gt;gitlab-ee!3482&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EEU:&lt;&#x2F;strong&gt; Disable file attachments for Epics (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3434&quot;&gt;gitlab-ee!3434&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.2 released with Configurable Issue Boards and GitLab Geo General Availability</title>
<release>10.2</release>
<link href='https://about.gitlab.com/releases/2017/11/22/gitlab-10-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/22/gitlab-10-2-released/</id>
<published>2017-11-22T00:00:00+00:00</published>
<updated>2017-11-22T00:00:00+00:00</updated>
<author>
<name>Joshua Lambert</name>
</author>
<content type='html'>&lt;p&gt;In this month’s release of GitLab 10.2 we’ve added capabilities to improve
planning, reliability, deployment, and so much more.&lt;&#x2F;p&gt;



&lt;h2 class=&quot;intro-header&quot; id=&quot;plan-your-work-more-efficiently&quot;&gt;Plan your work more efficiently&lt;&#x2F;h2&gt;

&lt;p&gt;If you’re like me, GitLab issues are water. Essential for life, but huge
volumes make you drown.&lt;&#x2F;p&gt;

&lt;p&gt;Getting a view of only the issues you care about for a particular context
is crucial to being effective, especially in shared views with teams.
Previously, GitLab let you use filters to
show a set of issues tied to a particular milestone or label in an issue board,
but that was only temporary. Your workflow may have depended on bookmarking a board
URL and sharing it with team members as a workaround.&lt;&#x2F;p&gt;

&lt;p&gt;Today, with &lt;a href=&quot;#configurable-issue-boards&quot;&gt;Configurable Issue Boards&lt;&#x2F;a&gt; you can
now save the scope itself (milestone, labels, assignee
and weight) to a board, ensuring that every team member sees exactly the same issues.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;fetch-faster&quot;&gt;Fetch faster&lt;&#x2F;h2&gt;

&lt;p&gt;Teams are increasingly distributed across larger geographical areas. This is
one reason why Git is so popular, Git is distributed by nature – your local
Git repository has a copy of every commit, file, and branch in the history of
the project. Once the history is downloaded, development is fast!&lt;&#x2F;p&gt;

&lt;p&gt;But if you only have one physical instance, it may be located far away from your distributed teams. The latency caused by this distance can significantly slow fetch operations when large quantities of small files are
being downloaded. Today, we&#x27;re excited to share that &lt;a href=&quot;#gitlab-geo-is-now-generally-available&quot;&gt;GitLab Geo has been released into General Availability&lt;&#x2F;a&gt;. GitLab Geo allows you to run read-only replicas of GitLab, including the GitLab
interface, close to your distributed teams.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;stay-up-and-running-at-scale&quot;&gt;Stay up and running at scale&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab’s single application architecture gives you one unified
data store across your issue tracking, source code repository, CI&#x2F;CD,
and monitoring. This unified approach enables additional insights, a better user experience, and greater efficiencies throughout your development organization.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab at the core of many software engineering groups, it&#x27;s important however to ensure it is running at peak performance, no matter the time of day. Today we’re proud to announce that &lt;a href=&quot;#postgres-ha-is-now-generally-available&quot;&gt;PostgreSQL High Availability is now Generally Available&lt;&#x2F;a&gt;, making it easy to set up and run a Postgres cluster for GitLab.
With a simple Omnibus-based installation and automatic failover, your developers can work without disruption.&lt;&#x2F;p&gt;

&lt;div class=&quot;panel panel-gitlab-purple&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;In a nutshell:&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;ul&gt;
      &lt;li&gt;Single Source of Truth == 😃&lt;&#x2F;li&gt;
      &lt;li&gt;Single Point of Failure == 😱&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;deploy-on-kubernetes-even-faster&quot;&gt;Deploy on Kubernetes even faster&lt;&#x2F;h2&gt;

&lt;p&gt;With each release, we are making the GitLab Kubernetes experience even better.
Last month, we made it easy to spin up new Kubernetes clusters with a few clicks.
But once you have a new cluster ready, you need to set up additional services
such as an external access controller. In this month’s release,
we’re removing that time sink from your schedule by adding &lt;a href=&quot;#easy-deployment-of-helm-and-ingress-on-kubernetes&quot;&gt;one-click installs for Tiller and Ingress&lt;&#x2F;a&gt;. Be on the lookout
next month for multi-cluster deployments. We aim to make each iterative step a
value-packed ship in and of itself.&lt;&#x2F;p&gt;

&lt;h2 class=&quot;intro-header&quot; id=&quot;see-all-the-features&quot;&gt;See all the features&lt;&#x2F;h2&gt;

&lt;p&gt;We’ve shipped a lot of exciting features this month including
&lt;a href=&quot;#commit-author-restriction&quot;&gt;Commit Author Restriction&lt;&#x2F;a&gt; and
&lt;a href=&quot;#promote-project-milestones-to-group-milestones&quot;&gt;Promote Project Milestones to Group Milestones&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Read on to learn more about all of the key features shipped in 10.2!&lt;&#x2F;p&gt;

&lt;style type=&quot;text&#x2F;css&quot;&gt;
  .intro-header {
    font-size: 33px !important;
  }
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_2&#x2F;10_2-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/22/gitlab-10-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/22/gitlab-10-2-1-released/</id>
<published>2017-11-22T00:00:00+00:00</published>
<updated>2017-11-22T00:00:00+00:00</updated>
<author>
<name>Michael Teiva Kozono</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.2.1 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a regression in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;11&#x2F;22&#x2F;gitlab-10-2-released&#x2F;&quot;&gt;this month&#x27;s 10.2.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Disable Prometheus to allow GitLab to start, until &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;prometheus-client-mmap&#x2F;merge_requests&#x2F;11&quot;&gt;the permanent fix&lt;&#x2F;a&gt; is ready. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15549&quot;&gt;!15549&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; file,
which is only used for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;updates&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.1.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/15/gitlab-10-dot-1-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/15/gitlab-10-dot-1-dot-4-released/</id>
<published>2017-11-15T00:00:00+00:00</published>
<updated>2017-11-15T00:00:00+00:00</updated>
<author>
<name>Felipe Artur Cardozo</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.1.4 for GitLab Community Edition (CE) and Enterprise Editions (EES, EEP).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;11&#x2F;10&#x2F;gitlab-10-dot-1-dot-3-released&#x2F;&quot;&gt;the 10.1.3 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Format bytes to human readable number in registry table (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15359&quot;&gt;!15359&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Prevent position update for image diff notes page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15357&quot;&gt;!15357&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Avoid creating fork network memberships for forks with a missing source (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15366&quot;&gt;!15366&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EES&#x2F;EEP:&lt;&#x2F;strong&gt; Prevent error when authorizing an admin-created OAuth application without a set owner (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15349&quot;&gt;!15349&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not contain any database migrations therefore
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;update&#x2F;#upgrading-without-downtime&quot;&gt;no downtime&lt;&#x2F;a&gt;
should be needed.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will restart
by themselves, no matter how “big” or “small” the upgrade is. This
behavior can be changed by adding a
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-editions&quot;&gt;Enterprise Editions&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Editions? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Editions are granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.1.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/10/gitlab-10-dot-1-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/10/gitlab-10-dot-1-dot-3-released/</id>
<published>2017-11-10T00:00:00+00:00</published>
<updated>2017-11-10T00:00:00+00:00</updated>
<author>
<name>Lin Jen-Shin</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.1.3 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;11&#x2F;08&#x2F;gitlab-10-dot-1-dot-2-security-release&#x2F;&quot;&gt;the 10.1.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix diff parser so it tolerates to diff special markers in the content (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14848&quot;&gt;!14848&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cancel button not working while uploading on the new issue page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15137&quot;&gt;!15137&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Render 404 when polling commit notes without having permissions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15140&quot;&gt;!15140&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix webhooks recent deliveries (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15146&quot;&gt;!15146&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issues with forked projects of which the source was deleted (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15150&quot;&gt;!15150&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove Filesystem check metrics that use too much CPU to handle requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15158&quot;&gt;!15158&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Avoid regenerating the ref path for the environment (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15167&quot;&gt;!15167&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a migration that adds merge_requests_ff_only_enabled column to MR table (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15195&quot;&gt;!15195&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make sure group and project creation is blocked for new users that are external by default (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15212&quot;&gt;!15212&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GPG signature popup info in Safari and Firefox (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15228&quot;&gt;!15228&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix arguments Import&#x2F;Export error importing project merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15241&quot;&gt;!15241&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show error message when fast-forward merge is not possible (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15296&quot;&gt;!15296&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent OAuth phishing attack by presenting detailed wording about app to user during authorization (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15311&quot;&gt;!15311&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix: Failed to rebase MR from forked repo (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3258&quot;&gt;!3258&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version fixes an existing migration but did not introduce new ones.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.1.2, 10.0.6, and 9.5.10 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/08/gitlab-10-dot-1-dot-2-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/08/gitlab-10-dot-1-dot-2-security-release/</id>
<published>2017-11-08T00:00:00+00:00</published>
<updated>2017-11-08T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.1.2, 10.0.6, and 9.5.10 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including updates for several third
party applications shipped with GitLab Omnibus packages, a fix for a Server-side Request
Forgery (SSRF) bypass, the re-introduction of a GitLab Geo security fix that was omitted
from GitLab 10.1 releases, and some security header additions to the GitLab API.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend that all GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;security-vulnerabilities-in-curl&quot;&gt;Security vulnerabilities in curl&lt;&#x2F;h2&gt;

&lt;p&gt;The version of &lt;code&gt;curl&lt;&#x2F;code&gt; included with GitLab Omnibus packages has been updated to
patch &lt;a href=&quot;https:&#x2F;&#x2F;curl.haxx.se&#x2F;docs&#x2F;vuln-7.53.0.html&quot;&gt;several security vulnerabilities&lt;&#x2F;a&gt;. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2905&quot;&gt;#2905&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Omnibus CE+EE 9.5.9 and earlier, 10.0.0–10.0.5, 10.1.0–10.1.1&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssrf-vulnerability-via-project-import&quot;&gt;SSRF vulnerability via project import&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;edoverflow.com&#x2F;&quot;&gt;edio&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; discovered that GitLab &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;20&#x2F;gitlab-8-dot-17-dot-4-security-release&#x2F;#ssrf-when-importing-a-project-from-a-repo-by-url&quot;&gt;SSRF protections&lt;&#x2F;a&gt; in project imports
did not properly translate IP addresses written in decimal, octal, or other formats.
This could allow a malicious user to send project import requests to services running
on the local interface of a GitLab instance, possibly resulting in unexpected behavior. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;33310&quot;&gt;#33310&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CE+EE 9.5.9 and earlier, 10.0.0–10.0.5, 10.1.0–10.1.1&lt;&#x2F;p&gt;

&lt;h2 id=&quot;missing-x-content-type-options-header-in-api-responses&quot;&gt;Missing X-Content-Type-Options header in API Responses&lt;&#x2F;h2&gt;

&lt;p&gt;During an external security audit performed by &lt;a href=&quot;http:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity-Labs&lt;&#x2F;a&gt; it was discovered
that the GitLab API did not include an HTTP &lt;code&gt;X-Content-Type-Options&lt;&#x2F;code&gt; header. The
lack of this header could make it easier for attackers to exploit other, undiscovered,
vulnerabilities using the GitLab API. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36099&quot;&gt;#36099&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-2&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CE+EE 9.5.9 and earlier, 10.0.0–10.0.5, 10.1.0–10.1.1&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-updates&quot;&gt;Mattermost updates&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has recently released important security fixes for the Mattermost versions included with GitLab CE+EE Omnibus packages.
Details will be made available on &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;Mattermost&#x27;s website&lt;&#x2F;a&gt; according to their responsible disclosure policy.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-3&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Omnibus CE+EE 9.5.9 and earlier, 10.0.0–10.0.5, 10.1.0–10.1.1 running Mattermost&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-geo-json-web-tokens-do-not-expire&quot;&gt;GitLab Geo JSON web tokens do not expire&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that the GitLab Geo JSON web tokens (JWT) used
to replicate data between Geo instances were not configured to expire. Without
expiration these tokens could be used forever and presented an increased risk
of compromise should a token be accidentally disclosed. Geo web tokens are now
configured to expire after two minutes. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;3787&quot;&gt;#3787&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-4&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab EE 8.9–9.5.9, 10.0.0–10.0.5, 10.1.0–10.1.1&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-risk-in-recommended-gitlab-geo-configuration-could-give-all-users-access-to-all-repositories&quot;&gt;Security risk in recommended GitLab Geo configuration could give all users access to all repositories&lt;&#x2F;h2&gt;

&lt;p&gt;The GitLab 9.5.4 security release contained a fix for a GitLab Geo vulnerability
that could allow any user of a GitLab Geo instance to clone any repository on
the secondary Geo instance. This patch was included in the later 9.5 and 10.0 releases
but was mistakenly excluded from the 10.1.0 and 10.1.1 releases. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;3899&quot;&gt;#3899&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-5&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab EE 10.1.0–10.1.1&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mysql-fix-for-pivotal-users&quot;&gt;MySQL fix for Pivotal users&lt;&#x2F;h2&gt;

&lt;p&gt;This security release also contains a non-security fix for a bug involving MySQL
that could prevent GitLab users who use GitLab PCF tile from upgrading. The fix itself is not
a security fix but has been included to allow GitLab Pivotal users to apply these security updates. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;38372&quot;&gt;#38372&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/03/gitlab-10-dot-0-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/03/gitlab-10-dot-0-dot-5-released/</id>
<published>2017-11-03T00:00:00+00:00</published>
<updated>2017-11-03T00:00:00+00:00</updated>
<author>
<name>Jaroslava Kadlecová</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.0.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;10&#x2F;17&#x2F;gitlab-10-dot-0-dot-4-security-release&#x2F;&quot;&gt;10.0.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix monitoring graph axes labels that were inaccurate and inconsistent (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14258&quot;&gt;!14258&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken Y-axis scaling in some Prometheus graphs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14693&quot;&gt;!14693&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix group milestones breadcrumb links (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14689&quot;&gt;!14689&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GitLab QA: increase window size to ensure License link shows (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14674&quot;&gt;!14674&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;rake gitlab:incoming_email:check&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14423&quot;&gt;!14423&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the import :milestone from adding the group_id (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14657&quot;&gt;!14657&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix missing issue assignees (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15109&quot;&gt;!15109&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Trigger change event of the markdown textarea to allow Vue catch the programmatic changes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14539&quot;&gt;!14539&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix multiple notifications from being sent for multiple labels (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14798&quot;&gt;!14798&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add docs for &lt;code&gt;api_json.log&lt;&#x2F;code&gt; file (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14950&quot;&gt;!14950&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent ApplicationSetting to cache nil value (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14952&quot;&gt;!14952&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t rename paths that were freed up when upgrading (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15029&quot;&gt;!15029&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix merge request widget date tooltip inconsistencies (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14578&quot;&gt;!14578&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bottom spacing for dropdowns that open upwards (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14535&quot;&gt;!14535&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable comment textarea while submitting a new comment (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14541&quot;&gt;!14541&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove auto devops callout from repo editor view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14616&quot;&gt;!14616&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve merge request widget status icon UX (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14200&quot;&gt;!14200&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Include RevList error messages in exceptions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14658&quot;&gt;!14658&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update Prometheus gem to fix problems with other Processes overwriting current metrics file (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14827&quot;&gt;!14827&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update Prometheus Gem to fix problem caused by using wrong data offsets (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15081&quot;&gt;!15081&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove &quot;boards&quot; from TOP_LEVEL_ROUTES (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14861&quot;&gt;!14861&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix renaming a hashed project (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14428&quot;&gt;!14428&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix breadcrumb title not linking (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14532&quot;&gt;!14532&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Move group boards routes under &#x27;-&#x27; and remove &quot;boards&quot; from reserved paths (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3078&quot;&gt;!3078&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix base link for issues on group boards (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3099&quot;&gt;!3099&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add scheduled import jobs to the stuck import jobs detection worker (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3055&quot;&gt;!3055&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; GitLab QA fix: Adjust license key add for GitLab 10.0 changes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3059&quot;&gt;!3059&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix removing the username from the git repository URL for pull mirroring (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3060&quot;&gt;!3060&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: Fix attachments&#x2F;avatars saving to the wrong directory (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3068&quot;&gt;!3068&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix breaking sidebar when navigating to another group board (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3010&quot;&gt;!3010&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix creating labels from Group Boards sidebar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2869&quot;&gt;!2869&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.1.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/11/01/gitlab-10-dot-1-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/11/01/gitlab-10-dot-1-dot-1-released/</id>
<published>2017-11-01T00:00:00+00:00</published>
<updated>2017-11-01T00:00:00+00:00</updated>
<author>
<name>Lin Jen-Shin</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.1.1 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;10&#x2F;22&#x2F;gitlab-10-1-released&#x2F;&quot;&gt;the 10.1.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Auto Devops Kubernetes default namespace is now correctly built out of GitLab (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14642&quot;&gt;!14642&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Store circuitbreaker settings in the database instead of config (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14842&quot;&gt;!14842&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow boards as top level route (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14861&quot;&gt;!14861&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Forbid the usage of &lt;code&gt;Redis#keys&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14889&quot;&gt;!14889&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make the circuitbreaker more robust by adding higher thresholds, and multiple access attempts. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14933&quot;&gt;!14933&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update default disabled merge request widget message to reflect a general failure (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14960&quot;&gt;!14960&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only cache last push event for existing projects when pushing to a fork (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14989&quot;&gt;!14989&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix deletion of container registry or images returning an error (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14992&quot;&gt;!14992&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the writing of invalid environment refs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14993&quot;&gt;!14993&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug preventing secondary emails from being confirmed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15010&quot;&gt;!15010&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken wiki pages that link to a wiki file (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15019&quot;&gt;!15019&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t rename paths that were freed up when upgrading (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15029&quot;&gt;!15029&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix editing issue description in mobile view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15049&quot;&gt;!15049&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Bitbucket login (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15051&quot;&gt;!15051&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update Gitaly in GitLab 10.1 to 0.43.1 for temp file cleanup (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15055&quot;&gt;!15055&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Stop merge requests with thousands of commits from timing out (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15063&quot;&gt;!15063&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use the correct visibility attribute for projects in system hooks (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15065&quot;&gt;!15065&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix widget of locked merge requests not being presented (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15069&quot;&gt;!15069&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Normalize LDAP DN when looking up identity (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15103&quot;&gt;!15103&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add callback functions for initial request in clusters page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15105&quot;&gt;!15105&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix missing Import&#x2F;Export issue assignees (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;15109&quot;&gt;!15109&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Move group boards routes under - and remove &quot;boards&quot; from reserved paths (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3078&quot;&gt;!3078&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix height of rebase and approve buttons (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3210&quot;&gt;!3210&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix LDAP group sync for nested groups e.g. when base has uppercase or extraneous spaces (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3217&quot;&gt;!3217&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: read-only safeguards was not working on Secondary node (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3227&quot;&gt;!3227&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes two migrations and no downtime would be required.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.1 released with Image Discussions and Rejection of Unsigned Commits</title>
<release>10.1</release>
<link href='https://about.gitlab.com/releases/2017/10/22/gitlab-10-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/10/22/gitlab-10-1-released/</id>
<published>2017-10-22T00:00:00+00:00</published>
<updated>2017-10-22T00:00:00+00:00</updated>
<author>
<name>Achilleas Pipinellis</name>
</author>
<content type='html'>&lt;p&gt;Καλημέρα! (Good morning!) This month we&#x27;re coming to you live from GitLab all
hands in Heraklion, Greece, to release GitLab 10.1. 🚀&lt;&#x2F;p&gt;

&lt;p&gt;Since GitLab&#x27;s inception, we envisioned a world where
&lt;a href=&quot;&#x2F;direction&#x2F;#vision&quot;&gt;everyone can contribute&lt;&#x2F;a&gt;, and with each release we&#x27;re one
step closer. With GitLab 10.1, we bring more tools for better collaboration,
enhanced security and authentication, as well as improved performance and UX.&lt;&#x2F;p&gt;



&lt;p&gt;For far too long a group of folks have been left out of the discussion and we
think it&#x27;s time that got fixed. With GitLab 10.1 we&#x27;re changing how you should
think about version control and discussion.
Commenting on lines of code works great when the discussion centers around text,
but what about images? After all, if the code being written has an app UI, web
page, or generates a printed asset then it makes sense that you&#x27;d want to be
able to talk about text and images in the same way. With
&lt;a href=&quot;#image-discussions&quot;&gt;Image Discussions&lt;&#x2F;a&gt; we&#x27;re opening up a whole new way to
collaborate. Extending on collaboration, you can now
&lt;a href=&quot;#merge-requests-across-forks&quot;&gt;create merge requests across forks&lt;&#x2F;a&gt; of a
canonical repository.&lt;&#x2F;p&gt;

&lt;p&gt;Being able to work under a secure environment is very important, and with each
release we are constantly improving the security and authentication mechanisms.
This time, we have added &lt;a href=&quot;#ldap-group-sync-filters&quot;&gt;LDAP group sync filters&lt;&#x2F;a&gt;,
as well as the ability to &lt;a href=&quot;#reject-unsigned-commits&quot;&gt;reject unsigned commits&lt;&#x2F;a&gt;.
The &lt;a href=&quot;#improved-admin-audit-log&quot;&gt;admin audit log&lt;&#x2F;a&gt; has been improved to also
include more metrics and &lt;a href=&quot;#signing-commits-with-gpg-subkeys&quot;&gt;GPG subkeys support&lt;&#x2F;a&gt; has
been added.&lt;&#x2F;p&gt;

&lt;p&gt;An open source project can attract a lot of visitors and contributors. Although
one would expect civilized discussions to take place, that&#x27;s not always
the case. With GitLab 10.1, a moderation tool is in place and you are able to
&lt;a href=&quot;#lock-discussions&quot;&gt;lock discussions on issues and merge requests&lt;&#x2F;a&gt;
to avoid unnecessary friction among your community.&lt;&#x2F;p&gt;

&lt;p&gt;Going strong with our &lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;10&#x2F;11&#x2F;from-dev-to-devops&#x2F;&quot;&gt;DevOps vision&lt;&#x2F;a&gt;, we&#x27;ve
made it really easy to &lt;a href=&quot;#easy-creation-of-kubernetes-clusters-on-google-container-engine-(beta)&quot;&gt;create clusters on Google Kubernetes Engine from within
GitLab&lt;&#x2F;a&gt;.
The &lt;a href=&quot;#online-view-of-html-artifacts&quot;&gt;online view of HTML artifacts&lt;&#x2F;a&gt;
is also another great addition that will make it even easier to view your test
reports right from your web browser.&lt;&#x2F;p&gt;

&lt;p&gt;Dedicated to our open source stewardship, the
&lt;a href=&quot;#semi-linear-history-and-fast-forward-merge-requests-in-ce&quot;&gt;fast-forward option in merge requests&lt;&#x2F;a&gt;
previously on Enterprise Edition Starter is now brought to Community Edition.&lt;&#x2F;p&gt;

&lt;p&gt;In the UX side of things, GitLab now comes with an &lt;a href=&quot;#improved-new-project-page&quot;&gt;improved new project page&lt;&#x2F;a&gt;
so that it&#x27;s easier to decide the kind of project you want to create. Whether
you want to start from scratch, use a template or import from another provider,
you can now achieve it easier than before.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re dedicated to making GitLab perform better and faster under heavy load,
and GitLab 10.1 is no exception. This release comes with many
&lt;a href=&quot;#performance-improvements&quot;&gt;performance improvements&lt;&#x2F;a&gt; including faster viewing
of merge requests and general initial page load improvements.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_1&#x2F;10_1-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.0.4, 9.5.9, and 9.4.7 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/10/17/gitlab-10-dot-0-dot-4-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/10/17/gitlab-10-dot-0-dot-4-security-release/</id>
<published>2017-10-17T00:00:00+00:00</published>
<updated>2017-10-17T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 10.0.4, 9.5.9, and 9.4.7 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including fixes for two
persistent Cross-Site Scripting (XSS) vulnerabilities, an open redirect vulnerability,
a bug when changing usernames that could leave behind and leak
repositories, an information leakage vulnerability in private issue names, and
security updates for Ruby and libxml2. We recommend that all GitLab installations
be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-the-markdown-sanitization-filter&quot;&gt;Cross-Site Scripting (XSS) vulnerability in the Markdown sanitization filter&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;SecurityYasin&quot;&gt;Yasin Soliman&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported a Cross-Site Scripting (XSS) vulnerability in the
GitLab markdown sanitization filter. The sanitization filter was not properly
stripping invalid characters from URL schemes and was therefore vulnerable to
persistent XSS attacks anywhere Markdown was supported. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;38272&quot;&gt;#38272&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-search-bar&quot;&gt;Cross-Site Scripting (XSS) vulnerability in search bar&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;joshunger&quot;&gt;Josh Unger&lt;&#x2F;a&gt; reported a Cross-Site Scripting (XSS) vulnerability in the
issue search bar. Usernames were not being properly HTML escaped inside the author
filter would could allow arbitrary script execution. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;38267&quot;&gt;#38267&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-in-repository-git-redirects&quot;&gt;Open redirect in repository &lt;code&gt;git&lt;&#x2F;code&gt; redirects&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;ericrafaloff.com&quot;&gt;Eric Rafaloff&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that GitLab was vulnerable to an open redirect
vulnerability when redirecting requests for repository names that include the &lt;code&gt;git&lt;&#x2F;code&gt;
extension. GitLab was not properly removing dangerous parameters from the params
field before redirecting which could allow an attacker to redirect users to
arbitrary hosts. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;37715&quot;&gt;#37715&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;username-changes-could-leave-repositories-behind&quot;&gt;Username changes could leave repositories behind&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that a bug in the code that moves repositories
during a username change could potentially leave behind projects, allowing an
attacker who knows the previous username to potentially steal the contents of
repositories on instances that are not configured with hashed namespaces. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;38126&quot;&gt;#38126&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-issue-names-could-leak-in-related-issues-feature&quot;&gt;Confidential issue names could leak in &quot;related issues&quot; feature&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that confidential issue titles could leak
when referenced as &quot;related issues&quot;. GitLab EE was not properly filtering confidential
issues in the related issues feature for users that did not have access to these
issues. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;3435&quot;&gt;#3435&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ruby-update&quot;&gt;Ruby update&lt;&#x2F;h2&gt;

&lt;p&gt;The version of Ruby included with GitLab Omnibus CE+EE packages has been updated
to 2.3.5 to patch a potential SMTP injection vulnerability that could allow attackers
to use a GitLab instance to send arbitrary emails. A patch is also included to
support the use of carriage returns as email separators in pipeline alert email
recipient lists so that installations improperly using carriage returns as email
separators do not break. &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;137631&quot;&gt;HackerOne Report&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;libxml2-update&quot;&gt;Libxml2 update&lt;&#x2F;h2&gt;

&lt;p&gt;The version of libxml2 included with GitLab Omnibus CE+EE packages has been updated
to 2.9.6 to patch several security vulnerabilities. &lt;a href=&quot;http:&#x2F;&#x2F;xmlsoft.org&#x2F;news.html&quot;&gt;XMLSoft&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability in markdown:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 2.8.0-9.4.6, 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability in search bar&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.3.0-9.4.6, 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Open redirect in repository git redirects&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.2.0-9.4.6, 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Username changes could leave repositories behind&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Confidential issue names could leak in &quot;related issues&quot; feature&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab EE 9.4.0-9.4.6, 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Ruby update&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.14.0-9.4.6, 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Libxml2 update&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 1.1.1-9.4.6, 9.5.0-9.5.8, 10.0.0-10.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/10/05/gitlab-10-dot-0-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/10/05/gitlab-10-dot-0-dot-3-released/</id>
<published>2017-10-05T00:00:00+00:00</published>
<updated>2017-10-05T00:00:00+00:00</updated>
<author>
<name>Jaroslava Kadlecová</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.0.3 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;09&#x2F;27&#x2F;gitlab-10-dot-0-dot-2-released&#x2F;&quot;&gt;the 10.0.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix merge request counter updates after merge (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14563&quot;&gt;!14563&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make sure API responds with 401 when invalid authentication info is provided (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14525&quot;&gt;!14525&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 500 error on merged merge requests when GitLab is restored from a backup (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14547&quot;&gt;!14547&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix commenting on side-by-side commit diff (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14529&quot;&gt;!14529&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Gitaly RepositoryExists remains opt-in for all method calls (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14513&quot;&gt;!14513&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Adjust MRs being stuck on &quot;process of being merged&quot; for more than 2 hours (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14540&quot;&gt;!14540&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; &lt;code&gt;find_user&lt;&#x2F;code&gt; Users helper method no longer overrides &lt;code&gt;find_user&lt;&#x2F;code&gt; API helper method (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14418&quot;&gt;!14418&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve UX of autodevops popover to match gpg one (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14582&quot;&gt;!14582&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix CSRF validation issue when closing&#x2F;opening merge requests from the UI (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14555&quot;&gt;!14555&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make &lt;code&gt;Repository#has_visible_content&lt;&#x2F;code&gt; more efficient (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14554&quot;&gt;!14554&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Auto DevOps banner feature flag (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14576&quot;&gt;!14576&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix data parameter not being sent in ajax request for jobs log (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14564&quot;&gt;!14564&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pushes to an empty repository not invalidating &lt;code&gt;has_visible_content?&lt;&#x2F;code&gt; cache (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14613&quot;&gt;!14613&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure all refs are restored on a backup&#x2F;restore (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14595&quot;&gt;!14595&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Admin -&amp;gt; License selector for GitLab QA specs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14599&quot;&gt;!14599&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix gitlab-rake gitlab:import:repos task (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14597&quot;&gt;!14597&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken certificate-authority-data with kubectl &amp;gt;= 1.8.0 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14635&quot;&gt;!14635&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Show group tab if member lock is enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3025&quot;&gt;!3025&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Only show Turn on Service Desk button when user has permissions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3020&quot;&gt;!3020&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add basic documentation on the consul cluster (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3013&quot;&gt;!3013&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; File uploaders do not perform hard check, only soft check (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2960&quot;&gt;!2960&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix EE delta size check handling with annotated tags (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3041&quot;&gt;!3041&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Rewrite Geo database rake tasks so they operate on the correct database (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3052&quot;&gt;!3052&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.8</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/10/04/gitlab-9-dot-5-dot-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/10/04/gitlab-9-dot-5-dot-8-released/</id>
<published>2017-10-04T00:00:00+00:00</published>
<updated>2017-10-04T00:00:00+00:00</updated>
<author>
<name>Jose Ivan Vargas</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes backports of fixes for bugs that are present in the 9.5.x releases.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix fork button being disabled for users who can fork to group (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14551&quot;&gt;!14551&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix delta size check to handle commit or nil objects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2976&quot;&gt;!2976&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix EE delta size check handling with annotated tags (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3041&quot;&gt;!3041&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/10/03/gitlab-9-dot-5-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/10/03/gitlab-9-dot-5-dot-7-released/</id>
<published>2017-10-03T00:00:00+00:00</published>
<updated>2017-10-03T00:00:00+00:00</updated>
<author>
<name>Jose Ivan Vargas</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a single regression introduced in 9.5.4, which prevented admins from importing repositories from the command line.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fix:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix gitlab rake:import:repos task for 9.5.x (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14639&quot;&gt;!14639&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/09/28/gitlab-9-dot-5-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/28/gitlab-9-dot-5-dot-6-released/</id>
<published>2017-09-28T00:00:00+00:00</published>
<updated>2017-09-28T00:00:00+00:00</updated>
<author>
<name>Jose Ivan Vargas</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;09&#x2F;18&#x2F;gitlab-9-dot-5-dot-5-released&#x2F;&quot;&gt;this month&#x27;s 9.5.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix MR widget with ready to merge buttons&#x2F;controls at mobile breakpoint (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14242&quot;&gt;!14242&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix MR widget with external CI services&#x2F;integrations (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13977&quot;&gt;!13977&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Update &quot;x&#x2F;x discussions resolved&quot; checkmark icon to be green when all discussions resolved (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14255&quot;&gt;!14255&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Upgrade Nokogiri because of CVE-2017-9050 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14427&quot;&gt;!14427&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Handle error when fetching ref for MR with deleted source branch (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14550&quot;&gt;!14550&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Show group tab if member lock is enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3025&quot;&gt;!3025&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Bump ruby version to 2.3.5 for security fixes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1930&#x2F;&quot;&gt;!1930&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Resolve &quot;update_databases assumes a populated databases.json&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1924&#x2F;&quot;&gt;!1924&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Resolve &quot;restart repmgrd after node register&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1928&#x2F;&quot;&gt;!1928&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Resolve &quot;repmgr unregister doesn&#x27;t accept –node&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1927&#x2F;&quot;&gt;!1927&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.0.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/09/27/gitlab-10-dot-0-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/27/gitlab-10-dot-0-dot-2-released/</id>
<published>2017-09-27T00:00:00+00:00</published>
<updated>2017-09-27T00:00:00+00:00</updated>
<author>
<name>Jaroslava Kadlecová</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.0.2 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;09&#x2F;24&#x2F;gitlab-10-dot-0-dot-1-released&#x2F;&quot;&gt;this month&#x27;s 10.0.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resize comment form after note submit and discard it (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14401&quot;&gt;!14401&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix rendering double note issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14429&quot;&gt;!14429&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure that Blob.raw returns always a valid blob object (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14412&quot;&gt;!14412&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove navbar gradient (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14457&quot;&gt;!14457&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Re-allow &lt;code&gt;name&lt;&#x2F;code&gt; attribute on user-provided anchor HTML (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14452&quot;&gt;!14452&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix checks failing with &#x27;undefined method &lt;code&gt;run_command&lt;&#x2F;code&gt; in &lt;code&gt;rake gitlab:check&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14469&quot;&gt;!14469&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix PG::UniqueViolation external_email migration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14474&quot;&gt;!14474&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent URL concatenation for avatars (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14437&quot;&gt;!14437&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; IssueNotes: Switch back to Write pane when note cancel or submit (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14402&quot;&gt;!14402&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a dash being rendered in the note&#x27;s access role (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14450&quot;&gt;!14450&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make locked setting of Runner to not affect jobs scheduling (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14483&quot;&gt;!14483&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Avoid wrapping users in dropdown (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14410&quot;&gt;!14410&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix delta size check to handle commit or nil objects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2976&quot;&gt;!2976&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix 500 error due to promote group Web hooks (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2972&quot;&gt;!2972&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add notes on authentication to PG HA document (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2851&quot;&gt;!2851&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Send valid project path as name for Jira dev panel (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3005&quot;&gt;!3005&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove duplicate group boards doc (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2991&quot;&gt;!2991&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Point to embedded Consul (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2980&quot;&gt;!2980&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix internal link in docs(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;3003&quot;&gt;!3003&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix an issue where enabling a GitLab Geo role would also disable all default services (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1963&quot;&gt;!1963&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Add option to configure redis snapshot frequency (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1964&quot;&gt;!1964&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Update pg-upgrade output to be more clear when a bundled PostgreSQL is not in use (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1962&quot;&gt;!1962&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Reload consul on config change instead of restarting (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1966&quot;&gt;!1966&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 10.0.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/09/24/gitlab-10-dot-0-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/24/gitlab-10-dot-0-dot-1-released/</id>
<published>2017-09-24T00:00:00+00:00</published>
<updated>2017-09-24T00:00:00+00:00</updated>
<author>
<name>Stan Hu</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 10.0.1 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a migration issue in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;09&#x2F;22&#x2F;gitlab-10-0-released&#x2F;&quot;&gt;this month&#x27;s 10.0.0
release&lt;&#x2F;a&gt; that &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;38246#note_41171108&quot;&gt;affected instances with
inactive LDAP accounts&lt;&#x2F;a&gt;.
Other than that, this update contains no changes to functionality from 10.0.0.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fix:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix duplicate key errors in PostDeployMigrateUserExternalMailData migration. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14460&quot;&gt;!14460&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Thanks to Ian Yang for suggesting a solution.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a revision to a single migration, but does not require
any downtime. If you have already successfully upgraded to 10.0.0, this
upgrade will not affect you.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 10.0 released with Auto DevOps and Group Issue Boards</title>
<release>10.0</release>
<link href='https://about.gitlab.com/releases/2017/09/22/gitlab-10-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/22/gitlab-10-0-released/</id>
<published>2017-09-22T00:00:00+00:00</published>
<updated>2017-09-22T00:00:00+00:00</updated>
<author>
<name>Mike Bartlett</name>
</author>
<content type='html'>&lt;p&gt;From the formulation of an idea to executing and monitoring it in production, DevOps establishes
a culture and environment where developing, testing, and releasing software can happen quickly, frequently,
and more reliably.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 10.0 delivers a hands-free
DevOps environment with the introduction of &lt;a href=&quot;#auto-devops&quot;&gt;Auto DevOps&lt;&#x2F;a&gt;, allowing your team to easily configure and adopt
modern development practices in your workflow. Not only that, there&#x27;s &lt;a href=&quot;#new-user-experience&quot;&gt;new navigation&lt;&#x2F;a&gt; and a new way of &lt;a href=&quot;#group-issue-boards&quot;&gt;collaborating across groups&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;p&gt;With every monthly release of GitLab, we introduce new capabilities and improve our existing features. GitLab 10.0 is no exception and includes numerous new additions, such as the ability to &lt;a href=&quot;#automatically-resolve-outdated-mr-discussions&quot;&gt;automatically resolve outdated merge request discussions&lt;&#x2F;a&gt;, improvements to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;group&#x2F;subgroups&#x2F;index.html&quot;&gt;subgroups&lt;&#x2F;a&gt;, and an &lt;a href=&quot;#api-support-for-wikis&quot;&gt;API for Wiki&lt;&#x2F;a&gt; thanks to a contribution from our open source community.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab&#x27;s powerful issue management capabilities keep getting better with every release. Filtering and searching issues across groups has been &lt;a href=&quot;#group-merge-requests-search-and-filter-bar&quot;&gt;vastly improved&lt;&#x2F;a&gt;, our updated UX makes moving issues &lt;a href=&quot;#move-issues-from-the-sidebar&quot;&gt;easier to discover&lt;&#x2F;a&gt; and can be automated &lt;a href=&quot;#move-issue-quick-action&quot;&gt;through quick action commands&lt;&#x2F;a&gt;. GitLab Enterprise Edition Premium customers using JIRA can now &lt;a href=&quot;#access-gitlab-commits-and-branches-in-jira-development-panel&quot;&gt;see commits and branches&lt;&#x2F;a&gt; in JIRA&#x27;s development panel.&lt;&#x2F;p&gt;

&lt;p&gt;Security and performance continues to improve. Administrators can now &lt;a href=&quot;#ssh-key-length-restrictions&quot;&gt;restrict SSH&lt;&#x2F;a&gt; access through technology and key length. LDAP Group Sync can &lt;a href=&quot;#ldap-group-sync-api&quot;&gt;be automated&lt;&#x2F;a&gt; through our API and can now lock down &lt;a href=&quot;#ldap-group-sync-improvements-for-external-users&quot;&gt;External Users&lt;&#x2F;a&gt; at point of login as well. &lt;a href=&quot;#performance-improvements&quot;&gt;Performance&lt;&#x2F;a&gt; continues to get faster, improving page loading speeds, the speed of creating projects and performing commits, and reduced memory usage.&lt;&#x2F;p&gt;

&lt;style&gt;
  .blog.article .author,
  .blog.article .author a,
  .blog.article .date,
  .blog.article .date a,
  .blog.article .author-twitter i,
  .blog.article .author-gitlab i {
    color: white;
    text-shadow: 2px 2px 5px rgba(0,0,0,.7);
  }
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;10_0&#x2F;10_0_cover_image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/09/18/gitlab-9-dot-5-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/18/gitlab-9-dot-5-dot-5-released/</id>
<published>2017-09-18T00:00:00+00:00</published>
<updated>2017-09-18T00:00:00+00:00</updated>
<author>
<name>Simon Knox</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;09&#x2F;07&#x2F;gitlab-9-dot-5-dot-4-security-release&#x2F;&quot;&gt;this month&#x27;s 9.5.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Better prefilled description for issue created from failed job. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13790&quot;&gt;!13790&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix 500 errors caused by a race condition in GPG&#x27;s tmp directory handling (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14194&quot;&gt;!14194&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix project feature being deleted when updating project with invalid visibility level (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14235&quot;&gt;!14235&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix Pipeline Triggers to show triggered label and predefined variables (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14244&quot;&gt;!14244&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Don&#x27;t show Pages settings when not available (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13888&quot;&gt;!13888&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Check that GPG signature and commit are created by the same user (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13771&quot;&gt;!13771&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Better nav layout at small screen sizes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13967&quot;&gt;!13967&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix merge request widget button height differences (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14000&quot;&gt;!14000&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix Mark as Resolved icon (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14042&quot;&gt;!14042&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix X-Gitlab-Event header when testing webhook (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14108&quot;&gt;!14108&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix collapsed sidebar project title scroll issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13777&quot;&gt;!13777&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Disable GitLab Project Import button if source disabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13789&quot;&gt;!13789&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix divide-by-zero error for new projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13803&quot;&gt;!13803&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Normalize styles in New Issue&#x2F;MR combo button (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13647&quot;&gt;!13647&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Speed up creation of new Merge Requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13685&quot;&gt;!13685&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Increase storage timeout default (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;14023&quot;&gt;!14023&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix activation of project mirror when project is created (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2756&quot;&gt;!2756&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix bug where mirror trigger builds is nil at project create (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2797&quot;&gt;!2797&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Ensure routing setting is available before calling it (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2908&quot;&gt;!2908&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Allow pushing without a branch name (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2879&quot;&gt;!2879&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix branch name regex not being saved on admin push_rule page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2877&quot;&gt;!2877&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix issue with projects with an empty import URL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2824&quot;&gt;!2824&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Geo - Whitelist LFS requests to download objects on a secondary node (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2758&quot;&gt;!2758&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix unsetting credentials data for pull mirrors (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2810&quot;&gt;!2810&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix merges not working when project is not licensed for squash (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2817&quot;&gt;!2817&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix approver icon spacing on Merge Request widget (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2825&quot;&gt;!2825&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Fix 500 error on SSH host keys action (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2827&quot;&gt;!2827&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Set Deploy boards to collapse by default (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2834&quot;&gt;!2834&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Don&#x27;t put password in SSH remote for public key authentication (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2837&quot;&gt;!2837&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Update pgb-notify template (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1873&quot;&gt;!1873&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Increase storage timeout default (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1906&quot;&gt;!1906&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Add more options to repmgr.conf template (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1893&quot;&gt;!1893&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Update pgbouncer to use one style of logging  (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1918&quot;&gt;!1918&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Upgrade ruby version to 2.3.5 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1930&quot;&gt;!1930&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Upgrade libyaml version to 0.1.7&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes some new migrations, but does not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.5.4, 9.4.6, and 9.3.11 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/09/07/gitlab-9-dot-5-dot-4-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/07/gitlab-9-dot-5-dot-4-security-release/</id>
<published>2017-09-07T00:00:00+00:00</published>
<updated>2017-09-07T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.5.4, 9.4.6, and 9.3.11 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including fixes for several
persistent Cross-Site Scripting (XSS) vulnerabilities, a fix for a hard to exploit
race condition in project uploads, a fix for a CSRF token leakage vulnerability,
a fix for a bug that could allow deleted repositories to be left on disk and copied
by a user that knew their full path, some important Mattermost updates, a fix for
a critical vulnerability in the Nokogiri library, a fix for a vulnerability that
could allow the disclosure of private SSL certificates in Pages sites, and several
more. We recommend that all GitLab installations be upgraded to one of these
versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-profile-names&quot;&gt;Cross-Site Scripting (XSS) vulnerability in profile names&lt;&#x2F;h2&gt;

&lt;p&gt;An external security audit performed by &lt;a href=&quot;https:&#x2F;&#x2F;www.madison-gurkha.com&#x2F;&quot;&gt;Madison Gurkha&lt;&#x2F;a&gt; disclosed a Cross-Site
Scripting (XSS) vulnerability in user names that could be exploited in several
locations. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36979&quot;&gt;#36979&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;37344&quot;&gt;#37344&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-in-go-get-middleware&quot;&gt;Open Redirect in go-get middleware&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.insomniasec.com&#x2F;&quot;&gt;Tim Goddard&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that GitLab was vulnerable to an open redirect
vulnerability caused when a specific flag is passed to the &lt;code&gt;go-get&lt;&#x2F;code&gt; middleware.
This vulnerability could also &lt;em&gt;possibly&lt;&#x2F;em&gt; be used to conduct Cross-Site Scripting
attacks. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31508&quot;&gt;#31508&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;race-condition-in-project-uploads&quot;&gt;Race condition in project uploads&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; from &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that GitLab was vulnerable to a race
condition in project uploads. While very difficult to exploit this race condition
could &lt;em&gt;potentially&lt;&#x2F;em&gt; allow an attacker to overwrite a victim&#x27;s uploaded project
if the attacker can guess the name of the uploaded file before it is extracted. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29652&quot;&gt;#29652&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-request-forgery-csrf-token-leakage&quot;&gt;Cross-Site Request Forgery (CSRF) token leakage&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;aurelcode&quot;&gt;naure&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that GitLab was vulnerable to CSRF token leakage
via improper filtering of external URLs in relative URL creation. A specially
crafted link configured in a project&#x27;s environments settings could be used
to steal a visiting user&#x27;s CSRF token. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31045&quot;&gt;#31045&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-project-disclosure-via-project-deletion-bug&quot;&gt;Potential project disclosure via project deletion bug&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that removed projects were not always being
deleted from the file system. This could allow an attacker who knew the full
path to a previously deleted project to steal a copy of the repository. These
releases prevent the leftover repository from being accessed when creating a new
project. The project deletion bug will be fixed in a later release. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36743&quot;&gt;#36743&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-updates&quot;&gt;Mattermost updates&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has recently released important security fixes for the Mattermost
versions included with GitLab CE+EE Omnibus packages. Details will be made
available on &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;Mattermost&#x27;s website&lt;&#x2F;a&gt; according to their
responsible disclosure policy.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;white-listed-style-attribute-for-table-contents-in-md-enables-ui-redressing&quot;&gt;White-listed style attribute for table contents in MD enables UI redressing&lt;&#x2F;h2&gt;

&lt;p&gt;An external security audit performed by &lt;a href=&quot;http:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity-Labs&lt;&#x2F;a&gt; discovered a UI redressing
vulnerability in the GitLab markdown sanitization library. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36098&quot;&gt;#36098&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;dom-clobbering-in-sanitized-md-causes-errors&quot;&gt;DOM clobbering in sanitized MD causes errors&lt;&#x2F;h2&gt;

&lt;p&gt;An external security audit performed by &lt;a href=&quot;http:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity-Labs&lt;&#x2F;a&gt; discovered a DOM clobbering
vulnerability in the GitLab markdown sanitization library that could be used
to render project pages unreadable. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36104&quot;&gt;#36104&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;nokogiri-vendored-libxslt-library-vulnerable-to-potential-integer-overflow-cve-2017-5029-and-cve-2016-4738&quot;&gt;Nokogiri vendored libxslt library vulnerable to potential integer overflow (CVE-2017-5029 and CVE-2016-4738)&lt;&#x2F;h2&gt;

&lt;p&gt;The bundled Nokogiri library has been updated to patch an integer overflow
vulnerability. Details are available in the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;sparklemotion&#x2F;nokogiri&#x2F;issues&#x2F;1634&quot;&gt;Nokogiri issue&lt;&#x2F;a&gt;. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29992&quot;&gt;#29992&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-risk-in-recommended-geo-configuration-could-give-all-users-access-to-all-repositories&quot;&gt;Security risk in recommended Geo configuration could give all users access to all repositories&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that GitLab Geo instances could be vulnerable
to an attack that would allow any user on the primary Geo instance to clone any
repository on a secondary Geo instance. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;3271&quot;&gt;#3271&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-pages-private-certificate-disclosure-via-symlinks&quot;&gt;GitLab Pages private certificate disclosure via symlinks&lt;&#x2F;h2&gt;

&lt;p&gt;An external security review conducted by &lt;a href=&quot;http:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity-Labs&lt;&#x2F;a&gt; discovered a vulnerability
in GitLab Pages that could be used to disclose the contents of private SSL keys. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-pages&#x2F;issues&#x2F;75&quot;&gt;#75&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability in profile names:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.3.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Open Redirect in go-get middleware&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.0.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Race condition in project uploads&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.10.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;CSRF token leakage&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.0.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Copying of undeleted repositories&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.1.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;White-listed style attribute for table contents in MD enables UI redressing&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.3.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;DOM clobbering in sanitized MD causes errors&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.3.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Nokogiri vendored libxslt library vulnerable to potential integer overflow&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 1.0.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Security risk in recommended Geo secondary configuration could give all users access to all repositories&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab EE 8.6.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab Pages private certificate disclosure via Symlinks&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.6.0-9.3.10, 9.4.0-9.4.5, 9.5.0-9.5.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/09/04/gitlab-9-dot-5-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/09/04/gitlab-9-dot-5-dot-3-released/</id>
<published>2017-09-04T00:00:00+00:00</published>
<updated>2017-09-04T00:00:00+00:00</updated>
<author>
<name>Jose Ivan Vargas</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.3 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;08&#x2F;28&#x2F;gitlab-9-dot-5-dot-2-released&#x2F;&quot;&gt;this month&#x27;s 9.5.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Filter additional secrets from Rails logs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13945&quot;&gt;!13945&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Make username update fail if the namespace update fails. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13642&quot;&gt;!13642&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix failure when issue is authored by a deleted user. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13807&quot;&gt;!13807&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Reverts changes made to signin_enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13642&quot;&gt;!13956&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix Merge when pipeline succeeds button dropdown caret icon horizontal alignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13965&quot;&gt;!13965&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fixed diff changes bar buttons from showing&#x2F;hiding whilst scrolling.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix events error importing GitLab projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13868&quot;&gt;!13868&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix pipeline trigger via API fails with 500 Internal Server Error in 9.5. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13861&quot;&gt;!13861&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fixed fly-out nav flashing in &amp;amp; out. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13929&quot;&gt;!13929&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Remove closing external issues by reference error. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13910&quot;&gt;!13910&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Re-allow appearances.description_html to be NULL. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13806&quot;&gt;!13806&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Update and fix resolvable note icons for easier recognition. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13821&quot;&gt;!13821&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Eager load head pipeline projects for MRs index. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13877&quot;&gt;!13877&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Instrument MergeRequest#fetch_ref. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13980&quot;&gt;!13980&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Instrument MergeRequest#ensure_ref_fetched. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13876&quot;&gt;!13876&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Notifications weren&#x27;t sending to participating users with a &lt;code&gt;Custom&lt;&#x2F;code&gt; notification setting. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13680&quot;&gt;!13680&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Simplify system hook testing and guarantee test will fire (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13858&quot;&gt;!13858&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Update templates to include header in the README. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13785&quot;&gt;!13785&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Add dynamic navigation tunnel to fly-out menus. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13315&quot;&gt;!13315&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix transient dropdown test failures. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13862&quot;&gt;!13862&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fixes the diff changes buttons from toggling when scrolling. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13894&quot;&gt;!13894&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Adds position fixed to right sidebar. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13494&quot;&gt;!13494&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Update backup_restore.md documentation regarding S3 and IAM profiles. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13871&quot;&gt;!13871&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Increase z-index of dropdowns. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13889&quot;&gt;!13889&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Resolve &quot;README.md: Header image scale not limited&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13869&quot;&gt;!13869&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fixed fly-out nav jumping. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13690&quot;&gt;!13690&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Update Gitaly version to v0.35.0. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13950&quot;&gt;!13950&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Remove skipped examples in filtered issues feature spec. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13845&quot;&gt;!13845&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Update Prometheus Client MMAP gem to version that fixes performance degradation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13898&quot;&gt;!13898&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Improve migrations &#x2F; background migrations testing strategy (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13589&quot;&gt;!13589&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Add event metrics to mirrors and remote mirrors. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2744&quot;&gt;!2744&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Remove skipped examples in filtered issues weight feature spec. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2773&quot;&gt;!2773&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt; Check if &lt;code&gt;licenses&lt;&#x2F;code&gt; table exists before loading the current license. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2783&quot;&gt;!2783&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus CE&#x2F;EE&lt;&#x2F;strong&gt; Fix Mattermost log location. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1881&quot;&gt;!1881&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/28/gitlab-9-dot-5-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/28/gitlab-9-dot-5-dot-2-released/</id>
<published>2017-08-28T00:00:00+00:00</published>
<updated>2017-08-28T00:00:00+00:00</updated>
<author>
<name>Jose Ivan Vargas</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.2 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;08&#x2F;24&#x2F;gitlab-9-dot-5-dot-1-released&#x2F;&quot;&gt;this month&#x27;s 9.5.1 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Badges are no longer huge. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13635&quot;&gt;!13635&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix signing in using LDAP when attribute mapping uses simple strings instead of arrays. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13776&quot;&gt;!13776&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Show un-highlighted text diffs when we do not have references to the correct blobs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13744&quot;&gt;!13744&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix display of push events for removed refs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13721&quot;&gt;!13721&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Testing of some integrations were broken due to missing ServiceHook record. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13729&quot;&gt;!13729&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fire system hooks when a user is created via LDAP. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13846&quot;&gt;!13846&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix new project form not resetting the template value. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13757&quot;&gt;!13757&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;Geo::ProjectRegistry.failed&lt;&#x2F;code&gt; scope to count projects where wiki sync failed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2747&quot;&gt;!2747&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Display &#x27;Check namespace plan&#x27; checkbox in admin area on GitLab.com, staging, or in development (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2750&quot;&gt;!2750&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove duplicated items from admin sidebar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2769&quot;&gt;!2769&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix LDAP backwards-compatibility when using &quot;method&quot; or when &quot;verify_certificates&quot; is not defined (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2690&quot;&gt;!2690&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.5.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/24/gitlab-9-dot-5-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/24/gitlab-9-dot-5-dot-1-released/</id>
<published>2017-08-24T00:00:00+00:00</published>
<updated>2017-08-24T00:00:00+00:00</updated>
<author>
<name>Simon Knox</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.5.1 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;08&#x2F;22&#x2F;gitlab-9-5-released&#x2F;&quot;&gt;this month&#x27;s 9.5.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure Rugged methods are called with a Rugged Commit (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13723&quot;&gt;!13723&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Commit rows would occasionally render with the wrong language (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13669&quot;&gt;!13664&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fixed issue boards closed list displaying empty label (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13658&quot;&gt;!13667&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; User profile activity feed contains broken image links (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13606&quot;&gt;!13722&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Only require Sidekiq throttling library when enabled, to reduce cache misses (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13715&quot;&gt;!13718&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Correctly encode string params for Gitaly&#x27;s TreeEntries RPC (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13724&quot;&gt;!13719&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Raise Git GC Housekeeping timeout to 24 hours (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13719&quot;&gt;!13724&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Remove incorrect paragraph regarding renaming repos in settings (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13718&quot;&gt;!13715&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix path in import projects form (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13722&quot;&gt;!13606&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix caching of future broadcast messages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13667&quot;&gt;!13658&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt; Fix merge request head pipeline when pipeline has errors (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13664&quot;&gt;!13669&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix url for object store artifacts (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2705&quot;&gt;!2705&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix button spacing on Merge Request widget (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2693&quot;&gt;!2693&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Ensure all database queries are routed through load balancer when load balancing is enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2707&quot;&gt;!2707&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Hide admin Audit Log in sidebar when not licensed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2726&quot;&gt;!2726&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix page flicker when sidebar is collapsed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2738&quot;&gt;!2738&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix new nav sidebar item layout issues&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.5 released with GPG Commit Verification and Project Templates</title>
<release>9.5</release>
<link href='https://about.gitlab.com/releases/2017/08/22/gitlab-9-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/22/gitlab-9-5-released/</id>
<published>2017-08-22T00:00:00+00:00</published>
<updated>2017-08-22T00:00:00+00:00</updated>
<author>
<name>Marcia Ramos</name>
</author>
<content type='html'>&lt;p&gt;Everything we do at GitLab, from our integrated product to our monthly releases, is centered on the goal of helping development teams reduce time to value.
With each release, we want to help you do more in less time, while also providing an intuitive and user-friendly experience in our product. GitLab 9.5 takes a big step in furthering this goal. This release features improvements to our navigation, new project templates with pre-configured CI, and new automation features for CI and performance monitoring that will save you time and effort.&lt;&#x2F;p&gt;

&lt;p&gt;This will be the last 9.x release, as we&#x27;re preparing to release
&lt;strong&gt;GitLab 10.0&lt;&#x2F;strong&gt; on September 22nd! Nonetheless, we&#x27;re shipping some great new features
to round off our 9.x releases:&lt;&#x2F;p&gt;



&lt;p&gt;To help improve your experience navigating GitLab, we&#x27;ve updated the &lt;a href=&quot;#new-navigation-improvements&quot;&gt;new navigation&lt;&#x2F;a&gt;,
streamlining the UI and reducing the number of clicks it takes to move through your GitLab instance. With the newly added icons and subnav on hover, it&#x27;s easier and faster than ever to explore GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Getting started on a new project just got faster. In GitLab 9.5, we&#x27;ve introduced &lt;a href=&quot;#project-templates&quot;&gt;Project Templates&lt;&#x2F;a&gt;,
which allow you to quickly create a new project that has CI pre-configured.&lt;&#x2F;p&gt;

&lt;p&gt;Continuing on our mission to save you time, we&#x27;ve made it possible for GitLab to &lt;a href=&quot;#automatic-retry-for-failed-ci-jobs&quot;&gt;automatically retry failed jobs&lt;&#x2F;a&gt;
ran with GitLab CI&#x2F;CD. Now, you don&#x27;t have to worry about losing time going back to your project&#x27;s pipelines just to hit retry on a failed job. 🙌&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 9.5 also brings improvements to the latter part of the development lifecycle. With the addition of &lt;a href=&quot;#automatically-monitor-auto-deployed-apps&quot;&gt;Automatic Monitoring for Auto Deployed applications&lt;&#x2F;a&gt; we&#x27;ve made it easier for you to collect response and system metrics from your apps.&lt;&#x2F;p&gt;

&lt;p&gt;And last but not least, we&#x27;re shipping tons of &lt;a href=&quot;#performance-improvements&quot;&gt;performance improvements&lt;&#x2F;a&gt;
to continue to make GitLab faster than ever! 🚀 Enjoy!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;9_5&#x2F;9_5-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.4.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/14/gitlab-9-dot-4-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/14/gitlab-9-dot-4-dot-5-released/</id>
<published>2017-08-14T00:00:00+00:00</published>
<updated>2017-08-14T00:00:00+00:00</updated>
<author>
<name>James Edwards-Jones</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.4.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;08&#x2F;10&#x2F;gitlab-9-dot-4-dot-4-released&#x2F;&quot;&gt;the 9.4.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure language files are compiled before webpack to prevent broken Javascript (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13122&quot;&gt;!13122&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix deletion of deploy keys linked to other projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13162&quot;&gt;!13162&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow any logged in users to read_users_list even if it&#x27;s restricted (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13201&quot;&gt;!13201&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make Delete Merged Branches handle wildcard protected branches correctly (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13251&quot;&gt;!13251&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an order of operations for CI connection error message in merge request widget (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13252&quot;&gt;!13252&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipeline_schedules pages when active schedule has an abnormal state (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13286&quot;&gt;!13286&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add missing validation error for username change with container registry tags (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13356&quot;&gt;!13356&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix destroy of case-insensitive conflicting redirects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13357&quot;&gt;!13357&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Project pending delete no longer return 500 error in admins projects view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13389&quot;&gt;!13389&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix search box losing focus when typing (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13221&quot;&gt;!13221&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use jQuery to control scroll behavior in job log for cross browser consistency (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13203&quot;&gt;!13203&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use project_ref_path to create the link to a branch to fix links that 404 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13459&quot;&gt;!13459&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve file upload&#x2F;replace experience (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12863&quot;&gt;!12863&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix jump to next discussion button (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13076&quot;&gt;!13076&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes new issue button for failed job returning 404 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13450&quot;&gt;!13450&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix links to group milestones from issue and merge request sidebar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13199&quot;&gt;!13199&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Mattermost integration by handling cookie in OAuth2 flow (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13305&quot;&gt;!13305&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Change project FK migration to skip existing FKs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13235&quot;&gt;!13235&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed sign-in restrictions buttons not toggling active state (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13270&quot;&gt;!13270&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Ensure artifacts are moved locally within the filesystem to prevent timeouts (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2572&quot;&gt;!2572&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix rebase from fork when upstream has protected branches (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2640&quot;&gt;!2640&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Present Related Issues add badge only when user can manage related issues (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2583&quot;&gt;!2583&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix accessing individual files on Object Storage (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2564&quot;&gt;!2564&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix Mattermost setting teammate_name_display not working (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1813&quot;&gt;!1813&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix LDAP SSL config: Use ca_file, not ca_cert (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1810&quot;&gt;!1810&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix over-nesting of artifacts object store settings (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1816&quot;&gt;!1816&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.4.4, 9.3.10, 9.2.10, 9.1.10, 9.0.13, and 8.17.8 Critical Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/10/gitlab-9-dot-4-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/10/gitlab-9-dot-4-dot-4-released/</id>
<published>2017-08-10T18:00:00+00:00</published>
<updated>2017-08-10T18:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.4.4, 9.3.10, 9.2.10, 9.1.10, 9.0.13, and 8.17.8
for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain two critical security fixes. The first is a security fix
for a vulnerability in &lt;code&gt;git&lt;&#x2F;code&gt; that can be exploited in GitLab to execute arbitrary
shell commands. The second security fix addresses the usage of symlinks inside
GitLab Export files that could be used to copy the contents of arbitrary
repositories.&lt;&#x2F;p&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all affected GitLab installations
be upgraded to one of these versions &lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Note: This is a coordinated release with several other companies and projects,
including &lt;code&gt;git&lt;&#x2F;code&gt; itself, which is why it is occurring at 18:00 UTC. As those
projects release their updates this release post will be updated with more
information.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-announcements&quot;&gt;Other Announcements&lt;&#x2F;h2&gt;
&lt;ul&gt;
  &lt;li&gt;Git: &lt;a href=&quot;https:&#x2F;&#x2F;www.mail-archive.com&#x2F;linux-kernel@vger.kernel.org&#x2F;msg1466490.html&quot;&gt;CVE-2017-1000117&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Apache Subversion: &lt;a href=&quot;https:&#x2F;&#x2F;subversion.apache.org&#x2F;security&#x2F;CVE-2017-9800-advisory.txt&quot;&gt;CVE-2017-9800&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Mercurial: &lt;a href=&quot;https:&#x2F;&#x2F;www.mercurial-scm.org&#x2F;wiki&#x2F;WhatsNew#Mercurial_4.3_.282017-08-10.29&quot;&gt;CVE-2017-1000116&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Recurity Labs: &lt;a href=&quot;http:&#x2F;&#x2F;blog.recurity-labs.com&#x2F;2017-08-10&#x2F;scm-vulns&quot;&gt;SCM Vulnerabilities&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;remote-command-execution-in-git-client-cve-2017-12426&quot;&gt;Remote Command Execution in &lt;code&gt;git&lt;&#x2F;code&gt; client (CVE-2017-12426)&lt;&#x2F;h2&gt;

&lt;p&gt;An external code review performed by Recurity Labs identified a remote command
execution vulnerability in &lt;code&gt;git&lt;&#x2F;code&gt; that could be exploited via the &quot;Repo by URL&quot;
import option in GitLab. The command line &lt;code&gt;git&lt;&#x2F;code&gt; client was not properly escaping
command line arguments in URLs using the SSH protocol before invoking the SSH client. A
specially crafted URL could be used to execute arbitrary shell commands on the
GitLab server.&lt;&#x2F;p&gt;

&lt;p&gt;To fully patch this vulnerability two fixes were needed. The Omnibus versions
of GitLab contain a patched &lt;code&gt;git&lt;&#x2F;code&gt; client. For source users who may still be
running an older version of &lt;code&gt;git&lt;&#x2F;code&gt;, GitLab now also blocks import URLs containing
invalid host and usernames. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;35212&quot;&gt;35212&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2017-12426&quot;&gt;CVE-2017-12426&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;http:&#x2F;&#x2F;twitter.com&#x2F;joernchen&quot;&gt;Joern Schneeweisz&lt;&#x2F;a&gt; and &lt;a href=&quot;http:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity Labs&lt;&#x2F;a&gt; for discovering this vulnerability, providing
immediate notification, and helping us coordinate a release across several projects.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;7.9.0 through 8.17.7&lt;&#x2F;li&gt;
  &lt;li&gt;9.0.0 through 9.0.12&lt;&#x2F;li&gt;
  &lt;li&gt;9.1.0 through 9.1.9&lt;&#x2F;li&gt;
  &lt;li&gt;9.2.0 through 9.2.9&lt;&#x2F;li&gt;
  &lt;li&gt;9.3.0 through 9.3.9&lt;&#x2F;li&gt;
  &lt;li&gt;9.4.0 through 9.4.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab installation
against this vulnerability using the workaround outlined below until you
have time to upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;Note: Disabling the &quot;Repo by URL&quot; import option does not fully mitigate this
vulnerability as existing projects will still be able to change their import URLs.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;removing-support-for-ssh-urls&quot;&gt;Removing support for SSH URLs&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CE+EE instances that cannot be patched immediately can disable support
for SSH URLs in project imports and mirrors by editing the GitLab source code
and removing &lt;code&gt;ssh&lt;&#x2F;code&gt; from the list of valid protocols.&lt;&#x2F;p&gt;

&lt;p&gt;For source users edit: &lt;code&gt;&#x2F;app&#x2F;validators&#x2F;addressable_url_validator.rb&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For Omnibus users edit: &lt;code&gt;&#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;service&#x2F;gitlab-rails&#x2F;app&#x2F;validators&#x2F;addressable_url_validator.rb&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Change:&lt;&#x2F;p&gt;
&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;DEFAULT_OPTIONS = { protocols: %w(http https ssh git) }.freeze
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;To:&lt;&#x2F;p&gt;
&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;DEFAULT_OPTIONS = { protocols: %w(http https git) }.freeze
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;&lt;p&gt;Then restart GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;For Omnibus users: &lt;code&gt;gitlab-ctl restart&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;verifying-the-workaround&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Choose to create a new project&lt;&#x2F;li&gt;
  &lt;li&gt;Choose &quot;Import by URL&quot;.&lt;&#x2F;li&gt;
  &lt;li&gt;Specify a URL such as &lt;code&gt;ssh:&#x2F;&#x2F;gitlab.com&#x2F;foo.git&lt;&#x2F;code&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;Verify that GitLab returns an invalid URL error.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;Be certain that you do not revert this patch until you have installed an updated
version of &lt;code&gt;git&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improper-sanitization-of-gitlab-export-files-on-import&quot;&gt;Improper sanitization of GitLab export files on import&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab versions 8.13.3, 8.12.8, 8.11.10, 8.10.13, and 8.9.12 contained a patch
for a &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-9086&quot;&gt;critical directory traversal vulnerability&lt;&#x2F;a&gt; in the GitLab export feature
that could be exploited by including symlinks in the export file and then re-importing
it to a GitLab instance. This vulnerability was patched by checking for and removing
symlinks in these files on import.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;www.recurity-labs.com&#x2F;&quot;&gt;Recurity Labs&lt;&#x2F;a&gt; also determined that this fix did not properly remove symlinks for
hidden files. Though not as dangerous as the original vulnerability hidden file
symlinks could still be used to steal copies of &lt;code&gt;git&lt;&#x2F;code&gt; repositories belonging to
other users if the path to the &lt;code&gt;git&lt;&#x2F;code&gt; repository was known by the attacker. An
updated fix has been included in these releases that properly removes all symlinks. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;36091&quot;&gt;36091&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This import option was not made available to non-admin users until GitLab 8.13.0.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;8.9.0 through 8.17.7&lt;&#x2F;li&gt;
  &lt;li&gt;9.0.0 through 9.0.12&lt;&#x2F;li&gt;
  &lt;li&gt;9.1.0 through 9.1.9&lt;&#x2F;li&gt;
  &lt;li&gt;9.2.0 through 9.2.9&lt;&#x2F;li&gt;
  &lt;li&gt;9.3.0 through 9.3.9&lt;&#x2F;li&gt;
  &lt;li&gt;9.4.0 through 9.4.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds-1&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab instances that cannot be patched immediately can disable the &quot;GitLab export&quot;
option for project imports in their admin settings.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;verifying-the-workaround-1&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Choose to create a new project&lt;&#x2F;li&gt;
  &lt;li&gt;Verify that the &quot;GitLab export&quot; option is not available.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing August 10, 2017 Critical Security Update</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/04/gitlab-critical-release-preannouncement/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/04/gitlab-critical-release-preannouncement/</id>
<published>2017-08-04T00:00:00+00:00</published>
<updated>2017-08-04T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;On Thursday, August 10th, 2017 at 18:00 UTC, we will publish a critical GitLab
security update. More details will be forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;, including
which versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade as soon as the
new releases are available. Please forward this alert to the appropriate people
at your organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please note the 18:00 UTC release time. This is different from the 23:59 UTC
release time used for previous critical security releases. This change will be
explained in the release blog post.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>9.3.7 Patch Release Update - Security Addendum</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/03/recent-bug-could-enable-signups/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/03/recent-bug-could-enable-signups/</id>
<published>2017-08-03T00:00:00+00:00</published>
<updated>2017-08-03T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;GitLab 9.3.7 fixed a security problem that was not listed in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;18&#x2F;gitlab-9-dot-3-dot-7-released&#x2F;&quot;&gt;patch release update&lt;&#x2F;a&gt;. We recommend users on GitLab 9.3.0 to 9.3.6 to upgrade to 9.3.9 or newer.&lt;&#x2F;p&gt;



&lt;p&gt;This bug was introduced in GitLab 9.3.0 and can be triggered when an instance loses connectivity to the Redis cluster. In this situation the server may create a new application settings entry in the database using the GitLab defaults. In a worst-case scenario an instance with sign-ups initially disabled may have that setting enabled, allowing users to register.&lt;&#x2F;p&gt;

&lt;p&gt;A fix for this bug was included with GitLab CE+EE versions 9.3.7 and 9.4.0. The fix &lt;em&gt;does not&lt;&#x2F;em&gt; restore any settings that have been reset to defaults. All users running GitLab instances versions 9.3.0 or newer should verify that their application settings are still correct. Users running instances with sign-ups disabled should verify that no unauthorized accounts have been created.&lt;&#x2F;p&gt;

&lt;p&gt;Users running GitLab CE+EE versions prior to 9.3.0 and users of GitLab.com are not affected.&lt;&#x2F;p&gt;

&lt;p&gt;More details can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;34728&quot;&gt;the issue&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;ramonsmit94&quot;&gt;Ramon Smit&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;DALTCORE&quot;&gt;DALTCORE&lt;&#x2F;a&gt; for reporting the full impact of this vulnerability to us.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.4.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/08/01/gitlab-9-dot-4-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/08/01/gitlab-9-dot-4-dot-3-released/</id>
<published>2017-08-01T00:00:00+00:00</published>
<updated>2017-08-01T00:00:00+00:00</updated>
<author>
<name>James Edwards-Jones</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.4.3 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;28&#x2F;gitlab-9-dot-4-dot-2-released&#x2F;&quot;&gt;the 9.4.2 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix LDAP authentication to Git repository or container registry (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13185&quot;&gt;!13185&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Prometheus client PID reuse bug (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13130&quot;&gt;!13130&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure filesystem metrics test files are deleted (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13080&quot;&gt;!13080&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve deploy environment chatops slash command (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13150&quot;&gt;!13150&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix asynchronous JavaScript paths when GitLab is installed under a relative URL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13165&quot;&gt;!13165&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Properly affix navigation bar in job view in Microsoft Edge (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13175&quot;&gt;!13175&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix new navigation breadcrumb title on help pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13151&quot;&gt;!13151&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix badge positioning in new navigation for Firefox (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13186&quot;&gt;!13186&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;:focus&lt;&#x2F;code&gt; styles for selected filter dropdown items (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13070&quot;&gt;!13070&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix height of issue boards with new navigation (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12985&quot;&gt;!12985&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make issuable search bar full height (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13046&quot;&gt;!13046&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Present Related Issues widget for logged-out users when available (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2525&quot;&gt;!2525&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;500&lt;&#x2F;code&gt; error in view when remote mirror &lt;code&gt;last_update_at&lt;&#x2F;code&gt; is &lt;code&gt;nil&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2542&quot;&gt;!2542&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Update Mattermost to &lt;code&gt;4.0.2&lt;&#x2F;code&gt;, fixing GitLab SSO for non &lt;code&gt;en&lt;&#x2F;code&gt; locales (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1808&quot;&gt;!1808&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.4.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/28/gitlab-9-dot-4-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/28/gitlab-9-dot-4-dot-2-released/</id>
<published>2017-07-28T00:00:00+00:00</published>
<updated>2017-07-28T00:00:00+00:00</updated>
<author>
<name>Mike Greiling</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.4.2 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;22&#x2F;gitlab-9-4-released&#x2F;&quot;&gt;this month&#x27;s 9.4.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix job merge request link to a forked source project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12965&quot;&gt;!12965&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve redirect route query performance. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13062&quot;&gt;!13062&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow admin to &lt;code&gt;read_users_list&lt;&#x2F;code&gt; even if it&#x27;s restricted. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13066&quot;&gt;!13066&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 500 error caused by pending delete projects in admin dashboard. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13067&quot;&gt;!13067&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add instrumentation to &lt;code&gt;MarkupHelper#link_to_gfm&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13069&quot;&gt;!13069&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pending delete projects should not show in deploy keys. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13088&quot;&gt;!13088&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix sizing of custom header logo in new navigation.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix crash on &#x2F;help&#x2F;ui.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix creating merge request diffs when diff contains bytes that are invalid in UTF-8.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix vertical alignment of New Project button.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add LDAP SSL certificate verification option.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix vertical alignment in Firefox and Safari for pipeline mini graph.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add lower bound to pull mirror scheduling feature. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2366&quot;&gt;!2366&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add warning and option toggle when rebuilding authorized_keys. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2508&quot;&gt;!2508&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix CSS for mini graph with downstream pipeline.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Rename board to boards in new project sidebar.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix Rebasing not working with Merge Requests.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix issue boards focus mode when new navigation is turned on.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Update LDAP SSL config: Rename method to encryption. Add ca_cert, ssl_version and verify_certificates&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.4.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/25/gitlab-9-dot-4-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/25/gitlab-9-dot-4-dot-1-released/</id>
<published>2017-07-25T00:00:00+00:00</published>
<updated>2017-07-25T00:00:00+00:00</updated>
<author>
<name>Mike Greiling</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.4.1 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;22&#x2F;gitlab-9-4-released&#x2F;&quot;&gt;this month&#x27;s 9.4.0 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipeline_schedules pages throwing error 500 (when ref is empty). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12983&quot;&gt;!12983&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix editing project with container images present. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13028&quot;&gt;!13028&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix some invalid entries in PO files. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13032&quot;&gt;!13032&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cross site request protection when logging in as a regular user when LDAP is enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13049&quot;&gt;!13049&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug causing metrics files to be truncated. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;35420&quot;&gt;!35420&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix anonymous access to public projects in groups with pending invites. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13037&quot;&gt;!13037&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue boards sidebar close icon size. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12991&quot;&gt;!12991&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix duplicate new milestone buttons when new navigation is turned on. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13033&quot;&gt;!13033&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix margins in the mini graph for pipeline in commits box. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;13014&quot;&gt;!13014&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Clean up mirror capacity in project destroy service if project is a scheduled mirror. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2445&quot;&gt;!2445&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix unscoping of imposed capacity limit by find_each method on Mirror scheduler. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2460&quot;&gt;!2460&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove text underline from suggested approvers. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2487&quot;&gt;!2487&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.4 released with Related Issues and Web Application Monitoring</title>
<release>9.4</release>
<link href='https://about.gitlab.com/releases/2017/07/22/gitlab-9-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/22/gitlab-9-4-released/</id>
<published>2017-07-22T00:00:00+00:00</published>
<updated>2017-07-22T00:00:00+00:00</updated>
<author>
<name>Marcia Ramos</name>
</author>
<content type='html'>&lt;p&gt;Surprise is harder to achieve when you do everything in the open. But working in the
open gives us the power to tell you why we&#x27;re shipping what we&#x27;re releasing today and how
this release is setting up GitLab for something even better in the future.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab 9.4 lays the foundation of much that is to come, while still giving you some
new powers today. You can now formally &lt;a href=&quot;#related-issues&quot;&gt;relate issues&lt;&#x2F;a&gt;
to each other, our out-of-the-box-magic monitoring now
&lt;a href=&quot;#web-application-monitoring&quot;&gt;collects many more metrics&lt;&#x2F;a&gt; without any
configuration and we&#x27;ve quadrupled the things you can do with variables in CI.&lt;&#x2F;p&gt;

&lt;p&gt;On top of this, we&#x27;re giving you an actual glimpse into the future with a opt-in
Beta of our &lt;a href=&quot;#new-navigation&quot;&gt;new navigation&lt;&#x2F;a&gt;. We hope that we can work with you to make it an
improvement everyone loves.&lt;&#x2F;p&gt;

&lt;p&gt;We are also thrilled to announce that we are shipping a &lt;a href=&quot;#gitlab-power-up-for-trello&quot;&gt;GitLab PowerUp for Trello&lt;&#x2F;a&gt;,
making it easy for you to integrate your Trello boards with GitLab! 🎉&lt;&#x2F;p&gt;

&lt;p&gt;Additionally, to empower our integrations set, we&#x27;re keen to make your life easier with
our new &lt;a href=&quot;#gitlab-slack-app-for-gitlab.com&quot;&gt;Slack App for GitLab.com&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;And if one glimpse doesn&#x27;t suffice, we&#x27;re aiming to
fully automate the configuration of your DevOps toolchain with the vision of &lt;strong&gt;Auto DevOps&lt;&#x2F;strong&gt;,
which will analyze your application and automatically configure your CI&#x2F;CD pipeline to build, test, and deploy to Kubernetes.
To see where we’re heading, check out
&lt;a href=&quot;&#x2F;blog&#x2F;2017&#x2F;06&#x2F;29&#x2F;whats-next-for-gitlab-ci&#x2F;#auto-devops-is-next&quot;&gt;our vision for Auto DevOps&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;9_4&#x2F;9_4-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.3.9, 9.2.9, 9.1.9 and 9.0.12 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/20/gitlab-9-dot-3-dot-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/20/gitlab-9-dot-3-dot-9-released/</id>
<published>2017-07-20T23:59:00+00:00</published>
<updated>2017-07-20T23:59:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.3.9, 9.2.9, 9.1.9 and 9.0.12 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important fix that solves an &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;mudge&#x2F;re2&#x2F;issues&#x2F;32&quot;&gt;infinite loop bug&lt;&#x2F;a&gt;
with the mudge&#x2F;re2 library. This bug locks up Sidekiq processing for instances using GitLab CI. We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all affected GitLab installations be upgraded to one of these versions &lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For more details, see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;24570&quot;&gt;issue regarding the original security vulnerability&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;support&#x2F;issues&#x2F;707#note_35538345&quot;&gt;the events that transpired during the prior release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE: 9.0.11&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE+EE: 9.1.8&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE+EE: 9.2.8&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE+EE: 9.3.8&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.3.8, 9.2.8, 9.1.8, 9.0.11, and 8.17.7 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/19/gitlab-9-dot-3-dot-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/19/gitlab-9-dot-3-dot-8-released/</id>
<published>2017-07-19T23:59:00+00:00</published>
<updated>2017-07-19T23:59:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.3.8, 9.2.8, 9.1.8, 9.0.11, and 8.17.7 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including an important security
fixes for two authorization bypass vulnerabilities (post-authentication), protection against
denial-of-service attacks in regular expressions, important security patches for Mattermost,
and protections for exporting issues to Microsoft Excel via CSV files. We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt;
that all affected GitLab installations be upgraded to one of these versions
&lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;projects-in-subgroups-authorization-bypass-with-sql-wildcards-cve-2017-11438&quot;&gt;Projects in subgroups authorization bypass with SQL wildcards (CVE-2017-11438)&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review disclosed that by choosing a namespace with underscores
an authenticated user could take advantage of a badly written SQL query to add themselves
to any project inside a subgroup with permissions of their choice.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was caused by a SQL query that automatically adjusts project
permissions but does not escape wildcards. This vulnerability was coincidentally patched
when the affected code was rewritten for 9.3. Therefore, versions 9.3 and above
are not vulnerable. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;33323&quot;&gt;33323&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2017-11438&quot;&gt;CVE-2017-11438&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Note: GitLab-CE+EE 8.17 is not vulnerable to this issue, however patches
have been included to improve the security of the SQL queries in 8.17.7.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE: 9.0.0 through 9.0.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE+EE: 9.1.0 through 9.1.7&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab CE+EE: 9.2.0 through 9.2.7&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;unauthorized-repository-access-by-using-project-mirrors-and-ci-gitlab-ee-only-cve-2017-11437&quot;&gt;Unauthorized repository access by using project mirrors and CI (GitLab EE only) (CVE-2017-11437)&lt;&#x2F;h2&gt;

&lt;p&gt;Peter Lloyd with &lt;a href=&quot;http:&#x2F;&#x2F;www.cambridgeconsultants.com&quot;&gt;Cambridge Consultants&lt;&#x2F;a&gt; reported that the GitLab mirroring feature
could be abused to steal copies of repositories from other users and possibly push
docker images to other user&#x27;s docker registries.&lt;&#x2F;p&gt;

&lt;p&gt;To exploit this vulnerability an authenticated user would need to create a project mirror,
invite another user, assign them as the mirror user, enable CI for the mirror,
and modify the original repository. Because the CI scripts will then be executed
as the mirror user the attacker can use the CI Token to fetch repositories belonging
to the victim. GitLab now only allows users to assign themselves as the mirror user. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;2905&quot;&gt;2905&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2017-11437&quot;&gt;CVE-2017-11437&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected-1&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab EE: 8.5.0-8.17.6&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE: 9.0.0-9.0.10&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE: 9.1.0-9.1.7&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE: 9.2.0-9.2.7&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab EE: 9.3.0-9.3.7&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;There are no workaround for these vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-fixes-in-938-928-918-9011-and-8177&quot;&gt;Other fixes in 9.3.8, 9.2.8, 9.1.8, 9.0.11, and 8.17.7&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;symlink-cleanup-from-a-previous-security-release&quot;&gt;Symlink cleanup from a previous security release&lt;&#x2F;h3&gt;

&lt;p&gt;The &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;07&#x2F;gitlab-9-dot-2-dot-5-security-release&#x2F;&quot;&gt;9.2.5 security release&lt;&#x2F;a&gt; contained a fix for a data corruption vulnerability
involving file uploads. This fix utilized symlinks to migrate file uploads to a
new directory. Due to a typo in the included migration a symlink was accidentally
left behind after the migration finished. This symlink can cause problems with
instance backups. A fix is included with these releases to remove the problematic
symlink. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;34056&quot;&gt;34056&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: GitLab CE+EE 9.0.10, 9.1.7, 9.2.5-9.2.7, 9.3.0-9.3.7&lt;&#x2F;p&gt;

&lt;h3 id=&quot;accidental-or-malicious-use-of-reserved-names-in-group-names-could-cause-deletion-of-all-snippet-uploads&quot;&gt;Accidental or malicious use of reserved names in group names could cause deletion of all snippet uploads&lt;&#x2F;h3&gt;

&lt;p&gt;The &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;07&#x2F;gitlab-9-dot-2-dot-5-security-release&#x2F;&quot;&gt;9.2.5 security release&lt;&#x2F;a&gt; contained a fix for a data corruption vulnerability
involving file uploads. After the release of 9.2.5 an internal code review
determined that the recently introduced snippet file uploads feature was also vulnerable
to file deletion. Snippet uploads have now been moved into the protected &lt;code&gt;system&lt;&#x2F;code&gt; namespace. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;33359&quot;&gt;33359&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: GitLab CE+EE 9.3.0-9.3.7&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-name-leak-on-todos-page&quot;&gt;Project name leak on todos page&lt;&#x2F;h3&gt;

&lt;p&gt;An internal code review discovered that forceful browsing could be utilized to disclose
the names of private projects. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;33303&quot;&gt;33303&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: GitLab CE+EE 8.10.0-8.17.6, 9.0.0-9.0.10, 9.1.0-9.1.7, 9.2.0-9.2.7, 9.3.0-9.3.7&lt;&#x2F;p&gt;

&lt;h3 id=&quot;denial-of-service-via-regular-expressions-in-ci-process&quot;&gt;Denial of Service via regular expressions in CI process&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;lksv&quot;&gt;Lukas Svoboda&lt;&#x2F;a&gt; reported that regular expressions (regex) included with CI scripts could be
utilized to perform a denial-of-service attack on GitLab instances. GitLab now uses
the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;re2&quot;&gt;re2 Regex library&lt;&#x2F;a&gt; to limit regex execution time. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;24570&quot;&gt;24570&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: GitLab CE+EE 8.0.0-8.17.6, 9.0.0-9.0.10, 9.1.0-9.1.7, 9.2.0-9.2.7, 9.3.0-9.3.7&lt;&#x2F;p&gt;

&lt;h3 id=&quot;issue-title-leakage-when-external-issue-tracker-is-enabled&quot;&gt;Issue title leakage when external issue tracker is enabled&lt;&#x2F;h3&gt;

&lt;p&gt;An internal code review determined that when an external issue tracker is configured
it was possible to discover the titles of all issues in a given GitLab instance,
including issues in private projects and confidential issues. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;33679&quot;&gt;33679&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: GitLab CE+EE 8.14.0-8.17.6, 9.0.0-9.0.10, 9.1.0-9.1.7, 9.2.0-9.2.7, 9.3.0-9.3.7&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-security-update&quot;&gt;Mattermost security update&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Omnibus packages now include the latest versions of Mattermost, including
the most recent security patches. Mattermost has not yet released details on the
patched vulnerabilities but is encouraging all users to upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;These updates are only available for GitLab CE+EE 9.1, 9.2, and 9.3. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2576&quot;&gt;2576&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: All GitLab versions prior to 9.3.8, 9.2.8, and 9.1.8.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;client-side-command-execution-in-microsoft-excel-using-issue-exports-ee-only&quot;&gt;Client-side command execution in Microsoft Excel using issue exports (EE only)&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;EdOverflow&quot;&gt;Edio&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that the export to CSV feature for project issues
in GitLab EE could be abused to execute arbitrary commands on a victim&#x27;s computer
if the resulting CSV file were opened in Microsoft Excel. For this attack to work
an attacker must have the ability to create or edit issues in a project and must trick
a victim into exporting and opening the CSV file containing the malicious issue
text in Microsoft Excel.&lt;&#x2F;p&gt;

&lt;p&gt;All issue contents containing dangerous characters are now escaped upon export
by prepending a single quote to each column. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30250&quot;&gt;30250&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Affected versions: GitLab EE 9.0.0-9.0.10, 9.1.0-9.1.7, 9.2.0-9.2.7, 9.3.0-9.3.7&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions includes two small migrations to remove a leftover symlink and
and move private snippet uploads to the &lt;code&gt;system&lt;&#x2F;code&gt; directory. These migrations
should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.3.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/18/gitlab-9-dot-3-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/18/gitlab-9-dot-3-dot-7-released/</id>
<published>2017-07-18T00:00:00+00:00</published>
<updated>2017-07-18T00:00:00+00:00</updated>
<author>
<name>Kushal Pandya</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.3.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;11&#x2F;gitlab-9-dot-3-dot-6-released&#x2F;&quot;&gt;this month&#x27;s 9.3.6 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent bad data being added to application settings when Redis is unavailable (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12750&quot;&gt;!12750&lt;&#x2F;a&gt;) - Update: this fix also addresses a security vulnerability as described in this &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;08&#x2F;03&#x2F;recent-bug-could-enable-signups&#x2F;&quot;&gt;addendum&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Return &lt;code&gt;is_admin&lt;&#x2F;code&gt; attribute in the GET &#x2F;user endpoint for admins (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12811&quot;&gt;!12811&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixes Project EE specific logic port error (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2251&quot;&gt;!2251&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Reset available mirror capacity to 0 when it falls below 0 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2409&quot;&gt;!2409&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing July 19, 2017 Critical Security Update</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/14/gitlab-critical-release-preannouncement/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/14/gitlab-critical-release-preannouncement/</id>
<published>2017-07-14T00:00:00+00:00</published>
<updated>2017-07-14T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;On Wednesday, July 19th, 2017 at 23:59 UTC, we will publish a critical GitLab
security update. More details will be forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;, including
which versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.3.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/11/gitlab-9-dot-3-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/11/gitlab-9-dot-3-dot-6-released/</id>
<published>2017-07-11T00:00:00+00:00</published>
<updated>2017-07-11T00:00:00+00:00</updated>
<author>
<name>Clement Ho</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;05&#x2F;gitlab-9-dot-3-dot-5-released&#x2F;&quot;&gt;this month&#x27;s 9.3.5 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Username and password are no longer stripped from import url on mirror update (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12725&quot;&gt;!12725&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed GFM references not being included when updating issues inline (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12720&quot;&gt;!12720&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update docs to mention that 9.3 also needs &lt;code&gt;log_bin_trust_function_creators&lt;&#x2F;code&gt; on MySQL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12687&quot;&gt;!12687&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issues with non-UTF8 filenames by always fixing the encoding of tree and blob paths (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12636&quot;&gt;!12636&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix API Scoping (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12300&quot;&gt;!12300&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update grpc to 1.4.0 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12387&quot;&gt;!12387&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Extend MR tabs to cover up the avatar holder and collapse icon on scroll (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12589&quot;&gt;!12589&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Increase z index of mini pipeline dropdown (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12767&quot;&gt;!12767&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Update alpha database documentation to reflect change in attribute (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2252&quot;&gt;!2252&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: Fix clone instructions in a secondary node for SSH protocol (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2319&quot;&gt;!2319&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Implement progressive elasticsearch indexing for project mirrors (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2393&quot;&gt;!2393&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.3.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/05/gitlab-9-dot-3-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/05/gitlab-9-dot-3-dot-5-released/</id>
<published>2017-07-05T00:00:00+00:00</published>
<updated>2017-07-05T00:00:00+00:00</updated>
<author>
<name>James Edwards-Jones</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.3.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;07&#x2F;04&#x2F;gitlab-9-dot-3-dot-4-released&#x2F;&quot;&gt;this month&#x27;s 9.3.4 release&lt;&#x2F;a&gt; and
prior versions.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;More actions dropdown hidden by end of diff&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12380&quot;&gt;!12380&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove &quot;Remove from board&quot; button from backlog and closed list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12430&quot;&gt;!12430&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a bug where an invalid sort param value was passed to Gitaly (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12534&quot;&gt;!12534&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Set default for Remove source branch to false (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12576&quot;&gt;!12576&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not delete protected branches when deleting all merged branches (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12624&quot;&gt;!12624&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Document that GitLab 9.3 requires the TRIGGER permission on MySQL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12573&quot;&gt;!12573&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent accidental deletion of protected MR source branch by repeating checks before actual deletion (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12574&quot;&gt;!12574&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Rebuild the dynamic path before validating it (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12213&quot;&gt;!12213&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make clear that Go 1.8 is required since GitLab 9.2 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12564&quot;&gt;!12564&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Expire full_path cache after a repository is renamed&#x2F;transferred (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12575&quot;&gt;!12575&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove placeholder note when award emoji slash command is applied (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12545&quot;&gt;!12545&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update prometheus client gem (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12632&quot;&gt;!12632&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Make admin mirror application setting Gitlab.com exclusive (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2307&quot;&gt;!2307&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix approvals request throwing 400 in IE 11 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2306&quot;&gt;!2306&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add more logging to repository mirror feature (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2292&quot;&gt;!2292&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Make &lt;code&gt;Geo::RepositorySyncService&lt;&#x2F;code&gt; force create a repo (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2316&quot;&gt;!2316&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Update &lt;code&gt;gitlab-monitor&lt;&#x2F;code&gt; to &lt;code&gt;1.9.0&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1703&quot;&gt;omnibus-gitlab!1703&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix port not being passed to pg_basebackup in replicate-geo-database script (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1697&quot;&gt;omnibus-gitlab!1697&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.3.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/07/04/gitlab-9-dot-3-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/07/04/gitlab-9-dot-3-dot-4-released/</id>
<published>2017-07-04T00:00:00+00:00</published>
<updated>2017-07-04T00:00:00+00:00</updated>
<author>
<name>James Edwards-Jones</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.3.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;28&#x2F;gitlab-9-dot-3-dot-2-released&#x2F;&quot;&gt;this month&#x27;s 9.3.2 release&lt;&#x2F;a&gt; and
prior versions. A fix is also included for the 9.3.3 release which we decided
not to announce, and is &lt;a href=&quot;#what-happened-to-933&quot;&gt;described below&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix head pipeline stored in merge request for external pipelines (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12478&quot;&gt;!12478&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bring back branches badge to main project page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12548&quot;&gt;!12548&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix diff of requirements.txt file by not matching newlines as part of package names (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12495&quot;&gt;!12495&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Perform housekeeping only when an import of a fresh project is completed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12529&quot;&gt;!12529&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue boards closed list not showing all closed issues (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12271&quot;&gt;!12271&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix multi-line markdown tooltip buttons in issue edit form (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12549&quot;&gt;!12549&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Display no error message if user is not logged in when using issuable search bar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12415&quot;&gt;!12415&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Adds missing encoding coercion calls on Gitaly ref responses (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12522&quot;&gt;!12522&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix scroll flicker on pages with a sidebar where viewport overflows (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12501&quot;&gt;!12501&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent top of Job trace page being obscured when a banner is active (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12556&quot;&gt;!12556&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt; to &lt;code&gt;5.1.1&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell&#x2F;merge_requests&#x2F;142&quot;&gt;gitlab-shell!142&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add metrics to both remote and non remote mirroring (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2118&quot;&gt;!2118&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Force import worker with mirror to insert mirror in front of queue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2231&quot;&gt;!2231&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix locked and stale SSH keys file from &lt;code&gt;9.3.0&lt;&#x2F;code&gt; upgrade (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2240&quot;&gt;!2240&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix crash in LDAP sync when user was removed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2289&quot;&gt;!2289&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Allow rebase for unapproved merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2273&quot;&gt;!2273&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo - Fix &lt;code&gt;path_with_namespace&lt;&#x2F;code&gt; for instances of &lt;code&gt;Geo::DeletedProject&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2267&quot;&gt;!2267&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix shared runners minutes query to update only projects with used allowance (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2275&quot;&gt;!2275&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Allow sidekiq-cluster to run without having sidekiq enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1691&quot;&gt;omnibus-gitlab!1691&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Remove outdated Mattermost v2 DB upgrade code (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1689&quot;&gt;omnibus-gitlab!1689&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Switch &lt;code&gt;postgresql[&#x27;custom_pg_hba_entries&#x27;]&lt;&#x2F;code&gt; from Array to Hash (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1682&quot;&gt;omnibus-gitlab!1682&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;what-happened-to-933&quot;&gt;What happened to 9.3.3?&lt;&#x2F;h2&gt;

&lt;p&gt;The &lt;code&gt;9.3.3&lt;&#x2F;code&gt; packages were automatically released before we&#x27;d installed them on
Gitlab.com, and upon noticing errors with Post Receive processing (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;2822&quot;&gt;#2822&lt;&#x2F;a&gt;) we
advised users to continue using &lt;code&gt;9.3.2&lt;&#x2F;code&gt;. Only &lt;code&gt;9.3.3-ee&lt;&#x2F;code&gt; was affected.&lt;&#x2F;p&gt;

&lt;p&gt;This &lt;code&gt;9.3.4&lt;&#x2F;code&gt; release updates gitlab-shell to include the fix for both CE and
EE.&lt;&#x2F;p&gt;

&lt;p&gt;Going forward we are changing our build process so packages are not made
public until we&#x27;re ready to announce them here (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1683&quot;&gt;!1683&lt;&#x2F;a&gt;).&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes two small migrations and a background migration.
These relate to &lt;code&gt;authorized_keys_enabled&lt;&#x2F;code&gt; for (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2240&quot;&gt;!2240&lt;&#x2F;a&gt;) and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.3.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/06/28/gitlab-9-dot-3-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/06/28/gitlab-9-dot-3-dot-2-released/</id>
<published>2017-06-28T00:00:00+00:00</published>
<updated>2017-06-28T00:00:00+00:00</updated>
<author>
<name>Clement Ho</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.3.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;27&#x2F;gitlab-9-dot-3-dot-1-released&#x2F;&quot;&gt;this month&#x27;s 9.3.1 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Submitting reply to existing diff discussion using Cmd&#x2F;Ctrl+Enter submits twice and refreshes page&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12352&quot;&gt;!12352&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Unable to access edit comment from dropdown menu in certain screen sizes&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12421&quot;&gt;!12421&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Revert &quot;Annotate&quot; to &quot;Blame&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12401&quot;&gt;!12401&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix optional arguments for POST :id&#x2F;variables (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12474&quot;&gt;!12474&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes problem with the Action Buttons on a Label Item Line (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12473&quot;&gt;!12473&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix application error when Project#last_activity_at is nil (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12443&quot;&gt;!12443&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Truncate long job names in environment view; wrap author to next line (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12455&quot;&gt;!12455&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump premailer-rails gem to 1.9.7 and its dependencies to prevent network retrieval of assets (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12456&quot;&gt;!12456&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug where Service &lt;code&gt;created_at&lt;&#x2F;code&gt; time was used instead of deployment time. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12395&quot;&gt;!12395&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update mmap2 gem to fix missing symbol error that happens on some installations from source (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12492&quot;&gt;!12492&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;gitlab:check&lt;&#x2F;code&gt; Rake task when Elasticsearch used (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2278&quot;&gt;!2278&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Resolve &quot;LDAP group link select dropdown error&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2277&quot;&gt;!2277&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Update gitlab-monitor to 1.8.0 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1685&quot;&gt;!1685&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.3.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/06/27/gitlab-9-dot-3-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/06/27/gitlab-9-dot-3-dot-1-released/</id>
<published>2017-06-27T00:00:00+00:00</published>
<updated>2017-06-27T00:00:00+00:00</updated>
<author>
<name>Clement Ho</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.3.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;22&#x2F;gitlab-9-3-released&#x2F;&quot;&gt;this month&#x27;s 9.3 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes ctrl+enter not submit issue edit form (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12422&quot;&gt;!12422&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Perform project housekeeping after importing projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12323&quot;&gt;!12323&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Replace &#x27;Settings ➔ CI&#x2F;CD Pipelines&#x27; with &#x27;Settings ➔ Pipelines&#x27; in docs&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12433&quot;&gt;!12433&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t match tilde and exclamation mark as part of requirements.txt package name (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12431&quot;&gt;!12431&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix breadcrumb order (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12322&quot;&gt;!12322&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 500 on failure to create a private group (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12394&quot;&gt;!12394&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Encode Gitaly diff patches properly (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12368&quot;&gt;!12368&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add padding to target branch container (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12353&quot;&gt;!12353&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove layout nav from scroll calculation (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12399&quot;&gt;!12399&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix offset for fixed nav (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12365&quot;&gt;!12365&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;&quot;Add Members&quot; drop-down doesn&#x27;t separate Name&#x2F;Username&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12376&quot;&gt;!12376&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix mobile environment detail view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12382&quot;&gt;!12382&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix dropdown position for the new button on mobile for the top navbar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12388&quot;&gt;!12388&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix linking to line number on parallel diff creating empty discussion box (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12332&quot;&gt;!12332&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Can&#x27;t sort Groups&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12204&quot;&gt;!12204&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Rename settings panel &quot;close&quot; action to &quot;collapse&quot; to avoid confusion&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12027&quot;&gt;!12027&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; don&#x27;t show &quot;Someone edited the issue&quot; warning when saving issue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12371&quot;&gt;!12371&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only show gray footer space if environment actions exist (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12315&quot;&gt;!12315&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update templates for 9.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12041&quot;&gt;!12041&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update dependencies list for 9.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12042&quot;&gt;!12042&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update guide for 9.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12038&quot;&gt;!12038&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add CE-to-EE guide for 9.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2101&quot;&gt;!2101&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove &quot;Write to authorized_keys file&quot; setting while it is being fixed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2257&quot;&gt;!2257&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Ensure the postgresql user is created for use in the postgres exporter (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1669&quot;&gt;!1669&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Use the new &lt;code&gt;gettext:compile&lt;&#x2F;code&gt; script to process PO files (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1666&quot;&gt;!1666&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;ssh-key-issue&quot;&gt;SSH key issue&lt;&#x2F;h2&gt;

&lt;p&gt;The &quot;Write to authorized_keys file&quot; setting that was added in 9.3.0 has been
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2257&quot;&gt;temporarily removed&lt;&#x2F;a&gt;
while it is being fixed, but installations that were upgraded to 9.3.0 may have
an out-of-date authorized_keys file. It can be rebuilt with
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;raketasks&#x2F;maintenance.html#rebuild-authorized_keys-file&quot;&gt;the rake task&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.3 released with Code Quality and Multi-Project Pipeline Graphs</title>
<release>9.3</release>
<link href='https://about.gitlab.com/releases/2017/06/22/gitlab-9-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/06/22/gitlab-9-3-released/</id>
<published>2017-06-22T00:00:00+00:00</published>
<updated>2017-06-22T00:00:00+00:00</updated>
<author>
<name>Fabio Busatto</name>
</author>
<content type='html'>&lt;p&gt;GitLab is an integrated product for the entire software development lifecycle.
With each monthly release, we work to bring more aspects of social coding,
continuous integration, release automation, and monitoring into a single tool.
With GitLab 9.3, we&#x27;re helping teams improve code quality, reduce cycle time and
make complex projects easier to manage.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab 9.3 introduces &lt;a href=&quot;#gitlab-code-quality&quot;&gt;Code Quality&lt;&#x2F;a&gt; reports displayed directly in the Merge Request widget!
Code Quality gives you immediate insight into how a change will affect the health of your code and project.
This will reduce your review time and allow you to catch mistakes before merging a change.&lt;&#x2F;p&gt;

&lt;p&gt;Modern production-level software is often composed of many different projects,
especially those adopting micro-services architecture.
Therefore, understanding the relationships between these projects is crucial.
With GitLab 9.3, you can see how upstream and downstream project pipelines are linked together
with &lt;a href=&quot;#multi-project-pipeline-graphs&quot;&gt;Multi-Project Pipelines Graphs&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;In addition, this release gives you an extremely powerful way to compare your usage of
each facet of GitLab with other people, using the &lt;a href=&quot;#conversational-development-index&quot;&gt;Conversational Development Index&lt;&#x2F;a&gt;.
The ConvDev Index gives you a quick overview of how you perform in going from Idea to Production and
where you have the opportunity to optimise.&lt;&#x2F;p&gt;

&lt;p&gt;To give you a quick idea of the power of GitLab, we&#x27;ve recorded a short demo that highlights
some of GitLab&#x27;s new features.
Enjoy the ability to have your entire development workflow in one single platform!&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;IZ3ABxXMXMs&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;9_3&#x2F;9_3-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.2.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/06/21/gitlab-9-dot-2-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/06/21/gitlab-9-dot-2-dot-7-released/</id>
<published>2017-06-21T00:00:00+00:00</published>
<updated>2017-06-21T00:00:00+00:00</updated>
<author>
<name>Timothy Andrew</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.2.7 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;15&#x2F;gitlab-9-dot-2-dot-6-released&#x2F;&quot;&gt;this month&#x27;s 9.2.6 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Re-instate is_admin flag in users API is current user is an admin (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12211&quot;&gt;!12211&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix omniauth-google-oauth2 dependencies in Gemfile.lock (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11787&quot;&gt;!11787&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix milestone page assignees when dropped in ongoing list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12076&quot;&gt;!12076&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Backport Geo: Dynamic Backoff strategy to 9 2 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2135&quot;&gt;!2135&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Don&#x27;t disable Rebase button for MR without Approvals (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2031&quot;&gt;!2031&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Refresh LDAP-users project authorizations on group sync (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2145&quot;&gt;!2145&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus&lt;&#x2F;strong&gt;: Only use gitlab-monitor for postgres databases (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1618&quot;&gt;!1618&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading to &lt;code&gt;9.2.7&lt;&#x2F;code&gt; requires no downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.2.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/06/15/gitlab-9-dot-2-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/06/15/gitlab-9-dot-2-dot-6-released/</id>
<published>2017-06-15T00:00:00+00:00</published>
<updated>2017-06-15T00:00:00+00:00</updated>
<author>
<name>Timothy Andrew</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.2.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;06&#x2F;07&#x2F;gitlab-9-dot-2-dot-5-security-release&#x2F;&quot;&gt;this month&#x27;s 9.2.5 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Assignee dropdown does not display selected assignee (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11744&quot;&gt;!11744&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Resolve &quot;pipeline_schedules pages throwing error 500&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11706&quot;&gt;!11706&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix error thrown with missing note fragment in DOM (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11700&quot;&gt;!11700&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix incorrect ETag cache key when relative instance URL is used (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11964&quot;&gt;!11964&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Make sure reCAPTCHA configuration is loaded when spam checks are initiated (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;12080&quot;&gt;!12080&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix math rendering on blob pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11793&quot;&gt;!11793&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix note header author and time ago wrapping in parallel diff (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11702&quot;&gt;!11702&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: nil-check Repository::is_ancestor? (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11976&quot;&gt;!11976&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix backup task to continue on corrupt repositories (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11962&quot;&gt;!11962&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Backport from EE: Fix &#x27;&#x2F;unassign&#x27; slash command (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11926&quot;&gt;!11926&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix filtered search issuable empty state exception (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11347&quot;&gt;!11347&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Use headless Google Chrome browser in GitLab QA (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11680&quot;&gt;!11680&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fixed issue boards not filtering when URL params are encoded (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11320&quot;&gt;!11320&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix LFS timeouts when trying to save large files (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11866&quot;&gt;!11866&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Only remove FK if it exists (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11828&quot;&gt;!11828&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix alignment of tree symbols in merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11761&quot;&gt;!11761&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Resolve &quot;User autocomplete per_page does not work&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11742&quot;&gt;!11742&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix issue realtime title&#x2F;description change CSS transition (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11731&quot;&gt;!11731&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Remove 0 margin bottom for last paragraph on note text (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11699&quot;&gt;!11699&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix alignment of hover state on emoji button (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11691&quot;&gt;!11691&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Show private subgroups if member of parent group (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11773&quot;&gt;!11773&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix description flash with newline differences (HTML entities) (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11946&quot;&gt;!11946&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Center loading spinner in issuable filters (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11818&quot;&gt;!11818&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Remove extra bottom padding on Job log page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11791&quot;&gt;!11791&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix alignment of tree symbols in merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11761&quot;&gt;!11761&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix: Milestone - Participants list is showing duplicate assignees (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11758&quot;&gt;!11758&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Strip trailing whitespaces in submodule URLs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11753&quot;&gt;!11753&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix counter cache invalidation (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11736&quot;&gt;!11736&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Displays loading icon in async buttons inline (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11735&quot;&gt;!11735&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Resolve &quot;Browser notifications for pipeline running in a MR is gone&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11734&quot;&gt;!11734&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Resolve &quot;Resolved discussions icon is misaligned&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11711&quot;&gt;!11711&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Set emoji-menu z-index to 200 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11686&quot;&gt;!11686&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Provide default for calculating label text color (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11681&quot;&gt;!11681&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Use #real_next_run in pipelines table (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11660&quot;&gt;!11660&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix terminals support for Kubernetes service (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11653&quot;&gt;!11653&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Check only a merge ability for protected actions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11648&quot;&gt;!11648&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Disable &quot;Remove source branch&quot; in MR Widget for users who can&#x27;t remove, and re-add checkbox to MR form (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11558&quot;&gt;!11558&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Return the last coverage in trace stream (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11128&quot;&gt;!11128&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Geo - Properly set tracking database connection and cron jobs on secondary node (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1987&quot;&gt;!1987&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Fix locked milestone in boards being remove-able - 9.2 merge edition (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1977&quot;&gt;!1977&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Check if database_geo.yml exist before setting the tracking DB config (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2071&quot;&gt;!2071&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Resolve &quot;Approvers don&#x27;t appear when MR is created from a fork&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2035&quot;&gt;!2035&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Fixed header being over issue boards in focus mode (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2002&quot;&gt;!2002&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Fix Error 500 when viewing a merge request with a deleted source project (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1996&quot;&gt;!1996&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Fix bug where files over 2 GB would not be saved in Geo tracking DB (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1992&quot;&gt;!1992&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Add per page to user autocomplete (EE) (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1991&quot;&gt;!1991&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Fix &#x27;&#x2F;unassign&#x27; slash command (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1986&quot;&gt;!1986&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: re-add avatar url to approver avatar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2034&quot;&gt;!2034&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Ee fix kubernetes namespace (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2014&quot;&gt;!2014&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: MR approval placeholders same size as images (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;2007&quot;&gt;!2007&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Resolve &quot;Deploy boards won&#x27;t stop spinning on 9.2.1-ee&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1983&quot;&gt;!1983&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus&lt;&#x2F;strong&gt;: Add default values to GitLab Geo roles (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1608&quot;&gt;!1608&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus&lt;&#x2F;strong&gt;: Fix gitlab-ctl replicate-geo-database when run in a Docker container (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1612&quot;&gt;!1612&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus&lt;&#x2F;strong&gt;: Resolve &quot;Permission denied when mounting volume for &#x2F;var&#x2F;opt&#x2F;gitlab&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1603&quot;&gt;!1603&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading to &lt;code&gt;9.2.6&lt;&#x2F;code&gt; requires no downtime.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab EE contains a single migration only used by Geo secondary nodes. We&#x27;re
adding a database-level limit to an integer field for the Geo tracking database.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.2.5, 9.1.7, and 9.0.10 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/06/07/gitlab-9-dot-2-dot-5-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/06/07/gitlab-9-dot-2-dot-5-security-release/</id>
<published>2017-06-07T00:00:00+00:00</published>
<updated>2017-06-07T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.2.5, 9.1.7, and 9.0.10 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note: Please see the warnings in the Upgrade barometer section before upgrading.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Note: Versions 9.2.3-9.2.4, 9.1.5-9.1.6, and 9.0.8-9.0.9 contain incomplete fixes for the reserved namespaces &#x2F; group renaming issue&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including a fix for a difficult
to exploit persistent Cross-Site Scripting (XSS) vulnerability, improvements to
API protections when using session authentication, fixes for several
information disclosure vulnerabilities, and a fix for a flaw that could allow
the deletion of project avatars. We recommend that all GitLab installations be
upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-when-editing-comments&quot;&gt;Cross-Site Scripting (XSS) vulnerability when editing comments&lt;&#x2F;h2&gt;

&lt;p&gt;A GitLab.com user reported that recent changes to Markdown rendering designed to
improve performance by allowing comments to be rendered client-side opened a
persistent Cross-Site Scripting (XSS) vulnerability when comments are edited
and then re-saved. This vulnerability is difficult to exploit because a victim
must be tricked into editing and then saving another user&#x27;s comment. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;32908&quot;&gt;#32908&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-vulnerable-to-embedding-in-iframes-using-session-auth&quot;&gt;API vulnerable to embedding in iFrames using Session Auth&lt;&#x2F;h2&gt;

&lt;p&gt;A tip from a Twitter user led to an internal code audit that discovered a malicious
website could embed a GitLab API URL inside an iFrame, possibly tricking a user
into thinking that the website had access to the user&#x27;s GitLab user information. This
attack would not disclose the user&#x27;s data to the malicious website, but it could
cause confusion and the API has added an &lt;code&gt;X-Frame-Options&lt;&#x2F;code&gt; header to prevent
content from the API being included in iFrames. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;32557&quot;&gt;#32557&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;accidental-or-malicious-use-of-reserved-names-in-group-names-could-cause-deletion-of-all-project-avatars&quot;&gt;Accidental or malicious use of reserved names in group names could cause deletion of all project avatars&lt;&#x2F;h2&gt;

&lt;p&gt;A GitLab.com user reported that creating a group named &lt;code&gt;project&lt;&#x2F;code&gt; and then renaming
the group would cause all project avatars to be deleted. This was due to an improperly
constructed path variable when renaming files. To help prevent this from happening
again all avatar uploads have been moved from &lt;code&gt;&#x2F;public&#x2F;uploads&#x2F;(user|group|project)&lt;&#x2F;code&gt; to
&lt;code&gt;&#x2F;public&#x2F;uploads&#x2F;system&#x2F;(user|group|project)&lt;&#x2F;code&gt; and &lt;code&gt;system&lt;&#x2F;code&gt; has been made a
reserved namespace. A migration included with this release will rename
any existing top-level &lt;code&gt;system&lt;&#x2F;code&gt; namespace to be &lt;code&gt;system0&lt;&#x2F;code&gt; (or &lt;code&gt;system1&lt;&#x2F;code&gt;, &lt;code&gt;system2&lt;&#x2F;code&gt;, etc.) &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;28917&quot;&gt;#28917&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthenticated-disclosure-of-usernames-in-autocomplete-controller&quot;&gt;Unauthenticated disclosure of usernames in autocomplete controller&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&quot;&gt;HackerOne&lt;&#x2F;a&gt; reporter &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;evelynleems&quot;&gt;Evelyn Lee&lt;&#x2F;a&gt; reported that usernames could be enumerated
using the &lt;code&gt;autocomplete&#x2F;users.json&lt;&#x2F;code&gt; endpoint without authenticating. This
could allow an unauthenticated attacker to gather a list of all valid usernames from a GitLab
instance. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31842&quot;&gt;#31842&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-leakage-with-references-to-private-project-snippets&quot;&gt;Information leakage with references to private project snippets&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab.com user Patrick Fiedler reported that titles of private project
snippets could leak when they were referenced in other issues, merge requests,
or comments. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25934&quot;&gt;#25934&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;elasticsearch-does-not-implement-external-user-checks-correctly&quot;&gt;Elasticsearch does not implement external user checks correctly&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that on instances with Elasticsearch enabled
GitLab allowed external users to view internal project data. This could unintentionally
expose sensitive information to external users. This vulnerability only affects
EE installations with Elasticsearch enabled. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;2337&quot;&gt;#2337&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability when editing comments:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.2.0-9.2.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;API vulnerable to embedding in iFrames using Session Auth:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.13.0-9.0.7, 9.1.0-9.1.4, 9.2.0-9.2.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Accidental or malicious use of reserved names in group names could cause deletion of all project avatars:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 4.0.0-9.0.9, 9.1.0-9.1.6, 9.2.0-9.2.4&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Unauthenticated disclosure of usernames in autocomplete controller:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.7.0-9.0.7, 9.1.0-9.1.4, 9.2.0-9.2.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Information leakage with references to private project snippets&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.9.0-9.0.8, 9.1.0-9.1.5, 9.2.0-9.2.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Elasticsearch does not implement external user checks correctly:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab EE 8.7.0-9.0.7, 9.1.0-9.1.4, 9.2.0-9.2.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions include two migrations that do not require downtime but &lt;strong&gt;must be run on a node with access to the directories containing repositories and uploads&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;The first migration renames any user or top-level group with the name &lt;code&gt;system&lt;&#x2F;code&gt;
to &lt;code&gt;system0&lt;&#x2F;code&gt; (or &lt;code&gt;system1&lt;&#x2F;code&gt;, &lt;code&gt;system2&lt;&#x2F;code&gt;, etc.). &lt;strong&gt;Before running this update please
be sure to backup all repositories and file uploads in &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;git-data&lt;&#x2F;code&gt;
and &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;gitlab-rails&#x2F;uploads&lt;&#x2F;code&gt;.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The second migration moves all user, group, and project avatars and older note
and appearance uploads from &lt;code&gt;&#x2F;public&#x2F;uploads&#x2F;(user|note|group|project|appearance)&lt;&#x2F;code&gt;
to &lt;code&gt;&#x2F;public&#x2F;uploads&#x2F;system&#x2F;(user|note|group|project|appearance)&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To refresh avatar links the database cache must be cleared. This is normally done
automatically with every upgrade. If you have disabled the rake task that clears
the cache you will need to re-enable it or manually clear the Rails cache
after upgrading due to the change in project avatar locations:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;code&gt;gitlab-rake cache:clear&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.2.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/05/25/gitlab-9-dot-2-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/05/25/gitlab-9-dot-2-dot-2-released/</id>
<published>2017-05-25T00:00:00+00:00</published>
<updated>2017-05-25T00:00:00+00:00</updated>
<author>
<name>Timothy Andrew</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.2.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;05&#x2F;22&#x2F;gitlab-9-2-released&#x2F;&quot;&gt;this month&#x27;s 9.2 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve merge request widget state calculation (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11668&quot;&gt;!11668&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix right-sidebar gap on mobile (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11625&quot;&gt;!11625&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipeline ETag (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11615&quot;&gt;!11615&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent errors from non-functional notify_post_receive endpoint (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11509&quot;&gt;!11509&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Read HEAD commit and use it as sentry &quot;releases&quot; value (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11565&quot;&gt;!11565&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use refresh icon for retried jobs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11667&quot;&gt;!11667&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make all notes use equal padding (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11616&quot;&gt;!11616&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix ambiguous routing issues by teaching router about reserved words (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11570&quot;&gt;!11570&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show loading indicator while waiting for assignees first fetch (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11434&quot;&gt;!11434&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix return value when Geo nodes are not in sync (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1969&quot;&gt;!1969&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed positioning of milestone dropdown in create board dropdown (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1972&quot;&gt;!1972&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix cron worker being set to &quot;&quot; when no value was provided (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1580&quot;&gt;!1580&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version contains no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.2.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/05/23/gitlab-9-dot-2-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/05/23/gitlab-9-dot-2-dot-1-released/</id>
<published>2017-05-23T00:00:00+00:00</published>
<updated>2017-05-23T00:00:00+00:00</updated>
<author>
<name>Clement Ho</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.2.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;05&#x2F;22&#x2F;gitlab-9-2-released&#x2F;&quot;&gt;this month&#x27;s 9.2 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; MR widget styling fixes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11591&quot;&gt;!11591&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Adds &quot;comments on snippets&quot; to doc (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11563&quot;&gt;!11563&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add to docs: issues multiple assignees (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11556&quot;&gt;!11556&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix jQuery data attribute caching issue causing expanding issues (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11609&quot;&gt;!11609&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix placement of note emoji on hover (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11605&quot;&gt;!11605&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Change pipelines schedules help page path (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11592&quot;&gt;!11592&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Move environment monitoring to environments doc (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11583&quot;&gt;!11583&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix spacing of issue emojis (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11567&quot;&gt;!11567&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add docs for change of Cache&#x2F;Artifact restore order&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11545&quot;&gt;!11545&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add note about artifacts previewing in docs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11539&quot;&gt;!11539&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Auto update docs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11552&quot;&gt;!11552&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; New doc topic: issues (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11075&quot;&gt;!11075&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix migrations for older PostgreSQL versions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11620&quot;&gt;!11620&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add missing regex to backup manager (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11635&quot;&gt;!11635&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix the elasticsearch advanced search syntax link and edition details (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1958&quot;&gt;!1958&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &quot;Remove your approval&quot; button visibility for merged MRs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1936&quot;&gt;!1936&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Refactor advanced search syntax docs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1953&quot;&gt;!1953&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove redundant documented steps for Geo Setup (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1737&quot;&gt;!1737&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Mattermost: Fix config.json template for sql_data_source_search_replicas (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1575&quot;&gt;!1575&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Disable proxy_request_buffering for LFS endpoints (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1569&quot;&gt;!1569&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Splitting postgresql.conf into two separate configuration files (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1555&quot;&gt;!1555&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix sshd startup errors upon a full Docker restart (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1577&quot;&gt;!1577&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.2 released with Multiple Assignees for issues and Pipeline Schedules</title>
<release>9.2</release>
<link href='https://about.gitlab.com/releases/2017/05/22/gitlab-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/05/22/gitlab-9-2-released/</id>
<published>2017-05-22T00:00:00+00:00</published>
<updated>2017-05-22T00:00:00+00:00</updated>
<author>
<name>Joshua Lambert</name>
</author>
<content type='html'>&lt;p&gt;GitLab is designed to allow everyone to contribute whether their teams are large or small, remote or in a single room.&lt;&#x2F;p&gt;

&lt;p&gt;As a new feature or product is moving from idea to production, often multiple people work on the same issue together. For example, it is not uncommon to have a front end developer, backend developer, UX designer, QA tester, and product manager teaming together to bring an idea to market. With 9.2, GitLab introduces &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;05&#x2F;22&#x2F;gitlab-9-2-released&#x2F;#multiple-assignees-for-issues&quot;&gt;Multiple Assignees for Issues&lt;&#x2F;a&gt; to streamline collaboration and allow these shared responsibilities to be clearly displayed. All assignees are shown across our workflows and receive notifications as they would before, simplifying communication and ownership.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab 9.2 also lays the foundation for the localization of GitLab, with Cycle Analytics &lt;a href=&quot;#internationalized-cycle-analytics&quot;&gt;now available in Spanish and German&lt;&#x2F;a&gt; languages. In future releases we will continue to localize additional workflows within GitLab, to ensure that everyone can contribute regardless of their native language.&lt;&#x2F;p&gt;

&lt;p&gt;Developers also have additional control over when their CI&#x2F;CD Pipelines execute. We have added the ability to &lt;a href=&quot;#pipeline-schedules&quot;&gt;configure pipelines to run on a specific schedule&lt;&#x2F;a&gt; automating repetitive tasks like the creation of nightly builds, maintenance, or validation of external dependencies.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;9_2&#x2F;9_2-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release 9.1.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/05/15/gitlab-9-1-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/05/15/gitlab-9-1-4-released/</id>
<published>2017-05-15T00:00:00+00:00</published>
<updated>2017-05-15T00:00:00+00:00</updated>
<author>
<name>Felipe Artur</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.1.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version adds some improvements and resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;04&#x2F;22&#x2F;gitlab-9-1-released&#x2F;&quot;&gt;the 9.1 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed search terms highlight. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11198&quot;&gt;!11198&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed bug where merge request JSON would be displayed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11096&quot;&gt;!11096&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle incoming emails from aliases correctly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11079&quot;&gt;!11079&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Sort the network graph both by commit date and topographically. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11057&quot;&gt;!11057&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle failures for incoming emails. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11014&quot;&gt;!11014&lt;&#x2F;a&gt;&#x2F;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1810&quot;&gt;!1810&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error on CI&#x2F;CD Settings page related to invalid pipeline trigger. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10948&quot;&gt;!10948&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cross referencing for private and internal projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;11243&quot;&gt;!11243&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add missing project attributes to Import&#x2F;Export. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10880&quot;&gt;!10880&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; GitLab Geo: Backfill projects where the last attempt to backfill failed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1785&quot;&gt;!1785&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no new migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.1.3, 9.0.7, and 8.17.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/05/08/gitlab-9-dot-1-dot-3-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/05/08/gitlab-9-dot-1-dot-3-security-release/</id>
<published>2017-05-08T00:00:00+00:00</published>
<updated>2017-05-08T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.1.3, 9.0.7, and 8.17.6 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including security upgrades for
Mattermost, fixes for several persistent Cross-site Scripting (XSS) vulnerabilities,
and fixes for several information disclosure vulnerabilities. We recommend that
all GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;security-upgrade-for-mattermost-versions-37-and-36&quot;&gt;Security upgrade for Mattermost versions 3.7 and 3.6&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has not yet released full details, however an important security
release was published and Mattermost has advised all users to upgrade immediately.
GitLab Omnibus CE+EE versions 9.1 and 9.0 have been upgraded to Mattermost 3.7.5
and GitLab Omnibus CE+EE version 8.17 has been upgraded to Mattermost 3.6.7. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2282&quot;&gt;#2282&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This upgrade also required the addition of a new Mattermost setting in &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt;. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2286&quot;&gt;#2286&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-upgrade-for-mysql-client-libraries&quot;&gt;Security upgrade for MySQL client libraries&lt;&#x2F;h2&gt;

&lt;p&gt;The MySQL client library included with GitLab Omnibus packages has been upgraded
to 5.5.56 to patch &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2017-3305&quot;&gt;CVE-2017-3305&lt;&#x2F;a&gt;, a potential man-in-the-middle vulnerability for
installations using MySQL over the network. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2311&quot;&gt;#2311&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-project-import-file-names-for-gitlab_project-import-types&quot;&gt;Cross-Site Scripting (XSS) vulnerability in project import file names for gitlab_project import types&lt;&#x2F;h2&gt;

&lt;p&gt;Timo Schmid from &lt;a href=&quot;https:&#x2F;&#x2F;www.ernw.de&#x2F;&quot;&gt;ERNW&lt;&#x2F;a&gt; reported a persistent Cross-Site Scripting vulnerability in the new
project import view for gitlab_project import types. This XSS vulnerability was
caused by the use of Hamlit filters inside HAML views without manually escaping
HTML. Unlike content outside of a filter, content inside Hamlit filters (&lt;code&gt;:css&lt;&#x2F;code&gt;,
&lt;code&gt;:javascript&lt;&#x2F;code&gt;, &lt;code&gt;:preserve&lt;&#x2F;code&gt;, &lt;code&gt;:plain&lt;&#x2F;code&gt;) is not automatically escaped. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;28325&quot;&gt;#28325&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-git-submodule-support&quot;&gt;Cross-Site Scripting (XSS) vulnerability in git submodule support&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; from &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported a persistent XSS vulnerability in the GitLab
repository files view that could be exploited by injecting malicious script into
a git submodule. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30527&quot;&gt;#30527&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-repository-new-branch-view&quot;&gt;Cross-Site Scripting (XSS) vulnerability in repository &quot;new branch&quot; view&lt;&#x2F;h2&gt;

&lt;p&gt;A GitLab user reported a persistent XSS vulnerability in the repository new
branch view that allowed malicious branch names or &lt;code&gt;git&lt;&#x2F;code&gt; references to execute
arbitrary Javascript. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31332&quot;&gt;#31332&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-mirror-errors-display&quot;&gt;Cross-Site Scripting (XSS) vulnerability in mirror errors display&lt;&#x2F;h2&gt;

&lt;p&gt;While investigating Timo Schmid&#x27;s previously reported XSS vulnerability in import
filenames another persistent XSS vulnerability was discovered in the GitLab
Enterprise Edition&#x27;s (EE) mirror view. This vulnerability was also caused by the
misuse of Hamlit filters. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;28325&quot;&gt;#28325&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;potential-xss-vulnerability-in-droplab&quot;&gt;Potential XSS vulnerability in DropLab&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code audit disclosed a vulnerability in DropLab&#x27;s templating that,
while not currently exploitable, could become exploitable depending on how the
templates were used in the future. This is a preventative patch. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30761&quot;&gt;#30761&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;tab-nabbing-vulnerabilities-in-mardown-link-filter-asciidoc-files-and-other-markup-files&quot;&gt;Tab Nabbing vulnerabilities in mardown link filter, Asciidoc files, and other markup files&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;EdOverflow&quot;&gt;edio&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;www.hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported two tab nabbing vulnerabilities. The first tab
nabbing vulnerability was caused by improper hostname filtering when identifying
user-supplied external links. GitLab did not properly filter usernames from the
URL. An attacker could construct a specially crafted link including a username to
bypass GitLab&#x27;s external link filter. This allowed an attacker to post links in
Markdown that did not include the appropriate &quot;noreferrer noopener&quot; options,
allowing tab nabbing attacks.&lt;&#x2F;p&gt;

&lt;p&gt;The second vulnerability was in the AsciiDoctor markup library. AsciiDoctor was
not properly including the &quot;noreferrer noopener&quot; options with external links. An
internal investigation discovered other markup libraries that were also vulnerable. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29413&quot;&gt;#29413&lt;&#x2F;a&gt; &#x2F; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29374&quot;&gt;#29374&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-disclosure-of-wiki-pages-in-search&quot;&gt;Unauthorized disclosure of wiki pages in search&lt;&#x2F;h2&gt;

&lt;p&gt;M. Hasbini reported a flaw in the project search feature that allowed authenticated
users to disclose the contents of private wiki pages inside public projects. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31157&quot;&gt;#31157&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;external-users-can-view-internal-snippets&quot;&gt;External users can view internal snippets&lt;&#x2F;h2&gt;

&lt;p&gt;Christian Kühn discovered a vulnerability in GitLab snippets that allowed an
external user to view the contents of internal snippets. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30487&quot;&gt;#30487&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;subgroup-visibility-for-private-subgroups-under-a-public-parent-group&quot;&gt;Subgroup visibility for private subgroups under a public parent group&lt;&#x2F;h2&gt;

&lt;p&gt;Matt Harrison discovered a vulnerability with subgroups that allowed private
subgroup names to be disclosed when they belong to a parent group that is public. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31068&quot;&gt;#31068&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost vulnerability:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE Omnibus (with Mattermost enabled) 7.14-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Update mysql to 5.5.56 for CVE-2017-3305:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE Omnibus (with MySQL enabled) All versions up to and including 8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability in mirror errors display:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab EE 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability in project import via GitLab export (file names):&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.3.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Cross-Site Scripting (XSS) vulnerability in repository &quot;new branch&quot; view:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.13.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Persistent XSS in git submodule support:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 6.6.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Potential XSS vulnerability in DropLab:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Subgroup visibility for private subgroups under a public parent group:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 9.0.0-9.0.6,9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Tab Nabbing vulnerabilities in mardown link filter, Asciidoc files, and other markup files:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;AsciiDoctor: GitLab CE+EE 7.12.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
  &lt;li&gt;Markdown links: GitLab CE+EE 8.14.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Unauthorized disclosure of wiki pages in search:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.14.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;External Users can view internal snippets:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 7.4.0-8.17.5, 9.0.0-9.0.6, 9.1.0-9.1.2&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release 9.1.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/05/01/gitlab-9-1-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/05/01/gitlab-9-1-2-released/</id>
<published>2017-05-01T00:00:00+00:00</published>
<updated>2017-05-01T00:00:00+00:00</updated>
<author>
<name>Timothy Andrew</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.1.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;04&#x2F;22&#x2F;gitlab-9-1-released&#x2F;&quot;&gt;the 9.1 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Lazily set UUID in ApplicationSetting for new installations. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10893&quot;&gt;!10893&lt;&#x2F;a&gt;&#x2F;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1733&quot;&gt;!1733&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove description for build_events, add pipeline_events. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10908&quot;&gt;!10908&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Milestone sidebar display incorrect number of MR when minimized&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10933&quot;&gt;!10933&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add index on ci_runners.contacted_at. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10876&quot;&gt;!10876&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix ordering of commits in the network graph. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10936&quot;&gt;!10936&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Skip validation when creating internal (ghost, Service Desk) users. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10949&quot;&gt;!10949&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Refactoring rake task to import GitHub repositories. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10695&quot;&gt;!10695&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Accept default branch param on notification services. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10959&quot;&gt;!10959&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; correct documentation on opt-out-ness of usage ping. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10945&quot;&gt;!10945&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix commit search on some elasticsearch indexes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1745&quot;&gt;!1745&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix bug where Geo secondary Sidekiq cron jobs would not be activated if settings changed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1754&quot;&gt;!1754&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix creating issues by email with Service Desk on. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1743&quot;&gt;!1743&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not require downtime. It includes two migrations:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Fill in missing UUIDs in application settings, which fixes
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;2246&quot;&gt;a regression&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Add an index for the column &lt;code&gt;contacted_at&lt;&#x2F;code&gt; in the table &lt;code&gt;ci_runners&lt;&#x2F;code&gt;, which
addresses &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31229&quot;&gt;a performance concern&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.1.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/04/26/gitlab-9-dot-1-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/26/gitlab-9-dot-1-dot-1-released/</id>
<published>2017-04-26T00:00:00+00:00</published>
<updated>2017-04-26T00:00:00+00:00</updated>
<author>
<name>Lin Jen-Shin</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.1.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;04&#x2F;22&#x2F;gitlab-9-1-released&#x2F;&quot;&gt;this month&#x27;s 9.1 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a transaction around move_issues_to_ghost_user. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10465&quot;&gt;!10465&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Properly expire cache for all MRs of a pipeline. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10770&quot;&gt;!10770&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add sub-nav for Project Integration Services edit page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10813&quot;&gt;!10813&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix missing duration for blocked pipelines. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10856&quot;&gt;!10856&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix lastest commit status text on main project page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10863&quot;&gt;!10863&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add index on ci_builds.updated_at. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10870&quot;&gt;!10870&lt;&#x2F;a&gt;) (blackst0ne)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 500 error due to trying to show issues from pending deleting projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10906&quot;&gt;!10906&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure replying to an individual note by email creates a note with its own discussion ID. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10890&quot;&gt;!10890&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix OAuth, LDAP and SAML SSO when regular sign-ups are disabled.  (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10904&quot;&gt;!10904&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix usage ping docs link from empty cohorts page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10907&quot;&gt;!10907&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Eliminate N+1 queries in loading namespaces for every issuable in milestones. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10871&quot;&gt;!10871&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not require downtime. It includes a single migration that
adds an index for the column &lt;code&gt;updated_at&lt;&#x2F;code&gt; in the table &lt;code&gt;ci_builds&lt;&#x2F;code&gt;, which
addresses &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31251&quot;&gt;a performance concern
&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.1 released with Service Desk, Canary Deployments, and Burndown Charts</title>
<release>9.1</release>
<link href='https://about.gitlab.com/releases/2017/04/22/gitlab-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/22/gitlab-9-1-released/</id>
<published>2017-04-22T00:00:00+00:00</published>
<updated>2017-04-22T00:00:00+00:00</updated>
<author>
<name>Victor Wu</name>
</author>
<content type='html'>
&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;p&gt;GitLab is designed to provide you &lt;em&gt;actionable feedback&lt;&#x2F;em&gt; in different stages of your
application lifecycle, and on different timescales.&lt;&#x2F;p&gt;

  &lt;p&gt;With 9.1, GitLab introduces &lt;a href=&quot;#canary-deployments-eep&quot;&gt;Canary Deployments&lt;&#x2F;a&gt;. This allows you
to deploy new code to a small portion of your fleet, providing you an opportunity
to revert with minimal impact if something goes wrong. If a problem is detected, you
can quickly revert, minimizing the impact on your users. This is &lt;em&gt;immediate production feedback&lt;&#x2F;em&gt;.&lt;&#x2F;p&gt;

  

  &lt;p&gt;As you expand your software products, GitLab&#x27;s new &lt;a href=&quot;#service-desk-eep&quot;&gt;Service Desk&lt;&#x2F;a&gt;
feature in 9.1 enables your growing user base to send emails to your team via a dedicated
address per project for any kind of feedback or support. These show up as GitLab confidential
issues in your project. Commenting on them responds back to the original email sender,
creating a brand new &lt;em&gt;integrated user feedback channel&lt;&#x2F;em&gt; right inside GitLab.&lt;&#x2F;p&gt;

  &lt;p&gt;GitLab 9.1 also introduces &lt;a href=&quot;#burndown-charts-ees&quot;&gt;Burndown Charts&lt;&#x2F;a&gt;, giving you &lt;em&gt;team development feedback&lt;&#x2F;em&gt;.
As a team, you can now visualize and track the pace of issue completion throughout
a milestone, giving you information to continuously make improvements in your processes
over time.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;sytses&#x2F;status&#x2F;854453516672225280&quot;&gt;Heroku recently blogged&lt;&#x2F;a&gt; that GitLab CI (fully integrated into GitLab itself) has now
surpassed Travis CI in popularity based on Stack Overflow question popularity.
Google Trends also &lt;a href=&quot;https:&#x2F;&#x2F;trends.google.com&#x2F;trends&#x2F;explore?q=Travis%20CI,GitLab%20CI&quot;&gt;shows the same&lt;&#x2F;a&gt;.
In addition, GitLab is now &lt;a href=&quot;http:&#x2F;&#x2F;blog.bitrise.io&#x2F;2017&#x2F;01&#x2F;27&#x2F;state-of-app-development-in-2016.html#self-hosted&quot;&gt;used by two-thirds of the self-managed market&lt;&#x2F;a&gt;.
Thank you for the support! 👏 🙏&lt;&#x2F;p&gt;

  &lt;p class=&quot;text-center&quot;&gt;&lt;a href=&quot;&#x2F;events&#x2F;&quot; class=&quot;btn btn-lg btn-red webcast-button&quot;&gt;Join us for an upcoming event!&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;mvp gray-section&quot;&gt;
  &lt;div class=&quot;release-post-section&quot;&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;mvp_badge.png&quot; alt=&quot;mvp-badge&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h2 id=&quot;this-months-most-valuable-person-mvp-is-maxim-rydkin&quot;&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;innerwhisper&quot;&gt;Maxim Rydkin&lt;&#x2F;a&gt;&lt;&#x2F;h2&gt;

    &lt;p&gt;Maxim &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9362&quot;&gt;created a configuration setting&lt;&#x2F;a&gt; to
&lt;a href=&quot;#auto-cancel-redundant-pipelines-ce-ee&quot;&gt;automatically cancel pending pipelines if they are redundant&lt;&#x2F;a&gt;.
This is extremely helpful for when you push a change to GitLab, but want to quickly
push another small tweak shortly after.
This helps reduce time and precious system resources by canceling the unnecessary
pipelines.
Thank you Maxim!&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 id=&quot;service-desk-eep&quot;&gt;Service Desk eep&lt;&#x2F;h2&gt;

  &lt;p&gt;Service Desk is a powerful new feature that allows your team to connect directly with
any external party through email right inside of GitLab; no external tools required.
The ongoing and bi-directional conversation ensures that any user feedback is not
corrupted, helping you build the right features to solve your user&#x27;s real problems.&lt;&#x2F;p&gt;

  &lt;p&gt;Your customers or anyone in contact with the people in your project can email bugs,
feature requests, or any other general feedback directly into your GitLab project.
In turn, any GitLab users can respond straight from the project.&lt;&#x2F;p&gt;

  &lt;p&gt;As Service Desk is built right into GitLab itself, the complexity and inefficiencies
of multiple tools and external integrations are eliminated, significantly shortening
the cycle time from feedback to software update.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;service_desk_issue.png&quot; alt=&quot;Service Desk 1&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;Simply turn on the feature in a project&#x27;s settings, and you are provided a unique
email address to share with your users. Every time a user emails in feedback to that
address, GitLab automatically creates a confidential issue in that project. Subsequently,
your team adds comments to the issue, which automatically emails back the user. The
user can continue to follow up with responses in the email thread, and the entire
conversation is reflected inside the comment thread of the confidential issue.&lt;&#x2F;p&gt;

  &lt;p&gt;Your team stays inside that one confidential issue the whole time, enabling you to
leverage all the exiting powerful features of GitLab issue management as part of your
regular development workflows.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;service_desk_setting.png&quot; alt=&quot;Service Desk 2&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;Pro tip: Once you&#x27;ve deployed a new feature or bug fix to address a user&#x27;s feedback,
simply leave a comment in the confidential issue to inform the user that you&#x27;ve solved
their problem.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;service_desk.html&quot;&gt;Service Desk&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;canary-deployments-eep&quot;&gt;Canary Deployments eep&lt;&#x2F;h2&gt;

    &lt;p&gt;When embracing &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Continuous_delivery&quot;&gt;Continuous Delivery&lt;&#x2F;a&gt;,
a company needs to decide what type of deployment strategy to use. One of the most
popular strategies is Canary Deployments, where a small portion of the fleet is
updated to the new version first. This subset, the canaries, then serve as the proverbial
&lt;a href=&quot;https:&#x2F;&#x2F;en.wiktionary.org&#x2F;wiki&#x2F;canary_in_a_coal_mine&quot;&gt;canary in the coal mine&lt;&#x2F;a&gt;.
If there is a problem with the new version of the application, only a small percentage
of users are affected and the change can either be fixed or quickly reverted.&lt;&#x2F;p&gt;

    &lt;p&gt;With GitLab 9.1 we are proud to announce first class support for
Canary Deployments on Kubernetes. For projects using
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html&quot;&gt;Auto Deploy&lt;&#x2F;a&gt;,
get started in less than a minute by simply switching to the updated Auto Deploy template.
Documentation is also available to walk through &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;deploy_boards.html#canary-deployments&quot;&gt;adding a canary stage&lt;&#x2F;a&gt; for those
who have written their own pipelines. As the pipeline executes Deploy Boards will
clearly mark canary pods, enabling quick and easy insight into the status of
each environment and deployment.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;deploy_boards.html#canary-deployments&quot;&gt;Canary Deployments&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;canary_deployments.png&quot; alt=&quot;image&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;burndown-charts-ees-eep&quot;&gt;Burndown Charts ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;We envision GitLab increasingly being able to help you to track and manage your work.
With this release, we are introducing burndown charts for projects.
This visualization helps you see how many issues are still incomplete as you progress
through a milestone, day by day.
You can see the remaining amount of issues (and even cumulative issue weight) &quot;burndown&quot;
over time, allowing you to make decisions earlier (on say, resources and scope) if
you see risks emerging from the chart.&lt;&#x2F;p&gt;

    &lt;p&gt;Any project milestone has a burndown chart as long as the milestone&#x27;s start date
and due date are set.
It&#x27;s conveniently located on the milestone page itself and indicates how many issues
(associated with that milestone) were or are still open for a given day in the milestone period.
The burndown chart can also be toggled to display the cumulative open issue weight for a given day.&lt;&#x2F;p&gt;

    &lt;p&gt;When using this feature, make sure your weights have been properly assigned, since
an open issue with no weight would contribute zero to the cumulative value.
We also took this opportunity to revamp the milestone page itself, simplifying the
look and feel to be more in line with the rest of GitLab.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;milestones&#x2F;#burndown-charts&quot;&gt;Burndown Charts&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;burndown_chart.png&quot; alt=&quot;Burndown Chart&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;protected-tags-ce-ees-eep&quot;&gt;Protected Tags ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;Tags can quickly get out of hand and, depending on your workflow, you might want to control who can create or update tags. Protected Tags in GitLab 9.1 does just that, making it easy to prevent tags from being created or updated.&lt;&#x2F;p&gt;

    &lt;p&gt;Using a very similar approach to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;branches&#x2F;protected.html&quot;&gt;protected branches&lt;&#x2F;a&gt;, you can now control this easily for any of your projects. Much like protected branches, you can define who is able to create tags and use wildcard matching on your rules too.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;protected_tags.html#protected-tags&quot;&gt;protected tags&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;protect-tags.png&quot; alt=&quot;Restrict Tags&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;recent-searches-ce-ees-eep&quot;&gt;Recent Searches ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;To quickly access frequent searches in issues and merge requests, we&#x27;ve added a convenient
dropdown menu that stores your most recent ones.
They are stored locally in your browser, with no manual configuration required.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;search&#x2F;#search-history&quot;&gt;Recent Searches&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;recent_searches.png&quot; alt=&quot;Recent Searches&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;discussions-in-merge-requests-and-issues-ce-ees-eep&quot;&gt;Discussions in Merge Requests and Issues ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;In merge requests, you&#x27;ve been able to start resolvable discussions by commenting
on a code diff. Starting in this release, you can start a resolvable discussion
in the main comment thread itself, without referring to any specific line of code.&lt;&#x2F;p&gt;

    &lt;p&gt;This is very useful if you have concerns about the entire merge request, and want
to leverage the existing features of
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;discussions&#x2F;#resolvable-discussions&quot;&gt;discussion resolution&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;In this release, we&#x27;ve applied this threaded concept to issue comments too.&lt;&#x2F;p&gt;

    &lt;p&gt;Collaboration in issues are meant to be a free-flowing exchange of ideas.
So, we&#x27;ve chosen to simply implement discussions in issues (without the
concept of resolvability).&lt;&#x2F;p&gt;

    &lt;p&gt;It will allow collaboration within GitLab to be even more flexible, but still
provide the structure for organization and review of ideas.&lt;&#x2F;p&gt;

    &lt;p&gt;Since collaboration also happens in commits and snippets, the same feature is
also available in those places too.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;discussions&#x2F;&quot;&gt;discussions in merge requests and issues&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;em&gt;Resolvable discussions in merge requests:&lt;&#x2F;em&gt;
&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;merge_request_resolvable_discussion.png&quot; alt=&quot;Merge Request Resolvable Discussion&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;em&gt;Discussions in issues:&lt;&#x2F;em&gt;
&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;issue_discussion.png&quot; alt=&quot;Issue Discussion&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;resolve-merge-request-discussion-with-new-issue-ce-ees-eep&quot;&gt;Resolve Merge Request Discussion with New Issue ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;In merge requests, you&#x27;ve been able to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;discussions&#x2F;#move-all-unresolved-discussions-in-a-merge-request-to-an-issue&quot;&gt;resolve all discussions at once by
creating a new issue&lt;&#x2F;a&gt;.
This is extremely helpful to defer problems but not lose track of them.&lt;&#x2F;p&gt;

    &lt;p&gt;In this release, we are providing more flexibility and granularity. You can now
resolve one individual discussion into a new issue, allowing you defer some problems
for later, and focus on the ones you need to solve now for this merge request.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;discussions&#x2F;#moving-a-single-discussion-to-a-new-issue&quot;&gt;resolving merge requests discussions with a new issue&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;issue_from_unresolved_discussion.png&quot; alt=&quot;Issue From Unresolved Discussion&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;microsoft-teams-integration-ce-ees-eep&quot;&gt;Microsoft Teams Integration ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;We want GitLab to be the most complete solution to get from idea to production
as quickly as possible. This means integrating into where conversation happens
and ideas are formed, be it Mattermost, Slack or Microsoft&#x27;s new Teams solution.&lt;&#x2F;p&gt;

    &lt;p&gt;Our first integration with Microsoft Teams introduces the ability to add
notifications for actions that happen on GitLab into a room on Microsoft
Teams using &lt;a href=&quot;https:&#x2F;&#x2F;msdn.microsoft.com&#x2F;en-us&#x2F;microsoft-teams&#x2F;connectors&quot;&gt;Office 365 Connectors&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;Any time you push to a project, create or update an issue or merge request
you can be notified in Teams. Want the output of your CI Pipeline - yip, that too!&lt;&#x2F;p&gt;

    &lt;p&gt;You&#x27;ll get a beautiful card in your room with all of the details on the
action performed, and links to jump into GitLab and find out more about
what&#x27;s been happening.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;microsoft_teams.html&quot;&gt;Microsoft Teams Integration&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;microsoft-teams.png&quot; alt=&quot;Microsoft Teams&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;easier-file-templates-ce-ees-eep&quot;&gt;Easier File Templates ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;For a long time, we&#x27;ve had the ability to create file templates in GitLab.
For example, if you wanted to create a file for configuring Continuous Integration,
you could use a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;&quot;&gt;.gitlab-ci.yml&lt;&#x2F;a&gt; file. These
templates are now much easier to use in GitLab 9.1.&lt;&#x2F;p&gt;

    &lt;p&gt;When creating a new file or editing a file, you will now see a list of all
template types and template options as you can see in the screenshot below.
Changing a file template will replace the entire contents of the file in the editor,
but don&#x27;t worry, you can always undo this and get back to where you were!&lt;&#x2F;p&gt;

  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;easier-templates.png&quot; alt=&quot;Easier Templates&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;issue-title-auto-update-ce-ees-eep&quot;&gt;Issue Title Auto Update ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;As you use GitLab with a large number of users, data is constantly changing. With
this release, issue titles automatically update with no page refresh necessary.&lt;&#x2F;p&gt;

    &lt;p&gt;Many parts of the issue page and GitLab as a whole need improvements in this regard,
and we plan to do work on these in the coming releases.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;issue_title_realtime_update.gif&quot; alt=&quot;Issue Title Auto Update&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;
&lt;hr &#x2F;&gt;
&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;application-monitoring-ux-improvements-ce-ees-eep&quot;&gt;Application Monitoring UX Improvements ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;A number of minor changes have been made to application monitoring workflow, polishing the experience and making it easier to use.
We now have a beautiful getting started screen, can report additional troubleshooting information, and linked the performance charts to name just a few!&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;monitoring_ux.png&quot; alt=&quot;Monitoring UX Improvements&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;div class=&quot;release-post-section text-center zero-bottom-margin&quot;&gt;
  &lt;h2 id=&quot;other-improvements-in-gitlab-91&quot;&gt;Other Improvements in GitLab 9.1&lt;&#x2F;h2&gt;
&lt;&#x2F;div&gt;

&lt;section class=&quot;release-row align-top divider&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h3 id=&quot;simplified-approvals-settings-ees-eep&quot;&gt;Simplified Approvals Settings ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Merge request approvals allow you to block merges until the specified qualified users
or groups (and the number of them) have signed off (approved) them.
This is a crucial step of code review in many organizations.
As we continue to iterate on new functionality, we are simplifying the interface in
the project settings with this release, laying a foundation for high usability for
more powerful features in the future.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;approvals.png&quot; alt=&quot;Approvals&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;approvals&#x2F;&quot;&gt;merge request approvals&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;improvements-to-disaster-recovery-in-alpha-eep&quot;&gt;Improvements to Disaster Recovery in Alpha eep&lt;&#x2F;h3&gt;

    &lt;p&gt;GitLab 9.1 ships with improvements to the Disaster Recovery feature
that we&#x27;ve released in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;#disaster-recovery-alpha-eep&quot;&gt;GitLab 9.0 in Alpha&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;We&#x27;ve made it easier for &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-development-kit&#x2F;merge_requests&#x2F;270&quot;&gt;developers to work on the feature itself&lt;&#x2F;a&gt;.
We&#x27;ve also reduced the number of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1664&quot;&gt;steps required to set up Geo&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;Finally, we&#x27;ve added support for replicating the following types of files saved on disk: issue, merge request, and comment attachments, as well as user, group, and project avatars. We plan to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;846&quot;&gt;continue working actively on Disaster Recovery&lt;&#x2F;a&gt; in the coming releases.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;geo&#x2F;disaster_recovery&#x2F;index.html#gitlab-geo-disaster-recovery&quot;&gt;Disaster Recovery in Alpha&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;pipeline-mini-graph-added-to-commit-view-ce-ees-eep&quot;&gt;Pipeline mini-graph added to Commit View ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Pipeline mini-graphs now show in the system information box in commit views. Previously they were only shown in merge request views.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;mini_graph.png&quot; alt=&quot;Pipeline mini-graph&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipelines&#x2F;index.html#pipelines&quot;&gt;pipelines&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;notifications-for-successful-pipeline-now-off-by-default-ce-ees-eep&quot;&gt;Notifications for Successful Pipeline now Off by Default ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;We have changed the behavior of pipeline notifications in GitLab 9.1,
to reduce chatter and allow users additional control.
Notifications for successful pipelines will now be off by default,
and can be re-enabled by setting the notification level to Custom and
selecting &lt;code&gt;Successful pipeline&lt;&#x2F;code&gt;.
Additionally when selecting custom notifications for successful pipelines,
only the initiator of the pipeline will receive an email.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;notifications.html#notification-events&quot;&gt;pipeline notifications&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;system-note-icons-ce-ees-eep&quot;&gt;System Note Icons ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;As we add more features into GitLab, the historical view of system actions
recorded in the discussion threads of issues and merge requests becomes
increasingly important to know what has changed recently and further in the past.&lt;&#x2F;p&gt;

    &lt;p&gt;With this release, we are introducing icons next to system notes, to allow you to
easily demarcate system actions versus user comments. And this also allows you
to scan quickly through a long discussion thread and get a quick high-level
sense of how an object has evolved over time.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;system_notes.png&quot; alt=&quot;System Notes&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;usage-ping-ce-ees-eep&quot;&gt;Usage Ping ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;We’ve added the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;usage_statistics.html#usage-ping&quot;&gt;usage ping&lt;&#x2F;a&gt;,
already present in GitLab Enterprise Edition since version
&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;#usage-ping-ee-only&quot;&gt;8.10&lt;&#x2F;a&gt;,
to &lt;strong&gt;GitLab Community Edition&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;In the coming months, this will enable you to see
how your cohort usage compares to that of everyone else using GitLab.
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30469&quot;&gt;See the issue on this effort&lt;&#x2F;a&gt; and
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;31192&quot;&gt;the background of this project&lt;&#x2F;a&gt;.
You can see the exact payload that is being sent every week in &lt;strong&gt;admin&lt;&#x2F;strong&gt; &amp;gt; &lt;strong&gt;cohorts&lt;&#x2F;strong&gt;.
You can opt-out in &lt;strong&gt;admin&lt;&#x2F;strong&gt; &amp;gt; &lt;strong&gt;settings&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;usage_ping_optout.png&quot; alt=&quot;Usage Ping optout&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;usage_ping_json.png&quot; alt=&quot;Usage Ping JSON&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;usage_statistics.html#usage-ping&quot;&gt;usage ping&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;issue-boards-focus-mode-ees-eep&quot;&gt;Issue Boards Focus Mode ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;&lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;issueboard&#x2F;&quot;&gt;Issue Boards&lt;&#x2F;a&gt; are a great solution for planning and managing issues that are being
worked together by a team, allowing you to track them as they move from stage to stage
in your workflow.&lt;&#x2F;p&gt;

    &lt;p&gt;With this release, we are introducing focus mode in Issue Boards, which hides the
navigation UI when toggled on.&lt;&#x2F;p&gt;

    &lt;p&gt;This is helpful for co-located teams, when many folks are looking at a large screen
together during a collaboration session.
Just click the button at the top right of a board to toggle it on and off.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;issue_board_focus_mode.png&quot; alt=&quot;Issue Board Focus Mode&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issue_board.html&quot;&gt;Issue Boards&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;projects-with-multiple-docker-images-ce-ees-eep&quot;&gt;Projects with Multiple Docker Images ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;In some situations, developers can create multiple containers based upon
the same code base. This can occur when building a container in an earlier stage
to be consumed in a later stage, or when packaging different versions of dependencies.&lt;&#x2F;p&gt;

    &lt;p&gt;As part of GitLab 9.1 the Container Registry now supports multiple image names
for a single project, allowing a simple way to store a project&#x27;s multiple containers.&lt;&#x2F;p&gt;

    &lt;p&gt;For example storing both &lt;code&gt;registry.example.com&#x2F;group&#x2F;project&#x2F;core:latest&lt;&#x2F;code&gt; and
&lt;code&gt;registry.example.com&#x2F;group&#x2F;project&#x2F;dependencies:latest&lt;&#x2F;code&gt; is now supported.&lt;&#x2F;p&gt;

    &lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;andrebsguedes&quot;&gt;André Guedes&lt;&#x2F;a&gt; for the fantastic contribution!&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;packages&#x2F;container_registry&#x2F;index.html#gitlab-container-registry&quot;&gt;Container Registry&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;!-- end of left column --&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;

    &lt;h3 id=&quot;auto-cancel-redundant-pipelines-ce-ees-eep&quot;&gt;Auto-cancel Redundant Pipelines ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;In situations where a number of commits occur within a short time period,
it is possible for multiple pipelines to be queued for the same branch.
Since pipelines are generally processed on a first come first serve basis,
pipelines will be ran for older commits first, even if they&#x27;ve already been
replaced. This can introduce delays in determining if the current branch is
passing tests, and is an inefficient use of CI runners.&lt;&#x2F;p&gt;

    &lt;p&gt;With GitLab 9.1, pipelines for older commits (specifically non-HEAD commits)
can now be automatically cancelled when a new pipeline is triggered for the
same branch; efficiently processing the queue and reducing the delay
in running the new (HEAD) pipeline.&lt;&#x2F;p&gt;

    &lt;p&gt;Only pending pipelines that haven&#x27;t started running yet will be auto-cancelled.
Any pipeline running when a new push comes in will continue to run until it finishes normally.&lt;&#x2F;p&gt;

    &lt;p&gt;If you want to enable this behavior, you can turn it on in the project&#x27;s CI&#x2F;CD Pipelines settings. Auto-cancellation will be on by default in a subsequent release.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;cancel_pipelines.png&quot; alt=&quot;Redundant Pipelines Cancelled&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;pipelines&#x2F;settings.html#auto-cancel-pending-pipelines&quot;&gt;automatically cancelling redundant pipelines&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;scheduled-pipelines-triggers-ce-ees-eep&quot;&gt;Scheduled Pipelines Triggers ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;With GitLab 9.1, we have added alpha support for scheduling a pipeline to run on a periodic basis. For example a daily pipeline can be run to check upstream dependencies, or to create a nightly package for broader testing. To configure a scheduled pipeline add a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;triggers&#x2F;&quot;&gt;Pipeline Trigger&lt;&#x2F;a&gt;, edit it, and then enable &lt;code&gt;Schedule trigger&lt;&#x2F;code&gt;. Scheduling is set using the &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cron&quot;&gt;cron format&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;ci_schedule_trigger.png&quot; alt=&quot;Scheduled Pipeline Trigger&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipelines&#x2F;schedules.html&quot;&gt;scheduled pipeline triggers&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;improved-support-for-jobs-with-large-log-sizes-ce-ees-eep&quot;&gt;Improved Support for Jobs with Large Log Sizes ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;As part of our continued focus on improving performance, we have made
optimizations to how large job logs are handled. GitLab 9.1 will now only
display the last 500kb of a log when viewing a job, significantly improving
the responsiveness of the page and reducing bandwidth consumption.&lt;&#x2F;p&gt;

    &lt;p&gt;Because errors in a CI job typically occur near the end, it is often unnecessary
to send and display the entire log. This is especially important for larger
projects like Android, where a single job log can exceed 60mb. If further
analysis is needed, the complete log can always be downloaded by
clicking on the &lt;strong&gt;Download&lt;&#x2F;strong&gt; button.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;auto-deploy-enhancements-ce-ees-eep&quot;&gt;Auto Deploy Enhancements ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Along with support for &lt;a href=&quot;#canary-deployments-eep&quot;&gt;canary deployments&lt;&#x2F;a&gt;, we have made two other important enhancements to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html&quot;&gt;Auto Deploy&lt;&#x2F;a&gt;. First, we have added alpha support for applications that require a database, by automatically &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html#postgresql-database-support&quot;&gt;provisioning PostgreSQL&lt;&#x2F;a&gt; by default. Variables can be used to customize the credentials and database name, or if you&#x27;d like you can disable Postgres by setting &lt;code&gt;DISABLE_POSTGRES&lt;&#x2F;code&gt; to &lt;code&gt;yes&lt;&#x2F;code&gt;. Experimental support for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html#private-project-support&quot;&gt;private projects&lt;&#x2F;a&gt; has also been added, allowing Kubernetes to authenticate and download the app&#x27;s container from the GitLab Container Registry.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about Auto Deploy&#x27;s &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html#private-project-support&quot;&gt;private project&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html#postgresql-database-support&quot;&gt;PostgreSQL database&lt;&#x2F;a&gt; support, and important limitations, in our docs.=&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;pipeline-list-now-refreshes-automatically-ce-ees-eep&quot;&gt;Pipeline list now refreshes automatically ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;As part of our on-going commitment to ensure our user experience is delightful, we have updated the pipeline overview page to refresh automatically. We will continue to update additional worfklows in subsequent releases, reducing the need to manually refresh.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;pipeline_refresh.png&quot; alt=&quot;Pipeline List Auto Refresh&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipelines&#x2F;index.html#pipelines&quot;&gt;pipelines&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;elasticsearch-improvements-ees-eep&quot;&gt;Elasticsearch Improvements ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;GitLab 9.1 EE introduces an experimental &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-elasticsearch-indexer&quot;&gt;repository indexer&lt;&#x2F;a&gt;.
This is a complete rewrite that&#x27;s four times faster! To enable it, just check the
box in the admin panel:&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_1&#x2F;elasticsearch_indexer.png&quot; alt=&quot;Elasticsearch Indexer&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;Send us your feedback - it should become the default indexer in the next few releases.
In addition, admins and auditors can now make use of global search functionality when
Elasticsearch is enabled, and code search results are highlighted again.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#enable-elasticsearch&quot;&gt;Elasticsearch&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;gitlab-runner-91-changes-ce-ees-eep&quot;&gt;GitLab Runner 9.1 changes ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;We&#x27;re also releasing GitLab Runner 9.1 today.&lt;&#x2F;p&gt;

    &lt;h4 id=&quot;most-interesting-changes&quot;&gt;Most interesting changes&lt;&#x2F;h4&gt;

    &lt;ul&gt;
      &lt;li&gt;Extended verify command with runner selector (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;532&quot;&gt;merge request&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add log_level option to config.toml (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;524&quot;&gt;merge request&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Fix cache containers discovering regression (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;534&quot;&gt;merge request&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Cleanup and rename docker machine provider metrics (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;531&quot;&gt;merge request&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add histogram metrics for docker machine creation time (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;533&quot;&gt;merge request&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;

    &lt;p&gt;List of all changes can be found in GitLab Runner&#x27;s &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;v9.1.0&#x2F;CHANGELOG.md&quot;&gt;CHANGELOG&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;&quot;&gt;GitLab Runners&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;performance-improvements-ce-ees-eep&quot;&gt;Performance Improvements ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Making GitLab fast is always a priority.
Every release we are addressing performance improvements that make GitLab faster and
more reliable.
This will not only make self-managed GitLab CE and EE much faster, but also improve
the speed and reliability of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab.com&lt;&#x2F;a&gt; for everyone.&lt;&#x2F;p&gt;

    &lt;p&gt;In GitLab 9.1 we&#x27;ve nearly halved the amount of time taken to view a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;27390&quot;&gt;list of projects&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;27166&quot;&gt;merge requests&lt;&#x2F;a&gt;, improved availability of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22940&quot;&gt;contribution analytics&lt;&#x2F;a&gt;, made &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;28183&quot;&gt;importing GitHub projects&lt;&#x2F;a&gt; faster and more reliable and have taken big steps towards upgrading GitLab with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26130&quot;&gt;zero downtime&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;Take a look at our full list of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;issues?scope=all&amp;amp;state=closed&amp;amp;utf8=%E2%9C%93&amp;amp;milestone_title=9.1&amp;amp;label_name%5B%5D=performance&quot;&gt;performance improvements&lt;&#x2F;a&gt; in GitLab 9.1 and we&#x27;ve got a huge number of performance issues we will be addressing in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;groups&#x2F;gitlab-org&#x2F;issues?label_name%5B%5D=performance&amp;amp;milestone_title=9.2&amp;amp;scope=all&amp;amp;state=all&quot;&gt;9.2&lt;&#x2F;a&gt; to keep making GitLab faster and more reliable.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;monitoring&#x2F;performance&#x2F;index.html#gitlab-performance-monitoring&quot;&gt;GitLab Performance Monitoring&lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;omnibus-package-improvements-ce-ees-eep&quot;&gt;Omnibus Package Improvements ce ees eep&lt;&#x2F;h3&gt;

    &lt;h4 id=&quot;suse-linux-enterprise-server-122&quot;&gt;SUSE Linux Enterprise Server 12.2&lt;&#x2F;h4&gt;
    &lt;p&gt;GitLab is now available on SUSE Linux Enterprise Server 12.2.
&lt;a href=&quot;&#x2F;downloads-ee&#x2F;#sles122&quot;&gt;Read through the instructions&lt;&#x2F;a&gt;
to install.&lt;&#x2F;p&gt;

    &lt;h4 id=&quot;gitlab-mattermost-373&quot;&gt;GitLab Mattermost 3.7.3&lt;&#x2F;h4&gt;

    &lt;p&gt;GitLab 9.1 includes &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;&quot;&gt;Mattermost 3.7.3&lt;&#x2F;a&gt;, an open
source Slack-alternative providing workplace messaging for web, PC and phone
with archiving and search. Improvements this month include next generation
iOS and Android Apps in beta, new CLI integrations, and much more.
This version includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt;
and upgrade is recommended.&lt;&#x2F;p&gt;

    &lt;p&gt;Mattermost 3.7.3 was also included in GitLab 9.0.4. Anyone on GitLab 9.0.4 or
later should have the patch already.&lt;&#x2F;p&gt;

    &lt;h4 id=&quot;other-improvements&quot;&gt;Other Improvements&lt;&#x2F;h4&gt;

    &lt;ul&gt;
      &lt;li&gt;GitLab now ships with Git 2.11
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1903&quot;&gt;issue&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
      &lt;li&gt;You can use Terraform configuration to spin up a GitLab instance on Google
Compute Engine (GCE) (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1521&quot;&gt;issue&lt;&#x2F;a&gt;). Support for spinning up gitlab-runner is being worked on
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2175&quot;&gt;issue&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
      &lt;li&gt;Google Cloud Storage can now be used as the backend for the Container Registry
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2076&quot;&gt;issue&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
Learn more about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;&quot;&gt;Omnibus GitLab &lt;&#x2F;a&gt; in our docs.&lt;&#x2F;p&gt;

    &lt;!-- end of right column --&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 class=&quot;text-center&quot; id=&quot;deprecations&quot;&gt;Deprecations&lt;&#x2F;h2&gt;

  &lt;h3 id=&quot;ubuntu-1204-package&quot;&gt;Ubuntu 12.04 Package&lt;&#x2F;h3&gt;

  &lt;p&gt;GitLab 9.1 will be the last release with support for Ubuntu 12.04 packages, as Ubuntu
12.04 will reach &lt;a href=&quot;http:&#x2F;&#x2F;fridge.ubuntu.com&#x2F;2017&#x2F;03&#x2F;15&#x2F;ubuntu-12-04-precise-pangolin-reaches-end-of-life-on-april-28-2017&#x2F;&quot;&gt;its End of Life in April 28th&lt;&#x2F;a&gt;. GitLab 9.2
will continue to be available on Ubuntu 14.04 and 16.04.&lt;&#x2F;p&gt;

  &lt;p&gt;Due: &lt;strong&gt;May 22nd&lt;&#x2F;strong&gt;, 2017.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;opensuse-132&quot;&gt;OpenSUSE 13.2&lt;&#x2F;h3&gt;

  &lt;p&gt;GitLab 9.1 will also be the last release with support for OpenSUSE 13.2 packages, as it
has reached its End of Life &lt;a href=&quot;https:&#x2F;&#x2F;en.opensuse.org&#x2F;Lifetime#Discontinued_distributions&quot;&gt;earlier this year&lt;&#x2F;a&gt;.
GitLab 9.2 will continue to be available on OpenSUSE 42.1.&lt;&#x2F;p&gt;

  &lt;p&gt;Due: &lt;strong&gt;May 22nd&lt;&#x2F;strong&gt;, 2017.&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;

&lt;hr &#x2F;&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 class=&quot;text-center&quot; id=&quot;upgrade-barometer&quot;&gt;Upgrade Barometer&lt;&#x2F;h2&gt;

  &lt;p&gt;To upgrade to GitLab 9.1, no downtime is required.&lt;&#x2F;p&gt;

  &lt;p&gt;However there are some migrations that might take significant time depending on
your installation size:&lt;&#x2F;p&gt;

  &lt;ul&gt;
    &lt;li&gt;A new column is added to the users table which might take some time if you
have a lot of users.&lt;&#x2F;li&gt;
    &lt;li&gt;The old cache directory is removed, which might take some time if there were a
lot of uploaded files.&lt;&#x2F;li&gt;
  &lt;&#x2F;ul&gt;

  &lt;p&gt;Starting with GitLab 9.1.0 it&#x27;s possible to upgrade to a newer version of GitLab
without having to take your GitLab instance offline. However, for this to work
there are the following requirements:&lt;&#x2F;p&gt;

  &lt;ol&gt;
    &lt;li&gt;You can only upgrade 1 release at a time. For example, if 9.1.15 is the last
release of 9.1 then you can safely upgrade from that version to 9.2.0.
However, if you are running 9.1.14 you first need to upgrade to 9.1.15.&lt;&#x2F;li&gt;
    &lt;li&gt;You have to use &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;development&#x2F;database&#x2F;post_deployment_migrations.html&quot;&gt;post-deployment migrations&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
    &lt;li&gt;You are using PostgreSQL. If you are using MySQL you will still need downtime
when upgrading.&lt;&#x2F;li&gt;
  &lt;&#x2F;ol&gt;

  &lt;p&gt;This applies to major, minor, and patch releases unless stated otherwise in a
release post.&lt;&#x2F;p&gt;

  &lt;p&gt;A new version of our API was released in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;#api-v4&quot;&gt;GitLab 9.0&lt;&#x2F;a&gt;.
While existing calls to API v3 will continue to work until August 2017, we
advise you to make any necessary changes to applications that use the v3 API.
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;v3_to_v4.html&quot;&gt;Read the documentation&lt;&#x2F;a&gt; to learn
more.&lt;&#x2F;p&gt;

  &lt;h4 id=&quot;note&quot;&gt;Note&lt;&#x2F;h4&gt;

  &lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult
the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI
enabled, you have to upgrade to GitLab 8.0
&lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;New configuration options have been introduced in the omnibus-gitlab packages.
To check what changed compared to your &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; configuration
file, run &lt;code&gt;sudo gitlab-ctl diff-config&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;end-of-deploy-boards-free-trial&quot;&gt;End of Deploy Boards Free Trial&lt;&#x2F;h3&gt;

  &lt;p&gt;To celebrate the launch of &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;#deploy-boards-eep&quot;&gt;Deploy Boards in GitLab 9.0&lt;&#x2F;a&gt;,
we offered a free trial to our Enterprise Edition Starter customers for the 9.0 release.
With the release of 9.1, Deploy Boards is now available only to Enterprise
Edition Premium customers. EEP customers should have already received an email
from GitLab Support with a new license key enabling this feature. If not,
please contact &lt;a href=&quot;&#x2F;support&#x2F;&quot;&gt;GitLab Support&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;gray-section&quot;&gt;
  &lt;div class=&quot;release-row align-top&quot;&gt;
    &lt;div class=&quot;column&quot;&gt;
      &lt;h3 id=&quot;changelog&quot;&gt;Changelog&lt;&#x2F;h3&gt;

      &lt;p&gt;Please check out the changelog to see all the named changes:&lt;&#x2F;p&gt;

      &lt;ul&gt;
        &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;GitLab CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
        &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;GitLab EE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;&#x2F;ul&gt;

      &lt;h3 id=&quot;installing&quot;&gt;Installing&lt;&#x2F;h3&gt;

      &lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

      &lt;h3 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h3&gt;

      &lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
    &lt;&#x2F;div&gt;
    &lt;div class=&quot;column&quot;&gt;
      &lt;h3 id=&quot;gitlab-products&quot;&gt;GitLab Products&lt;&#x2F;h3&gt;

      &lt;p&gt;We offer four different &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;products&lt;&#x2F;a&gt; for you and your company:&lt;&#x2F;p&gt;

      &lt;ul&gt;
        &lt;li id=&quot;ce&quot;&gt;&lt;strong&gt;GitLab Community Edition (CE)&lt;&#x2F;strong&gt;: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&quot;&gt;Open source&lt;&#x2F;a&gt;, self-managed solution of GitLab. Ideal for personal projects or small teams with minimal user management and workflow control needs. Every feature available in GitLab CE, is also available on GitLab Enterprise Edition (Starter and Premium), and GitLab.com.&lt;&#x2F;li&gt;
        &lt;li id=&quot;ee&quot;&gt;&lt;strong&gt;&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;a&gt; (EE)&lt;&#x2F;strong&gt;: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;&quot;&gt;Open core&lt;&#x2F;a&gt;, self-hosted, fully featured solution of GitLab. Available in two different subscriptions:
          &lt;ul&gt;
            &lt;li id=&quot;ees&quot;&gt;&lt;strong&gt;GitLab Enterprise Edition Starter (EES)&lt;&#x2F;strong&gt;: Ideal for co-located teams who need additional security and workflow controls for their professional projects.&lt;&#x2F;li&gt;
            &lt;li id=&quot;eep&quot;&gt;&lt;strong&gt;GitLab Enterprise Edition Premium (EEP)&lt;&#x2F;strong&gt;: Ideal for distributed teams who need advanced workflow controls, premium features, High Availability, and Premium Support.&lt;&#x2F;li&gt;
          &lt;&#x2F;ul&gt;
        &lt;&#x2F;li&gt;
        &lt;li id=&quot;gitlab-dot-com&quot;&gt;**&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com&lt;&#x2F;a&gt; **: SaaS GitLab solution, with &lt;a href=&quot;&#x2F;pricing&#x2F;#gitlab-com&quot;&gt;free and paid subscriptions&lt;&#x2F;a&gt;. GitLab.com is hosted by GitLab, Inc. Ideal for individuals who want to get their projects up and running quickly. Administrated by GitLab (users don&#x27;t have access to admin settings).&lt;&#x2F;li&gt;
      &lt;&#x2F;ul&gt;

    &lt;&#x2F;div&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;p class=&quot;note text-center&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.pexels.com&#x2F;photo&#x2F;hot-air-balloons-landscape-adventure-aviation-7342&#x2F;&quot;&gt;Cover image&lt;&#x2F;a&gt; licensed under &lt;a href=&quot;https:&#x2F;&#x2F;www.pexels.com&#x2F;photo-license&#x2F;&quot;&gt;CC0&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;section&gt;

&lt;style&gt;
  .badge-container a {
    margin-right: 3px;
  }
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;9_1&#x2F;9_1-cover-image.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.0.6</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/04/21/gitlab-9-dot-0-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/21/gitlab-9-dot-0-dot-6-released/</id>
<published>2017-04-21T00:00:00+00:00</published>
<updated>2017-04-21T00:00:00+00:00</updated>
<author>
<name>James Lopez</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.0.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;&quot;&gt;this month&#x27;s 9.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix filtered search input width for IE (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10662&quot;&gt;!10662&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue&#x27;s note cache expiration after delete (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10461&quot;&gt;!10461&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; POST &#x2F;projects&#x2F;:id&#x2F;hooks and PUT &#x2F;projects&#x2F;:id&#x2F;hook&#x2F;:hook_id no longer ignore the job_events param in the V4 API (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10586&quot;&gt;!10586&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the MR widget that merged any MR when choosing the option &quot;Merge when pipeline succeeds&quot; from the dropdown (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10611&quot;&gt;!10611&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix restricted visibility project setting (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10622&quot;&gt;!10622&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix orphaned notification settings (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10763&quot;&gt;!10763&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show sub-nav under Merge Requests when issue tracker is non-default (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10658&quot;&gt;!10658&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix PlantUML integration in GFM (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10651&quot;&gt;!10651&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Cache Gitlab::Geo queries (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1507&quot;&gt;!1507&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix 500 when selecting a mirror user (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1404&quot;&gt;!1404&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Ignore internal users on user counts (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1659&quot;&gt;!1659&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Move clauses from query to filter stage for elasticsearch notes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1675&quot;&gt;!1675&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Display custom hook error messages when automatic merge is enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1670&quot;&gt;!1670&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not require downtime. It includes a single migration that
removes notification settings that no longer have an existing namespace.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Upcoming Runner changes for GitLab.com</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/04/10/upcoming-runner-changes-for-gitlab-dot-com/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/10/upcoming-runner-changes-for-gitlab-dot-com/</id>
<published>2017-04-10T00:00:00+00:00</published>
<updated>2017-04-10T00:00:00+00:00</updated>
<author>
<name>Joshua Lambert</name>
</author>
<content type='html'>&lt;p&gt;Recent improvements to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;&quot;&gt;GitLab Runner&lt;&#x2F;a&gt; have made processing CI pipelines significantly more efficient and responsive. To take advantage of the changes, GitLab-provided shared runners have been upgraded, and we encourage users to update their private runners as well.&lt;&#x2F;p&gt;

&lt;p&gt;In addition, private runners older than version 1.9.0 will soon be throttled when checking for new jobs. Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;improving-responsiveness-and-efficiency-of-runners-on-gitlabcom&quot;&gt;Improving responsiveness and efficiency of Runners on GitLab.com&lt;&#x2F;h2&gt;

&lt;p&gt;Over the past year, &lt;a href=&quot;&#x2F;features&#x2F;continuous-integration&#x2F;&quot;&gt;GitLab CI&lt;&#x2F;a&gt; has grown significantly in both capability and popularity. On GitLab.com during busy periods of the day, it is not unusual for well over one thousand jobs to be simultaneously executing for customers. As more companies embrace CI&#x2F;CD and make the switch to DevOps, we are excited that GitLab can serve as such a transformational aspect of their development process.&lt;&#x2F;p&gt;

&lt;p&gt;With Runners becoming such a critical part of GitLab and customer workflows, we want to ensure their operation is as efficient as possible. One major change was released with GitLab Runner 1.9.0 three months ago, when we added support for &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Push_technology#Long_polling&quot;&gt;long polling&lt;&#x2F;a&gt;. This enhancement significantly improves the method by which Runners retrieve new jobs from the GitLab server, improving both scalability and responsiveness.&lt;&#x2F;p&gt;

&lt;p&gt;Today on GitLab.com all shared runners and 30% of private runners are at least version 1.9.0, and the benefits have been significant. A runner&#x27;s load on the API server has been reduced by 95%, and when idling it has been reduced by 99%. This enables GitLab to be more responsive to other requests, and offer additional scalability for the largest of deployments.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlabcom-support-for-deprecated-runners&quot;&gt;GitLab.com support for deprecated Runners&lt;&#x2F;h2&gt;

&lt;p&gt;While these changes are exciting, there are still over six thousand user-provided private runners based on less efficient versions over three months old. These older runners frequently check GitLab.com for new jobs, even while idle. As part of our goals to ensure GitLab.com is as responsive as possible, we are making a change to how often these runners can connect.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Beginning Monday April 17th, private runners older than 1.9.0 will be throttled to check for new jobs at most once per minute.&lt;&#x2F;strong&gt; These runners will continue to function as normal without changes, however may experience up to a one minute delay when picking up new jobs. It is also important to note that all runners prior to 9.0 are &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;v3_to_v4.html#v3-to-v4-version&quot;&gt;deprecated along with APIv3&lt;&#x2F;a&gt; and support will end in the near future.&lt;&#x2F;p&gt;

&lt;p&gt;We encourage all customers of GitLab.com to update their private runners to receive the latest improvements, and to ensure they continue to happily process pipelines well into the future. If you are not ready to upgrade your runners, you can &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;configuration&#x2F;advanced-configuration.html#the-global-section&quot;&gt;set the polling interval&lt;&#x2F;a&gt; to one minute by configuring &lt;code&gt;check_interval&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.0.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/04/10/gitlab-9-dot-0-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/10/gitlab-9-dot-0-dot-5-released/</id>
<published>2017-04-10T00:00:00+00:00</published>
<updated>2017-04-10T00:00:00+00:00</updated>
<author>
<name>James Lopez</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.0.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;&quot;&gt;this month&#x27;s 9.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle SSH keys that have multiple spaces between each marker (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10466&quot;&gt;!10466&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable invalid service templates (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10339&quot;&gt;!10339&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue boards having a vertical scrollbar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10312&quot;&gt;!10312&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add shortcuts and counters to MRs and issues in navbar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10497&quot;&gt;!10497&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Return 404 instead of a 500 error on API status endpoint if Geo tracking DB is not enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1571&quot;&gt;!1571&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Reset container width when switching to pipelines MR tab (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1528&quot;&gt;!1528&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Added quotes to GITLAB_SKIP_PG_UPGRADE (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1452&quot;&gt;!1452&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Updated documentation for external PostgreSQL usage (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1438&quot;&gt;!1438&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix AWS build errors (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1430&quot;&gt;!1430&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Build SLES 12 EE package at the same time as others (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1444&quot;&gt;!1444&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not require downtime. It includes a single migration that
disables invalid service templates.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.0.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/04/05/gitlab-9-dot-0-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/05/gitlab-9-dot-0-dot-3-released/</id>
<published>2017-04-05T00:00:00+00:00</published>
<updated>2017-04-05T00:00:00+00:00</updated>
<author>
<name>DJ Mountney</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.0.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;&quot;&gt;this month&#x27;s 9.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow users to import GitHub projects to subgroups. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10344&quot;&gt;!10344&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove unnecessary ORDER BY clause from forked_to_project_id subquery. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10334&quot;&gt;!10334&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed sidebar causes vertical scroll to stutter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10262&quot;&gt;!10262&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make the api &#x2F;notes endpoint work with noteable iid instead of id. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10258&quot;&gt;!10258&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve Markdown rendering when a lot of merge requests are referenced. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10252&quot;&gt;!10252&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix environment folder route when special chars present. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10250&quot;&gt;!10250&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Support wider range of monitored environments with Prometheus (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10159&quot;&gt;!10159&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix linking to new issue with selected template via url parameter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10155&quot;&gt;!10155&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make CI build to use optimistic locking only on status change. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10152&quot;&gt;!10152&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed labels icon being hidden in collapsed issuable sidebar. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10107&quot;&gt;!10107&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove unnecessary ORDER BY clause when updating todos. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10399&quot;&gt;!10399&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix race condition where a namespace would be deleted before a project was deleted. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10389&quot;&gt;!10389&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes method not replacing URL parameters correctly and breaking pipelines. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10351&quot;&gt;!10351&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix name collision when importing GitHub pull requests from forked repositories. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9719&quot;&gt;!9719&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GitHub importer for PRs of deleted forked repositories. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9992&quot;&gt;!9992&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Changed titles in board switcher. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1390&quot;&gt;!1390&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed issue boards milestone toggle text not updating when filtering. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1516&quot;&gt;!1516&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed the mirror user dropdown not displaying. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1554&quot;&gt;!1554&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed label resetting when sorting by weight. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1558&quot;&gt;!1558&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add the ability to edit shared runners quota on per-user basis. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1535&quot;&gt;!1535&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix sticking of the database load balancer. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1502&quot;&gt;!1502&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Add configuration support for new Mattermost 3.7 settings (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1432&quot;&gt;!1432&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Added support for postgres hot_standby_feedback option (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1416&quot;&gt;!1416&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix ability to disable postgres and redis exporters (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1435&quot;&gt;!1435&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix &#x27;template1 being accessed by other users&#x27; error (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1431&quot;&gt;!1431&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Start new services after they are enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1427&quot;&gt;!1427&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.0.4, 8.17.5, and 8.16.9 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/04/05/gitlab-9-dot-0-dot-4-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/04/05/gitlab-9-dot-0-dot-4-security-release/</id>
<published>2017-04-05T00:00:00+00:00</published>
<updated>2017-04-05T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 9.0.4, 8.17.5, and 8.16.9 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including security upgrades for
Mattermost, a fix for script injection using class attributes, a fix for a private
project name disclosure vulnerability, a fix for a file path disclosure vulnerability,
and fixes for two open redirect vulnerabilities. We recommend that all GitLab
installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;security-upgrade-for-mattermost-versions-37-and-36&quot;&gt;Security Upgrade for Mattermost versions 3.7 and 3.6&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has not yet released full details, however an important security
release was published and Mattermost has advised all users to upgrade immediately.
GitLab versions 8.16 and 8.17 have been upgraded to Mattermost 3.6.5 and GitLab
version 9.0 has been upgraded to Mattermost 3.7.3. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;2179&quot;&gt;#2179&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unfiltered-class-attribute-in-markdown-code&quot;&gt;Unfiltered &lt;code&gt;class&lt;&#x2F;code&gt; attribute in Markdown code&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;ChALkeR&#x2F;&quot;&gt;Chalker&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported a script injection vulnerability that allowed
an attacker to execute Gitlab Javascript code via unfiltered class definitions.
This attack is limited to pre-existing Javascript that can be referenced via
class names. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;30125&quot;&gt;#30125&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-project-name-disclosure-in-merge-requests&quot;&gt;Private project name disclosure in merge requests&lt;&#x2F;h2&gt;

&lt;p&gt;Timo Schmid from &lt;a href=&quot;https:&#x2F;&#x2F;www.ernw.de&#x2F;&quot;&gt;ERNW&lt;&#x2F;a&gt; reported an information disclosure vulnerability in GitLab
merge requests that allowed an attacker to disclose the names of private
repositories. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29364&quot;&gt;#29364&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;path-disclosure-in-project-importexport&quot;&gt;Path disclosure in project import&#x2F;export&lt;&#x2F;h2&gt;

&lt;p&gt;Timo Schmid from &lt;a href=&quot;https:&#x2F;&#x2F;www.ernw.de&#x2F;&quot;&gt;ERNW&lt;&#x2F;a&gt; also reported an information disclosure vulnerability in
the GitLab project import feature that allowed an attacker to disclose the full
path names for GitLab export directories when imports are allowed from GitLab
export files. Paths could also be disclosed by repeatedly attempting to create a
project export file. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29363&quot;&gt;#29363&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-vulnerabilities-in-the-gitlab-dashboard&quot;&gt;Open redirect vulnerabilities in the GitLab dashboard&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;eadz&quot;&gt;Eaden McKee&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported three open redirect vulnerabilities in GitLab
dashboard pages. The todos, issues, and merge request dashboards were vulnerable.
By including a &lt;code&gt;host&lt;&#x2F;code&gt; field in the URL an attacker could redirect a GitLab user
to the website of their choosing. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29651&quot;&gt;#29651&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;open-redirect-vulnerability-in-project-import-status&quot;&gt;Open redirect vulnerability in project import status&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;SecurityYasin&quot;&gt;Yasin Soliman&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported an open redirect vulnerability in the GitLab
project import status page. By including a specially crafted &lt;code&gt;continue[to]&lt;&#x2F;code&gt; field
in the URL an attacker could redirect a GitLab user to the website of their choosing. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29651&quot;&gt;#29651&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Mattermost vulnerability:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE Omnibus (with Mattermost enabled) 7.14-8.16.8, 8.17.0-8.17.4, 9.0.0-9.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Unfiltered &lt;code&gt;class&lt;&#x2F;code&gt; attribute in Markdown code:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.0.0-8.16.8, 8.17.0-8.17.4, 9.0.0-9.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Private project name disclosure in merge requests:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 7.1.0-8.16.8, 8.17.0-8.17.4, 9.0.0-9.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Path disclosure in project import&#x2F;export:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.8.0-8.16.8, 8.17.0-8.17.4, 9.0.0-9.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Open redirects in dashboards:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.16.0-8.16.8, 8.17.0-8.17.4, 9.0.0-9.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Open redirect in project import status:&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;GitLab CE+EE 8.6.0-8.16.8, 8.17.0-8.17.4, 9.0.0-9.0.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.0.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/29/gitlab-9-dot-0-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/29/gitlab-9-dot-0-dot-2-released/</id>
<published>2017-03-29T00:00:00+00:00</published>
<updated>2017-03-29T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 9.0.2 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version contains two important security fixes for the recently introduced
nested groups feature of GitLab 9.0. We recommend that all GitLab installations
running version 9.0 be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;These security vulnerabilities do not affect GitLab versions prior to 9.0.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;changing-a-subgroups-path-breaks-links-to-repositories-and-files-uploaded-in-top-level-namespaces-of-the-same-name&quot;&gt;Changing a subgroup&#x27;s path breaks links to repositories and files uploaded in top-level namespaces of the same name&lt;&#x2F;h2&gt;

&lt;p&gt;An internal code review discovered that when subgroups containing projects were
renamed GitLab would improperly attempt to move the repositories and uploads
directories of any top-level project of the same name. GitLab was not properly
including the full path in subgroups when moving the directories. This
vulnerability could allow a user to rename top-level namespaces and upload
directories for projects that they did not own, effectively removing repository
access for the original owner, breaking all links to those uploads, and
potentially even deleting repositories belonging to other users.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;private-group-name-disclosure-via-nested-groups-parent_id-in-newupdate&quot;&gt;Private group name disclosure via nested groups parent_id in new&#x2F;update&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;SecurityYasin&quot;&gt;Yasin Soliman&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that it was possible to disclose the
names of private groups by attempting to create subgroups within them. This attack
requires identifying the numeric ID of the private group, however these numeric
IDs are predictable and easy to guess.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CE+EE 9.0.0 - 9.0.1&lt;&#x2F;p&gt;

&lt;p&gt;We recommend that all installations listed above be upgraded as soon as possible.
No workarounds are available for these vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no new migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 9.0.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/28/gitlab-9-dot-0-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/28/gitlab-9-dot-0-dot-1-released/</id>
<published>2017-03-28T00:00:00+00:00</published>
<updated>2017-03-28T00:00:00+00:00</updated>
<author>
<name>DJ Mountney</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 9.0.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;22&#x2F;gitlab-9-0-released&#x2F;&quot;&gt;this month&#x27;s 9.0 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix empty clones when Gitaly process is not running. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;merge_requests&#x2F;145&quot;&gt;!145&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;404 when requesting build trace&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9759&quot;&gt;!9759&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Simplify projects, merge requests search queries. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10053&quot;&gt;!10053&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix after_script processing for Runners APIv4. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10185&quot;&gt;!10185&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix escaped html appearing in milestone page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10224&quot;&gt;!10224&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug that caused jobs that already had been retried to be retried again. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10249&quot;&gt;!10249&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow filtering by all started milestones. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9938&quot;&gt;!9938&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow sorting by due date and priority. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9938&quot;&gt;!9938&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed branches pagination not displaying. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10145&quot;&gt;!10145&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed filtered search not working in IE. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10149&quot;&gt;!10149&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Optimize labels finder query when searching for a project with a group. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;10248&quot;&gt;!10248&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed issues not getting milestone on an issue board with associated milestone. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1445&quot;&gt;!1445&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix failing Elasticsearch migration. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1453&quot;&gt;!1453&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Allow downgrade when no users were added in previous period. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1490&quot;&gt;!1490&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Allow configuration of prepared statement caching in Rails. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1414&quot;&gt;!1414&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Default redis Prometheus exporter to off if redis is not managed locally. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1428&quot;&gt;!1428&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Default postgres Prometheus exporter to off if postgres is not managed locally. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1428&quot;&gt;!1428&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Default pages http to https redirect to off. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1425&quot;&gt;!1425&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Make HSTS easier to configure, and the docs on it accurate. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1423&quot;&gt;!1423&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Move the automatic PG Upgrade to happen after migrations have run. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1429&quot;&gt;!1429&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a fix to a Elasticsearch migration, which only impacts EE
with Elasticsearch enabled, and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 9.0 released with Subgroups and Deploy Boards</title>
<release>9.0</release>
<link href='https://about.gitlab.com/releases/2017/03/22/gitlab-9-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/22/gitlab-9-0-released/</id>
<published>2017-03-22T00:00:00+00:00</published>
<updated>2017-03-22T00:00:00+00:00</updated>
<author>
<name>Victor Wu</name>
</author>
<content type='html'>
&lt;section class=&quot;release-post-section&quot;&gt;

  &lt;p&gt;Today we are releasing &lt;strong&gt;GitLab 9.0&lt;&#x2F;strong&gt;, 18 months after &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;releasing 8.0&lt;&#x2F;a&gt;. We&#x27;ve made &lt;a href=&quot;&#x2F;releases&#x2F;&quot;&gt;significant advances to GitLab during this period&lt;&#x2F;a&gt;, shipping a version every single month on the 22nd. Let&#x27;s quickly recap how far we&#x27;ve come since 8.0, and see those features dovetailing into today&#x27;s 9.0 release. Or &lt;a href=&quot;#subgroups-ce-ee&quot;&gt;jump ahead&lt;&#x2F;a&gt; to 9.0 features.&lt;&#x2F;p&gt;

  

  &lt;hr &#x2F;&gt;

  &lt;h3 id=&quot;idea-to-production&quot;&gt;Idea to Production&lt;&#x2F;h3&gt;

  &lt;p&gt;In the last several releases, GitLab has transformed how development teams get from idea to production. In just a few minutes, you can deploy GitLab to a container scheduler, add CI&#x2F;CD with auto deployed review apps, utilize ChatOps, and analyze your cycle time. With 9.0 you can now watch your deploys with deploy boards and monitor application performance with Prometheus. Building on our &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;14&#x2F;gitlab-live-event-recap&#x2F;&quot;&gt;Master Plan&lt;&#x2F;a&gt;, GitLab 9.0 truly delivers the entire DevOps toolchain, so let&#x27;s see how it all fits together:&lt;&#x2F;p&gt;

  &lt;figure class=&quot;video_container&quot;&gt;
    &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;PoBaY_rqeKA&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt;&lt;&#x2F;iframe&gt;
  &lt;&#x2F;figure&gt;

  &lt;h3 id=&quot;usability-and-design&quot;&gt;Usability and Design&lt;&#x2F;h3&gt;

  &lt;p&gt;In &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;8.0&lt;&#x2F;a&gt;, we refreshed GitLab&#x27;s look and feel, modernizing almost every UI element and significantly improving usability. (We had even updated our logo a few months prior.) Since then, we have continued to invest in design, ramping up our UX design and research &lt;a href=&quot;&#x2F;company&#x2F;team&#x2F;&quot;&gt;team&lt;&#x2F;a&gt;, who are dedicated to improving usability and solving major pain points, everything from small CSS tweaks, to major UX flows. In each 8.x release we have iteratively evolved the design. And with GitLab 9.0, we made huge strides in &lt;a href=&quot;#updated-navigation-ce-ee&quot;&gt;simplifying our global, group, and project navigation&lt;&#x2F;a&gt;, a crucial enhancement as GitLab&#x27;s feature set becomes increasingly powerful.&lt;&#x2F;p&gt;

  &lt;p&gt;In an effort to continue improving our UX, we now have a &lt;a href=&quot;&#x2F;community&#x2F;gitlab-first-look&#x2F;&quot;&gt;research panel&lt;&#x2F;a&gt; where you can help shape the future of GitLab! By joining our panel, you&#x27;ll be the first to see new features and your thoughts will drive product improvements!&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;a href=&quot;&#x2F;community&#x2F;gitlab-first-look&#x2F;&quot; class=&quot;btn btn-lg btn-red webcast-button&quot;&gt;Join our research panel&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;collaboration-on-digital-work&quot;&gt;Collaboration on Digital Work&lt;&#x2F;h3&gt;

  &lt;p&gt;GitLab helps you collaborate on digital work. We made many enhancements to issues, a core part of collaboration in GitLab. This includes weights (&lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;12&#x2F;22&#x2F;gitlab-8-3-released&#x2F;#issue-weight-ee-only&quot;&gt;8.3&lt;&#x2F;a&gt;), linking to merge requests (&lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;12&#x2F;22&#x2F;gitlab-8-3-released&#x2F;#merge-request-references-in-issues&quot;&gt;8.3&lt;&#x2F;a&gt;), moving an issue to another project (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;03&#x2F;22&#x2F;gitlab-8-6-released&#x2F;#move-issues-to-other-projects&quot;&gt;8.6&lt;&#x2F;a&gt;), and a powerful filter&#x2F;search interface (&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;#new-issues-search-and-filter-interface&quot;&gt;8.16&lt;&#x2F;a&gt;). We also released issue boards (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;#issue-board&quot;&gt;8.11&lt;&#x2F;a&gt;), providing a simple mechanism for issue workflow management using stages (&quot;lists&quot;, in GitLab parlance). GitLab 9.0 continues to enhance boards further, &lt;a href=&quot;#boards-with-milestones-ees&quot;&gt;by improving its integration with milestones&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;We are excited to ship &lt;a href=&quot;#subgroups-ce-ee&quot;&gt;&lt;strong&gt;subgroups&lt;&#x2F;strong&gt; in GitLab 9.0&lt;&#x2F;a&gt;, another huge step in furthering GitLab collaboration. This powerful new paradigm of groups within groups allows for truly team-based and team-first collaboration in even very large organizations with many different departments. We&#x27;re on a &lt;a href=&quot;&#x2F;company&#x2F;mission&#x2F;#mission&quot;&gt;mission&lt;&#x2F;a&gt; to enable &lt;strong&gt;everyone to contribute&lt;&#x2F;strong&gt;. 9.0 continues to help break down silos wherever you work so that indeed everyone in your organization can contribute.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;code-review-and-code-collaboration&quot;&gt;Code Review and Code Collaboration&lt;&#x2F;h3&gt;

  &lt;p&gt;We&#x27;ve continued to improve code review and code collaboration in GitLab since 8.0, including features such as merge when pipeline succeeds (&lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;12&#x2F;22&#x2F;gitlab-8-3-released&#x2F;#auto-merge-on-build-success&quot;&gt;8.3&lt;&#x2F;a&gt;), code diffs (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;01&#x2F;22&#x2F;gitlab-8-4-released&#x2F;#code-highlighting-in-diffs&quot;&gt;8.4&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;02&#x2F;22&#x2F;gitlab-8-5-released&#x2F;#render-svgs-in-diffs&quot;&gt;8.5&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;04&#x2F;22&#x2F;gitlab-8-7-released&#x2F;#better-diffs&quot;&gt;8.7&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;#improved-diffs&quot;&gt;8.10&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;#diff-in-notification-emails&quot;&gt;8.15&lt;&#x2F;a&gt;), a conflict editor (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;#merge-conflict-resolution&quot;&gt;8.11&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;#merge-conflict-editor&quot;&gt;8.13&lt;&#x2F;a&gt;), merge request versions (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;#merge-request-versions&quot;&gt;8.12&lt;&#x2F;a&gt;), blocking merge until discussions resolved (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#prevent-merge-until-review-is-done&quot;&gt;8.14&lt;&#x2F;a&gt;), toggling approvals (&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;#removing-your-approval-in-ee-merge-requests&quot;&gt;8.16&lt;&#x2F;a&gt;), as well as squash and merge (&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;#squash-and-merge-ee&quot;&gt;8.17&lt;&#x2F;a&gt;). Many of these and other features involve the merge request widget. So in GitLab 9.0, we are &lt;a href=&quot;#merge-request-widget-usability-ce-ee&quot;&gt;revamping its design&lt;&#x2F;a&gt; to accommodate the many existing and upcoming features that integrate with it.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;continuous-integration&quot;&gt;Continuous Integration&lt;&#x2F;h3&gt;

  &lt;p&gt;&lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;#continuous-integration-in-gitlab&quot;&gt;8.0&lt;&#x2F;a&gt; was a pivotal release as it fully integrated continuous integration (CI) into GitLab itself. Subsequently, new CI features were implemented into the API (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;01&#x2F;22&#x2F;gitlab-8-4-released&#x2F;#new-ci-features-in-api&quot;&gt;8.4&lt;&#x2F;a&gt;) and pipeline events were exposed through webhooks (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;#pipelines-web-hooks&quot;&gt;8.11&lt;&#x2F;a&gt;). Pipelines were also integrated into merge requests (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;#pipelines-in-mrs&quot;&gt;8.11&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;#additional-pipeline-details-included-in-merge-request-workflow&quot;&gt;8.17&lt;&#x2F;a&gt;) and commits (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;#pipelines-for-commits&quot;&gt;8.13&lt;&#x2F;a&gt;), as well as its own visual graph (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;#pipelines-graph&quot;&gt;8.11&lt;&#x2F;a&gt;). GitLab runner was improved in every release from &lt;a href=&quot;&#x2F;releases&#x2F;&quot;&gt;8.10 to 8.17&lt;&#x2F;a&gt;. We released review apps (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;#review-apps-experimental&quot;&gt;8.12&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;#ability-to-stop-review-apps&quot;&gt;8.13&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#review-apps&quot;&gt;8.14&lt;&#x2F;a&gt;) and auto deploy (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;#auto-deploy&quot;&gt;8.15&lt;&#x2F;a&gt;) to automatically deploy code into automatically created environments. And now with GitLab 9.0, we are shipping &lt;a href=&quot;#deploy-boards-eep&quot;&gt;deploy boards&lt;&#x2F;a&gt;, allowing you track how your app is being deployed to multiple servers.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;feedback-and-insight&quot;&gt;Feedback and Insight&lt;&#x2F;h3&gt;

  &lt;p&gt;GitLab also provides you feedback and insight into your code and development process. We released contribution analytics (&lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;12&#x2F;22&#x2F;gitlab-8-3-released&#x2F;#contribution-analytics-ee-only&quot;&gt;8.3&lt;&#x2F;a&gt;) and cycle analytics (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;#cycle-analytics&quot;&gt;8.12&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;#cycle-analytics-improvements&quot;&gt;8.13&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#cycle-analytics-events&quot;&gt;8.14&lt;&#x2F;a&gt;). We released time tracking (&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#time-tracking-beta-ee&quot;&gt;8.14&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;#time-tracking-in-ce-and-api&quot;&gt;8.16&lt;&#x2F;a&gt;). In &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;#monitoring-gitlab-with-prometheus&quot;&gt;8.16&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;#monitoring-gitlab-with-prometheus&quot;&gt;8.17&lt;&#x2F;a&gt;, we shipped open source &lt;a href=&quot;https:&#x2F;&#x2F;prometheus.io&quot;&gt;Prometheus&lt;&#x2F;a&gt; to extend that feedback into monitoring the server that hosts your GitLab instance, through the Prometheus console. In GitLab 9.0, we are releasing &lt;a href=&quot;#environment-monitoring-ce-ee&quot;&gt;environment monitoring&lt;&#x2F;a&gt; integrated into the GitLab UI itself, building on top of the Prometheus foundation.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;thank-you&quot;&gt;Thank You&lt;&#x2F;h3&gt;

  &lt;p&gt;We&#x27;re humbled by our community continuing to actively create and comment in numerous issues, as well as directly contributing source code. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests?label_name%5B%5D=Community+Contribution&amp;amp;milestone_title=9.0&amp;amp;scope=all&amp;amp;state=merged&quot;&gt;In 9.0, there are over 130 merge requests from the community&lt;&#x2F;a&gt;, with &lt;a href=&quot;#notable-community-contributions-ce&quot;&gt;many notable contributions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;As an open source project, GitLab CE now has over &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;commits&#x2F;master&quot;&gt;47,000 commits&lt;&#x2F;a&gt; (more than doubling the &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;10&#x2F;22&#x2F;gitlab-8-1-released&#x2F;&quot;&gt;20,000 count set back in 8.1&lt;&#x2F;a&gt;). Today, GitLab has &lt;a href=&quot;http:&#x2F;&#x2F;contributors.gitlab.com&quot;&gt;over 1,500 contributors&lt;&#x2F;a&gt;. Thank you! 👏🙏&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;growth&quot;&gt;Growth&lt;&#x2F;h3&gt;

  &lt;p&gt;We&#x27;ve also grown quickly during this time. We had just under 25 team members in 7 countries when we shipped 8.0. Today, we have &lt;a href=&quot;&#x2F;company&#x2F;team&#x2F;&quot;&gt;over 150 folks spread across 37 countries&lt;&#x2F;a&gt;. That has helped us now to ship self-managed GitLab in three versions, &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;Community Edition (CE), Enterprise Edition Starter (EES), and Enterprise Edition Premium (EEP)&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;unique-platform&quot;&gt;Unique Platform&lt;&#x2F;h3&gt;

  &lt;p&gt;Over the past years we’ve seen application lifecycle management (ALM) tools
move into the direction of offering a single, integrated experience. GitLab is
at the forefront of this and we&#x27;re now shipping with monitoring by default, completing our &lt;a href=&quot;&#x2F;direction&#x2F;#scope&quot;&gt;scope&lt;&#x2F;a&gt;.
If you want to design, code, build, deploy, and
monitor an application, you can now all do that straight from within GitLab.&lt;&#x2F;p&gt;

  &lt;p&gt;GitLab is a complete and opinionated application lifecycle management tool with
one interface and one data-store. GitLab’s integrated approach brings emergent
benefits such as shorter time to market (measurable through cycle analytics),
higher developer efficiency, and a consistent development process.&lt;&#x2F;p&gt;

  &lt;p&gt;Enjoy 9.0 and read on for details!&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=rEChfZEsuVw&amp;amp;feature=youtu.be&quot; class=&quot;btn btn-lg btn-red&quot;&gt;Watch our release webcast!&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;gitlab-90-meetups&quot;&gt;GitLab 9.0 Meetups&lt;&#x2F;h3&gt;

  &lt;p&gt;Let&#x27;s get together and talk about all the awesomeness coming with GitLab 9.0. We&#x27;ll be in San Francisco,
Denver, Boston, Amsterdam, London, and New Orleans. 🙌&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;a href=&quot;&#x2F;events&#x2F;&quot; class=&quot;btn btn-lg btn-red&quot;&gt;Join GitLab Meetups&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;mvp gray-section&quot;&gt;
  &lt;div class=&quot;release-post-section&quot;&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;mvp_badge.png&quot; alt=&quot;mvp-badge&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h2 id=&quot;this-months-most-valuable-person-mvp-is-jacopo-beschi&quot;&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;jacopo-beschi&quot;&gt;Jacopo Beschi&lt;&#x2F;a&gt;&lt;&#x2F;h2&gt;

    &lt;p&gt;Jacopo made it possible to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8691&quot;&gt;undo marking a todo item as done in the todos list&lt;&#x2F;a&gt;. This is a huge productivity enhancement that helps you recover from mistakes in managing todos. Thanks Jacopo!&lt;&#x2F;p&gt;

  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;

  &lt;h2 id=&quot;subgroups-ce-ees-eep&quot;&gt;Subgroups ce ees eep&lt;&#x2F;h2&gt;

  &lt;p&gt;GitLab has always been the simplest way for people to collaborate on code in a project. Just create a project, and you&#x27;re on your way from idea to production. Users have &lt;em&gt;also&lt;&#x2F;em&gt; told us that they want GitLab to be a team-based collaboration tool that supports hierarchical team structures sharing different code repositories. With 9.0, we are excited to ship our brand new version of GitLab groups that allows for groups within groups, i.e. &quot;subgroups&quot;.&lt;&#x2F;p&gt;

  &lt;p&gt;Each group, at each level, is itself a first-class citizen GitLab group, with the ability to have multiple projects. The new version of groups thus enables you to have a hierarchy of code repositories. You can create up to 20 levels of subgroups, giving you an incredible level of flexibility.&lt;&#x2F;p&gt;

  &lt;p&gt;In this example, the organization represented by the &lt;code&gt;gitlab-nested&lt;&#x2F;code&gt; group has a design team, a backend team, and a frontend team, each represented by a group within the &lt;code&gt;gitlab-nested&lt;&#x2F;code&gt; group. The &lt;code&gt;design&lt;&#x2F;code&gt; and &lt;code&gt;backend&lt;&#x2F;code&gt; groups have further subgroups within them.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;gitlab-nested.png&quot; alt=&quot;Subgroups&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;Feel free to look at and provide feedback on what we are working on for &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?label_name%5B%5D=subgroups&quot;&gt;groups in future releases of GitLab&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;group&#x2F;subgroups&#x2F;&quot;&gt;Learn more about subgroups in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;deploy-boards-eep&quot;&gt;Deploy Boards eep&lt;&#x2F;h2&gt;

    &lt;p&gt;GitLab has an incredibly powerful CI&#x2F;CD system, with over a thousand runners executing pipelines for GitLab.com projects alone. These pipelines perform builds to compile and package software, run automated tests, spawn review apps, and can even deploy software to staging and production. To date, these deployments would report back whether the environment was successfully updated, but what if you wanted more fidelity? Or a single pane to view all deployments across all environments? For larger organizations, the answers to these questions become particularly important.&lt;&#x2F;p&gt;

    &lt;p&gt;Today with 9.0, we are excited to release Deploy Boards for environments running on Kubernetes. The Environments page of Pipelines now offers a single place to view the current health and deployment status of each environment, displaying the specific status of each pod in the deployment. Developers and other teammates can view the progress and status of a rollout, pod by pod, in the workflow they already use without any need to access Kubernetes.&lt;&#x2F;p&gt;

    &lt;p&gt;To celebrate the launch, Deploy Boards will be available in 9.0 as a free trial for Enterprise Edition Starter customers.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;deploy_boards.html&quot;&gt;Learn more about Deploy Boards in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;deploy_boards.png&quot; alt=&quot;Deploy Boards&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;export-issues-ees-eep&quot;&gt;Export Issues ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;GitLab already enables you to filter, search, and navigate through the many issues you use daily. But users say they want a snapshot of issues for offline analysis or to communicate with other teams who may not be in GitLab just yet. With 9.0 EES, GitLab will email you a CSV export of issues if you click the download button at the top right in the issue list view.&lt;&#x2F;p&gt;

    &lt;p&gt;We designed and integrated the feature directly into the project issue list view. This allows you to leverage the existing powerful filter and search capability so that you can export exactly just the issues you care about. The actual processing and email sending happens asynchronously in the background once you confirm the action, so that it gets out of your way and you can continue to use GitLab as normal.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issues&#x2F;csv_export.html&quot;&gt;Learn more about exporting issues in CSV in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;export_issues.png&quot; alt=&quot;Export Issues&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;environment-monitoring-ce-ees-eep&quot;&gt;Environment Monitoring ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;A robust monitoring infrastructure is crucial to operating a successful application.  It ensures your app is responsive, provides valuable insight into the impact of changes, and enables quick debugging when problems occur. However setting this infrastructure up is often a lower priority, in particular for non-production environments, and it is often not integrated with the rest of your toolchain.&lt;&#x2F;p&gt;

    &lt;p&gt;With GitLab 9.0, we are proud to introduce the first monitoring system that is fully integrated with your CI&#x2F;CD pipelines and source code repository. Leveraging &lt;a href=&quot;https:&#x2F;&#x2F;prometheus.io&quot;&gt;Prometheus&lt;&#x2F;a&gt;, GitLab will now bring the same technology used for production systems to development environments like staging and even review apps.&lt;&#x2F;p&gt;

    &lt;p&gt;In this initial release we are tracking the CPU and Memory utilization of your app running on each Kubernetes based environment, and this is only the beginning. In the near feature we will gauge the performance impact of a merge, support a much broader range of application metrics, and fuse monitoring data with Deploy Boards.&lt;&#x2F;p&gt;

    &lt;p&gt;Participate in the discussion and future of performance monitoring with GitLab &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?scope=all&amp;amp;utf8=✓&amp;amp;state=opened&amp;amp;label_name[]=Prometheus&amp;amp;label_name[]=feature%20proposal&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;prometheus.html&quot;&gt;Learn more about the Prometheus project integration in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;prometheus.png&quot; alt=&quot;Environment monitoring with Prometheus&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h2 id=&quot;performance-improvements-ce-ees-eep&quot;&gt;Performance Improvements ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;As with every release, we&#x27;ve worked hard to make GitLab faster. With 9.0 in particular, we&#x27;ve put a particular focus on noticeable performance improvements across the board. Elasticsearch (ES) gets an upgrade in GitLab EE 9.0, with support for ES 5.1 and a host of smaller fixes. In accordance with our &quot;cloud native&quot; philosophy, we&#x27;ve added support for &lt;a href=&quot;https:&#x2F;&#x2F;aws.amazon.com&#x2F;elasticsearch-service&#x2F;&quot;&gt;AWS-hosted&lt;&#x2F;a&gt; and HTTPS Elasticsearch clusters. Larger GitLab EE installations will benefit from improvements in the initial indexing process, and minor performance improvements have been made to repository indexing.&lt;&#x2F;p&gt;

    &lt;p&gt;The improvements to the dashboards were focused on &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9030&quot;&gt;more efficient searching by author or assignee&lt;&#x2F;a&gt;, and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9006&quot;&gt;removing unnecessary queries&lt;&#x2F;a&gt;. As the most common use for the dashboard is to view issues or merge requests assigned to you, this should be noticeable for most users. On GitLab.com, we saw transaction timings drop significantly for issues and merge requests.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues?label_name%5B%5D=performance&amp;amp;milestone_title=9.0&amp;amp;scope=all&amp;amp;state=closed&quot;&gt;Take a look&lt;&#x2F;a&gt; at the full list of performance improvements in 9.0 and keep an eye out for further improvements in upcoming releases as GitLab continues to get faster, especially for large installations.&lt;&#x2F;p&gt;

    &lt;p&gt;Did you know, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab.com&lt;&#x2F;a&gt; is &quot;merely&quot; a massive-scale implementation of GitLab EE with hundreds of thousands of users? This just shows the level of scale that you can run GitLab EE and these performance improvements should start making a noticeable difference to the speed and reliability of GitLab.com.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;issues_dashboard.png&quot; alt=&quot;Issues dashboard&quot; &#x2F;&gt;&lt;em class=&quot;shadow&quot;&gt;Transaction timings dropping significantly for issues dashboard&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;merge_requests_dashboard.png&quot; alt=&quot;Merge requests dashboard&quot; &#x2F;&gt;&lt;em class=&quot;shadow&quot;&gt;Transaction timings dropping significantly for merge requests dashboard&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;database-load-balancing-ees-eep&quot;&gt;Database Load Balancing ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;Load balancing of database queries allows one to spread the load and impact of
queries across multiple database servers. Traditionally this involves additional
software such as &lt;a href=&quot;http:&#x2F;&#x2F;www.pgpool.net&#x2F;&quot;&gt;pgpool&lt;&#x2F;a&gt;. Starting with 9.0, GitLab
Enterprise Edition supports load balancing of queries when using PostgreSQL.&lt;&#x2F;p&gt;

    &lt;p&gt;Load balancing queries can bring many benefits, such as reducing the load and
memory usage of the primary, and reducing response timings. Spreading the load
also means that badly behaving database queries will not impact queries
executing on a different database server, reducing the likelihood of such
queries negatively affecting a GitLab installation.&lt;&#x2F;p&gt;

    &lt;p&gt;GitLab&#x27;s load balancer also responds to database failovers. When a primary is
unresponsive or was changed to a secondary, the load balancer will wait a brief
moment before retrying an operation. When secondaries become unavailable, they
are ignored until they become available again. For this to work in the most
transparent way you will need to use a load balancer (e.g. HAProxy) for every
database host.&lt;&#x2F;p&gt;

    &lt;p&gt;One problem of load balancing is dealing with replication lag. For example, if a
write happens and you then read from a secondary it&#x27;s possible for said
secondary to not yet have the data. One way of dealing with this is to use
synchronous replication. However, synchronous replication is not ideal as
replication lag could cause queries to take a very long time. Furthermore, if a
replica were to become unavailable the whole system can grind to a halt.&lt;&#x2F;p&gt;

    &lt;p&gt;To work around this the database load balancer uses &quot;sticky sessions&quot;. When a
user triggers a write to the primary the user&#x27;s session will keep using the
primary. Session sticking is disabled again once a timeout expires (30 seconds),
or when the written data is available on all secondaries.&lt;&#x2F;p&gt;

    &lt;p&gt;For more information on how to set up database load balancing you can refer to
the documentation section &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;database_load_balancing.html&quot;&gt;&quot;Database Load Balancing&quot;&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;load_balancing_load.png&quot; alt=&quot;Load Balancing Load&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;load_balancing_memory_usage.png&quot; alt=&quot;Load Balancing Memory Usage&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;load_balancing_timing_improvements.png&quot; alt=&quot;Load Balancing Timing Improvements&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;

  &lt;h2 id=&quot;updated-navigation-ce-ees-eep&quot;&gt;Updated Navigation ce ees eep&lt;&#x2F;h2&gt;

  &lt;p&gt;Here at GitLab, most of our business functions (not just product development) occur on GitLab.com itself. So we definitely understand the importance of navigation. We want to make it frictionless, intuitive, and efficient for you to perform your daily tasks, especially if you are using GitLab for several hours each day.&lt;&#x2F;p&gt;

  &lt;p&gt;Navigation design is a crucial component in achieving that, and with 9.0, we have modernized the interface, leveraging best practices from our design team, as well as incorporating feedback from user research. At first glance, it doesn&#x27;t seem like a lot has changed. But that was intentional. We meticulously analyzed what was already working well, and changed only the problem areas.&lt;&#x2F;p&gt;

  &lt;p&gt;The menu items in the tabbed navigation interface have been re-arranged (and in some cases, merged and renamed) for both the main and subtabs. The activity tab is now a subtab of the project tab. The main tabs of repository, issues, merge requests, and pipelines and now positioned from left to right in that order, reflecting the idea to production flow. The subtabs in the main graph tab have been re-arranged and placed in other locations. Again, we carefully considered where each menu should be located drawing from feedback and analysis. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26348&quot;&gt;Read more about the details of the change.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;Another notable change is the pop-in sidebar. That has been now replaced by a less intrusive dropdown menu in the top left, that doesn&#x27;t unnecessarily cover too much screen content. Previously there was a dropdown menu for settings, accessed from a cog icon at the top right for the project and group pages. These have been now pulled into the existing tabbed menu interface, harmonizing and simplifying the entire experience.&lt;&#x2F;p&gt;

  &lt;p&gt;In 9.0, we simplified the project view configuration settings so that you can now choose between viewing (1) Files and README or (2) Activity on the main project tab for any project. (This is a profile setting that applies to all projects you view.) The first option is the default. Previously, we had a third option for viewing just the README, which was the default. We wanted something that was helpful for both new and existing users, and based on user feedback and research, we are opting for this design.&lt;&#x2F;p&gt;

  &lt;p&gt;We also brought back the ability the create a new project quickly, by simply clicking the &lt;code&gt;+&lt;&#x2F;code&gt; button at the top right.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;navigation.png&quot; alt=&quot;Navigation&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;

    &lt;h2 id=&quot;reorder-issues-in-board-list-ce-ees-eep&quot;&gt;Reorder Issues in Board List ce ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;&lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;issueboard&#x2F;&quot;&gt;Issue Boards&lt;&#x2F;a&gt; are a great way to manage issues moving through the different stages (&quot;lists&quot; in GitLab), in order to quickly get an idea to production. But users often want to further represent order or priority of issues within a single list. With 9.0, you can now reorder issues within an issue board list, using the intuitive and existing drag and drop mechanism.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issue_board.html&quot;&gt;Learn more about Issue Boards for Community Edition in our docs&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

  &lt;div class=&quot;column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;boards_reorder.gif&quot; alt=&quot;Boards Reorder&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row image-left&quot;&gt;
  &lt;div class=&quot;column text-column&quot;&gt;
    &lt;h2 id=&quot;boards-with-milestones-ees-eep&quot;&gt;Boards with Milestones ees eep&lt;&#x2F;h2&gt;

    &lt;p&gt;A GitLab Issue Board enables you to manage a group of issues within a single milestone, but requires you to select the associated milestone filter each time you navigate to it. With GitLab 9.0 EES, you can now create an Issue Board that is associated to a specific milestone. This allows you to create unique boards for individual milestones.&lt;&#x2F;p&gt;

    &lt;p&gt;As you plan and execute work in each new milestone, we suggest you keep creating new boards. This allows you to conveniently straddle between milestones, while also allowing you to save and look back at previous completed milestones.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issue_board.html&quot;&gt;Learn more about Issue Boards for Enterprise Edition in our docs&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;

  &lt;div class=&quot;column image-column&quot;&gt;
    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;boards_milestone.gif&quot; alt=&quot;Boards Milestone&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 id=&quot;api-v4-ce-ees-eep&quot;&gt;API v4 ce ees eep&lt;&#x2F;h2&gt;

  &lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;&quot;&gt;API&lt;&#x2F;a&gt; is a great way to automate tasks, control and automate GitLab in new and powerful ways. Over time, we have continued to improve our API to make it more complete and support the new features we add every month to make GitLab the best end-to-end development environment.&lt;&#x2F;p&gt;

  &lt;p&gt;This constant iteration has resulted in a few inconsistencies in our existing API. Today we are announcing v4 of our API, which aims to make the API more consistent and more RESTful.&lt;&#x2F;p&gt;

  &lt;p&gt;We will continue to support v3 of the API until August 2017 and so we encourage you to make any necessary changes to applications that use the v3 API.&lt;&#x2F;p&gt;

  &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;v3_to_v4.html&quot;&gt;Take a look at the changes in v4 to see what&#x27;s different.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 id=&quot;disaster-recovery-alpha-eep&quot;&gt;Disaster Recovery Alpha eep&lt;&#x2F;h2&gt;

  &lt;p&gt;Regardless of the size of your company, you need to make sure that your
infrastructure is resilient to any kind of natural or human-induced disasters
that can happen. One of the best practices in this case is to have a least two
servers (one primary, one secondary) in two different locations to make sure
that if the primary server goes down, the other one can take over. Having this
in place is critical for any teams to make sure you reduce the downtime as much
as possible, and reduce the risk of data loss. We have received many requests to
offer a disaster recovery solution built in GitLab and today we are introducing
a first step towards supporting this.&lt;&#x2F;p&gt;

  &lt;p&gt;Since &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;02&#x2F;22&#x2F;gitlab-8-5-released&#x2F;&quot;&gt;GitLab 8.5&lt;&#x2F;a&gt;,
GitLab ships with &lt;a href=&quot;&#x2F;solutions&#x2F;geo&#x2F;&quot;&gt;Geo&lt;&#x2F;a&gt;, a
feature that lets you have one or more secondary instances that mirror your main
GitLab instance. Geo&#x27;s primary goal was to drastically speed up cloning and
fetching projects over large distances. While Geo works really well for this
use case, it has one point that prevents us to use this technology to support a
full disaster recovery scenario: files that are saved on disk were not
replicated.&lt;&#x2F;p&gt;

  &lt;p&gt;This is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;846&quot;&gt;what we are actively working on&lt;&#x2F;a&gt;
and with GitLab 9.0, we are releasing a first step towards providing support for
Disaster Recovery scenarios. We call it Disaster Recovery in Alpha. A bunch of
important changes to Geo have been introduced with this release:&lt;&#x2F;p&gt;

  &lt;ul&gt;
    &lt;li&gt;If you use LFS, LFS objects will automatically be replicated to the secondary
nodes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1237&quot;&gt;Merge request&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
    &lt;li&gt;All file uploads are now recorded in the database
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8893&quot;&gt;Merge request&lt;&#x2F;a&gt;).
This will allow us to replicate those files in a future iteration.&lt;&#x2F;li&gt;
    &lt;li&gt;There is a new process to automatically backfill repositories
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1197&quot;&gt;Merge request&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
    &lt;li&gt;You can now disable a secondary node through the UI.&lt;&#x2F;li&gt;
    &lt;li&gt;Both GitLab Geo and Disaster Recovery are under development and not production-ready.&lt;&#x2F;li&gt;
  &lt;&#x2F;ul&gt;

  &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;geo_dr.png&quot; alt=&quot;Navigation&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;To enable Disaster Recovery in Alpha, refer to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;geo&#x2F;replication&#x2F;configuration.html&quot;&gt;the documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;Disaster Recovery in Alpha is available to all Enterprise Edition Premium
customers as part of GitLab Geo.&lt;&#x2F;p&gt;

  &lt;p&gt;On a sidenote, due to &lt;a href=&quot;#postgresql-version-upgrade&quot;&gt;PostgreSQL&#x27;s upgrade&lt;&#x2F;a&gt; happening with GitLab
9.0, GitLab Geo 8.x is not compatible with GitLab Geo 9.0 and requires a
manual update. If you are an existing Geo user, please read the
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;geo&#x2F;replication&#x2F;updating_the_geo_nodes.html&quot;&gt;upgrade instructions&lt;&#x2F;a&gt;
before upgrading to GitLab 9.0.&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section text-center zero-bottom-margin&quot;&gt;
  &lt;h2 id=&quot;other-improvements-in-gitlab-90&quot;&gt;Other Improvements in GitLab 9.0&lt;&#x2F;h2&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-row align-top divider&quot;&gt;
  &lt;div class=&quot;column&quot;&gt;
    &lt;h3 id=&quot;native-unicode-emoji--ce-ees-eep&quot;&gt;Native Unicode Emoji 🔥 ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Unicode emojis allow for a more consistent feel with the rest of your OS and equates to you being able to add emojis faster 🚀. We were able to get rid some of the hefty images and JSON payloads and generate the awards emoji menu immediately instead of having a loading spinner to wait for an async response. 👯 ✨ 🏋 👌&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;award_emojis.html&quot;&gt;Learn more about award emojis in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;native_unicode_emojis.gif&quot; alt=&quot;Native unicode emojis&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;gitlab-ci-ce-ees-eep&quot;&gt;GitLab CI ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;To follow conventions of naming across GitLab, and to further move away from the
&lt;code&gt;build&lt;&#x2F;code&gt; term and toward &lt;code&gt;job&lt;&#x2F;code&gt;, CI variables &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9756&quot;&gt;have been renamed&lt;&#x2F;a&gt; for the 9.0
release.&lt;&#x2F;p&gt;

    &lt;table&gt;
      &lt;thead&gt;
        &lt;tr&gt;
          &lt;th&gt;8.X name&lt;&#x2F;th&gt;
          &lt;th&gt;9.0 name&lt;&#x2F;th&gt;
        &lt;&#x2F;tr&gt;
      &lt;&#x2F;thead&gt;
      &lt;tbody&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_ID&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_JOB_ID&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_REF&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_COMMIT_SHA&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_TAG&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_COMMIT_TAG&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_REF_NAME&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_COMMIT_REF_NAME&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_REF_SLUG&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_COMMIT_REF_SLUG&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_NAME&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_JOB_NAME&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_STAGE&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_JOB_STAGE&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_REPO&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_REPOSITORY_URL&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_TRIGGERED&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_PIPELINE_TRIGGERED&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_MANUAL&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_JOB_MANUAL&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
        &lt;tr&gt;
          &lt;td&gt;&lt;code&gt;CI_BUILD_TOKEN&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
          &lt;td&gt;&lt;code&gt;CI_JOB_TOKEN&lt;&#x2F;code&gt;&lt;&#x2F;td&gt;
        &lt;&#x2F;tr&gt;
      &lt;&#x2F;tbody&gt;
    &lt;&#x2F;table&gt;

    &lt;p&gt;The old variables continue to work, however they are deprecated and will be removed soon.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;variables&#x2F;&quot;&gt;Read more about the CI variables in our documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;gitaly-ce-ees-eep&quot;&gt;Gitaly ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;In every release, GitLab becomes faster with huge performance boosts. Today&#x27;s
release is no different. Along with &lt;a href=&quot;#performance-improvements-ce-ee&quot;&gt;other performance improvements&lt;&#x2F;a&gt;,
GitLab now ships with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitaly&quot;&gt;Gitaly&lt;&#x2F;a&gt;, our own
open-source solution to handle git calls made by GitLab. While completely
transparent, this change in how GitLab operates internally is important and
will make GitLab faster. We are actively working on Gitaly, so you can expect
more news about it in future releases.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;group-search-and-filtering-ce-ees-eep&quot;&gt;Group search and filtering ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;With our new version of groups in 9.0, we anticipate you&#x27;ll create much more of them. So we&#x27;ve made it possible to filter and search groups in the list view, and also allow you to sort by when they were created or updated.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;filter_groups.png&quot; alt=&quot;Filter Groups&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;tokenized-filter-and-search-in-issues-and-merge-requests-ce-ees-eep&quot;&gt;Tokenized Filter and Search in Issues and Merge Requests ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;We first introduced the new streamlined filter and search interface for issues in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;8.16&lt;&#x2F;a&gt;. With 9.0, we are tokenizing the filter attributes for even more visual clarity. Many other places in GitLab deserve this new interface. We&#x27;re bringing it to merge requests in 9.0, and will roll it out to other parts of GitLab in future releases.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;mr_new_search_interface.png&quot; alt=&quot;Merge Requests New Search Interface&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;impersonation-tokens-ce-ees-eep&quot;&gt;Impersonation Tokens ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Alongside the new API, we&#x27;ve also added &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25367&quot;&gt;Impersonation tokens&lt;&#x2F;a&gt;. If you&#x27;ve ever built a bot or a piece of functionality with our API, you&#x27;ll often have to retrieve a token via OAuth. This can sometimes be undesirable and cumbersome to have to go through a UI flow in order to retrieve this token. Administrators of a GitLab instance can now retrieve an impersonation token on behalf of a user to make this process a lot easier and centrally controlled. This process will also alleviate any issues caused by users inadvertently invalidating tokens in use for other applications.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;index.html#impersonation-tokens&quot;&gt;Read more about impersonation tokens in our API docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;gitlab-pages-artifacts-cleaned-after-deployment-ce-ees-eep&quot;&gt;GitLab Pages artifacts cleaned after deployment ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;In order to more efficiently utilize artifact storage space, &lt;a href=&quot;https:&#x2F;&#x2F;pages.gitlab.io&#x2F;&quot;&gt;GitLab Pages&lt;&#x2F;a&gt; artifacts are now automatically deleted after they have been deployed. If you would like to retain artifacts, an &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#artifacts-expire_in&quot;&gt;expiry duration&lt;&#x2F;a&gt; can be set.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;comments-in-diffs-ce-ees-eep&quot;&gt;Comments in diffs ce ees eep&lt;&#x2F;h3&gt;
    &lt;p&gt;Commenting in diffs is now much easier with a purple background indicating which line we are selecting.
Going through discussion in comments is also much easier now that we can collapse discussions and
see note authors avatars in the sidebar of the diff.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;diff_comments.gif&quot; alt=&quot;Comments in diffs&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;pipeline-triggers-with-user-permissions-ce-ees-eep&quot;&gt;Pipeline triggers with User permissions ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;A new &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;pipeline_triggers.html&quot;&gt;Pipeline Trigger API&lt;&#x2F;a&gt; and UI is now available, which utilize the user level permissions of their creator. This enables the token to be used not just for the current project, but also all dependent projects as well. The Build Trigger API remains functional, however it is deprecated and will be removed soon.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;new-default-value-for-ci-variable-cachekey-ce-ees-eep&quot;&gt;New default value for CI variable &quot;cache:key&quot; ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Unless specifically configured, the value of &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#cachekey&quot;&gt;&lt;code&gt;cache:key&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; is now &lt;code&gt;default&lt;&#x2F;code&gt;. This allows the cache to be shared between all pipelines and jobs within the project, increasing CI&#x2F;CD efficiency and speed.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;blocking-manual-actions-in-pipelines-ce-ees-eep&quot;&gt;Blocking manual actions in pipelines ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;jobs&#x2F;job_control.html#create-a-job-that-must-be-run-manually&quot;&gt;Manual actions&lt;&#x2F;a&gt; can now be configured to block pipelines until they are completed. Pipelines blocked by manual actions have a status of &lt;code&gt;manual&lt;&#x2F;code&gt;, and can be enabled by setting &lt;code&gt;allow_failure&lt;&#x2F;code&gt; to &lt;code&gt;false&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;more-control-over-http-strict-transport-security-ce-ees-eep&quot;&gt;More control over HTTP Strict Transport Security ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Now you fine tune your Strict Transport Security enforcement just by changing settings in your Omnibus GitLab config.
Use HTTP Strict Transport Security to provide your installation with even better protection against MITM attacks.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;nginx.html#setting-http-strict-transport-security&quot;&gt;Learn more about HSTS in Omnibus in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

  &lt;&#x2F;div&gt;
  &lt;div class=&quot;column&quot;&gt;

    &lt;h3 id=&quot;new-branch-for-bare-projects-ce-ees-eep&quot;&gt;New Branch for Bare Projects ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;When you click the &lt;code&gt;New branch&lt;&#x2F;code&gt; button in an issue, you may want to start creating code right away.
But for a project with an empty repository, GitLab, prior to 9.0, stubbornly sends you back to the main project view when you click the button.
With 9.0, when you do click the &lt;code&gt;New branch&lt;&#x2F;code&gt; in an empty repository project, GitLab automatically creates the master branch, commits a blank &lt;code&gt;README.md&lt;&#x2F;code&gt; file to it, and creates and redirects you to a new branch based on the issue title.
If your &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;project_services.html&quot;&gt;project is already configured with a deployment service&lt;&#x2F;a&gt; (e.g. Kubernetes), GitLab takes one step further and prompts you to set up &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html&quot;&gt;auto deploy&lt;&#x2F;a&gt; by helping you create a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;web_editor.html#create-a-new-branch-from-an-issue&quot;&gt;Read more about creating new branches from issues in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;no_repo_new_branch.png&quot; alt=&quot;New Branch for Repo-less Projects in GitLab 9.0&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;merge-request-widget-usability-ce-ees-eep&quot;&gt;Merge Request Widget Usability ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;The merge request plays a crucial role in code collaboration and deployment. In particular, a lot of important information and call-to-actions are located in the merge request widget. With 9.0, we are starting to improve the usability of that widget. We want to present the most relevant information and allow you to see, at a glance, the status of the code, whether it&#x27;s in review, or if it&#x27;s already deployed in an environment. We will continue to iterate on this new cleaner design, and continue to make the entire merge request more powerful.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;merge_request_widget.png&quot; alt=&quot;Merge Request Widget&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;create-mattermost-team-when-creating-gitlab-group-ce-ees-eep&quot;&gt;Create Mattermost Team when Creating GitLab Group ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Sometimes chatting with your workgroup is the best way to get an idea rolling. To help you with that, GitLab integrates with &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;&quot;&gt;Mattermost&lt;&#x2F;a&gt;. With GitLab 9.0, setting up a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;gitlab-mattermost&#x2F;README.html#gitlab-mattermost&quot;&gt;Mattermost team&lt;&#x2F;a&gt; for your GitLab group to chat and collaborate is effortless. When creating a GitLab group, select the appropriate checkbox, and GitLab will tell your Mattermost instance to create a team with the same name.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;group-creation-mm.png&quot; alt=&quot;Create GitLab Group Create Mattermost Team&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;paginated-environments-ce-ees-eep&quot;&gt;Paginated environments ce ees eep&lt;&#x2F;h3&gt;

    &lt;p&gt;Pagination was added to environments list in order to improve performance and user experience.
Environments that belong to a folder are now shown in a new view.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;environments_pagination.png&quot; alt=&quot;Root Level Environments&quot; class=&quot;shadow&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;9_0&#x2F;environments_folder_view.png&quot; alt=&quot;Environments inside a folder&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

    &lt;h3 id=&quot;notable-community-contributions-ce&quot;&gt;Notable Community Contributions ce&lt;&#x2F;h3&gt;

    &lt;ul&gt;
      &lt;li&gt;Add the Username to the HTTP(S) clone URL of a Repository (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9347&quot;&gt;!9347&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;API: Make it possible to pass coverage value to commit status endpoint (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9214&quot;&gt;!9214&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Show directory hierarchy when listing wiki pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8133&quot;&gt;!8133&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add a feature to create a &#x27;directly addressed&#x27; Todo when mentioned in the beginning of a line (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7926&quot;&gt;!7926&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Todos can now be undone (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8691&quot;&gt;!8691&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Show 99+ for large count in todos notification bell (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9171&quot;&gt;!9171&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add the option to filter todos by Added (Marked) and Pipelines (Build failed) (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8861&quot;&gt;!8861&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add merge request count to each issue on issues list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9252&quot;&gt;!9252&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Introduce &lt;code&gt;&#x2F;award&lt;&#x2F;code&gt; slash command; Allow posting of just an emoji in comment (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9382&quot;&gt;!9382&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add a button to create an issue for a failing build (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9391&quot;&gt;!9391&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add user &amp;amp; build links in Slack Notifications (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8641&quot;&gt;!8641&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Add the ability to copy a branch name to the clipboard (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9103&quot;&gt;!9103&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
      &lt;li&gt;Brand header logo for pipeline emails (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9049&quot;&gt;!9049&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;

    &lt;h3 id=&quot;omnibus-gitlab-package-improvements-ce-ees-eep&quot;&gt;Omnibus GitLab Package Improvements ce ees eep&lt;&#x2F;h3&gt;

    &lt;h4 id=&quot;postgresql-version-upgrade&quot;&gt;PostgreSQL version upgrade&lt;&#x2F;h4&gt;

    &lt;p&gt;Previous GitLab releases were shipped with PostgreSQL 9.2 by default. PostgreSQL
9.2&#x27;s end of life (EOL) is &lt;a href=&quot;https:&#x2F;&#x2F;www.postgresql.org&#x2F;support&#x2F;versioning&#x2F;&quot;&gt;set to September 2017&lt;&#x2F;a&gt;.
For this reason, as well as to have the latest features and performance
improvements, we need to update the PostgreSQL version that GitLab uses.&lt;&#x2F;p&gt;

    &lt;p&gt;GitLab 9.0 now ships with PostgreSQL 9.6 by default. For existing installations,
the omnibus-gitlab packages for GitLab 9.0 will attempt to automatically upgrade
your database, using the &lt;code&gt;gitlab-ctl pg-upgrade&lt;&#x2F;code&gt; tool that is included
&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;#postgresql-version-upgrade&quot;&gt;since 8.15&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;database.html#upgrade-packaged-postgresql-server&quot;&gt;Read more about database upgrade in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

    &lt;p&gt;Ran into issues? Create an issue at the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&quot;&gt;omnibus-gitlab issue tracker&lt;&#x2F;a&gt;,
and reference it in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1783&quot;&gt;upgrade problems meta issue.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

    &lt;h4 id=&quot;gitlab-mattermost-37&quot;&gt;GitLab Mattermost 3.7&lt;&#x2F;h4&gt;

    &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;mattermost-3-7&quot;&gt;Mattermost 3.7&lt;&#x2F;a&gt; is included in
GitLab 9.0. The &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;&quot;&gt;open source Slack-alternative&#x27;s&lt;&#x2F;a&gt;
newest release offers group messaging for quick, direct chats, custom channel push
notification preferences, new website link previews and much more.&lt;&#x2F;p&gt;

    &lt;p&gt;This version includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt;
and upgrade is recommended.&lt;&#x2F;p&gt;

    &lt;h4 id=&quot;raspberry-pi-2-changes&quot;&gt;Raspberry Pi 2 changes&lt;&#x2F;h4&gt;

    &lt;p&gt;Due to a fault in release process that was caused by changes in build infrastructure,
packages for Raspberry Pi 2 &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1303&quot;&gt;were tagged under Debian distribution instead of Raspbian&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;p&gt;We&#x27;ve resolved this issue and also synced all latest versions of packages
to &lt;code&gt;Raspbian&lt;&#x2F;code&gt; distribution.&lt;&#x2F;p&gt;

    &lt;p&gt;Going forward, we will only release Raspberry Pi 2 packages under &lt;code&gt;Raspbian&lt;&#x2F;code&gt; distribution.
Further more, as &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;#raspbian-wheezy-package&quot;&gt;announced in 8.17 release post&lt;&#x2F;a&gt;,
we will provide only Jessie packages for Raspberry Pi 2.&lt;&#x2F;p&gt;

    &lt;p&gt;If you did any manual changes to the apt repository as a workaround, you will need to change the distribution.
You can do this by running:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sed -i &#x27;s&#x2F;debian&#x2F;raspbian&#x2F;g&#x27; &#x2F;etc&#x2F;apt&#x2F;sources.list.d&#x2F;gitlab_raspberry-pi2.list
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
    &lt;h4 id=&quot;monitoring-gitlab-with-prometheus&quot;&gt;Monitoring GitLab with Prometheus&lt;&#x2F;h4&gt;

    &lt;p&gt;With the release of GitLab 9.0, Prometheus and its associated exporters are now on by default. It is now easier than ever to ensure your GitLab service is healthy and responsive, with over 100 metrics available for monitoring. If you would like to disable Prometheus and all of it&#x27;s related services, simply set:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;prometheus_monitoring[&#x27;enable&#x27;] = false
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
    &lt;p&gt;&lt;i class=&quot;fas fa-book&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;monitoring&#x2F;prometheus&#x2F;&quot;&gt;Read more on monitoring with Prometheus docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 class=&quot;text-center&quot; id=&quot;deprecations&quot;&gt;Deprecations&lt;&#x2F;h2&gt;

  &lt;h3 id=&quot;gitlab-runner-deprecation&quot;&gt;GitLab Runner Deprecation&lt;&#x2F;h3&gt;

  &lt;p&gt;Please note that GitLab Runners prior to 9.0 utilize API v3, and therefore are deprecated along with the v3 API. Runners version 9.0 and above utilize the &lt;a href=&quot;#api-v4-ce-ee&quot;&gt;new v4 API&lt;&#x2F;a&gt;, requiring a minimum of GitLab 9.0.&lt;&#x2F;p&gt;

  &lt;p&gt;Due: &lt;strong&gt;August 2017&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;git-annex-deprecation&quot;&gt;Git-Annex deprecation&lt;&#x2F;h3&gt;

  &lt;p&gt;As &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;#git-annex-support&quot;&gt;previously announced&lt;&#x2F;a&gt;,
support for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;git_annex.html&quot;&gt;Git-Annex&lt;&#x2F;a&gt; has
been deprecated in GitLab 9.0.&lt;&#x2F;p&gt;

  &lt;p&gt;Read through the
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;git&#x2F;lfs&#x2F;migrate_from_git_annex_to_git_lfs.html&quot;&gt;Git-Annex to Git-LFS migration guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;Due: &lt;strong&gt;today&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

  &lt;h3 id=&quot;gitlab-pages-ip-on-gitlabcom&quot;&gt;GitLab Pages IP on GitLab.com&lt;&#x2F;h3&gt;

  &lt;p&gt;We&#x27;ve changed the &lt;strong&gt;IP address&lt;&#x2F;strong&gt; of GitLab Pages server on &lt;strong&gt;GitLab.com&lt;&#x2F;strong&gt;. Your DNS &lt;code&gt;A&lt;&#x2F;code&gt; record needs update.
For more info, please read the blog post &quot;&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;03&#x2F;06&#x2F;we-are-changing-the-ip-of-gitlab-pages-on-gitlab-com&#x2F;&quot;&gt;We are changing the IP of GitLab Pages on GitLab.com&lt;&#x2F;a&gt;&quot;.&lt;&#x2F;p&gt;

  &lt;p&gt;Due: &lt;strong&gt;March 31st&lt;&#x2F;strong&gt;, 2017 at 23:59h UTC.&lt;&#x2F;p&gt;

&lt;&#x2F;section&gt;
&lt;!-- END OF DEPRECATIONS BLOCK --&gt;

&lt;!-- UPGRADE BAROMETER BLOCK --&gt;
&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;h2 class=&quot;text-center&quot; id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

  &lt;p&gt;To upgrade to GitLab 9.0, downtime is required. Larger instances (&amp;gt;1000 users)
should expect about 15 minutes of downtime.&lt;&#x2F;p&gt;

  &lt;p&gt;The specific migrations requiring downtime or taking significant time are described below.&lt;&#x2F;p&gt;
  &lt;ul&gt;
    &lt;li&gt;Some columns are renamed. This operation requires downtime.&lt;&#x2F;li&gt;
    &lt;li&gt;A new column is added to users table, which does not require downtime but may take some time to complete.&lt;&#x2F;li&gt;
    &lt;li&gt;The builds table is updated, which does not require downtime but may take some time depending on your CI usage.&lt;&#x2F;li&gt;
  &lt;&#x2F;ul&gt;

  &lt;p&gt;GitLab 9.0 introduces a &lt;a href=&quot;#api-v4&quot;&gt;new version of our API&lt;&#x2F;a&gt;. While existing calls
to API v3 will continue to work until August 2017, we advise you to make any
necessary changes to applications that use the v3 API. &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;v3_to_v4.html&quot;&gt;Read the documentation&lt;&#x2F;a&gt;
to learn more.&lt;&#x2F;p&gt;

  &lt;p&gt;Because of PostgreSQL&#x27;s upgrade, GitLab 9.0 introduces a breaking change to
GitLab Geo. If you are an existing Geo user, please refer to the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;geo&#x2F;replication&#x2F;updating_the_geo_nodes.html&quot;&gt;documentation
before upgrading to 9.0&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;h4 id=&quot;note&quot;&gt;Note&lt;&#x2F;h4&gt;

  &lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;New configuration options have been introduced in the omnibus-gitlab packages. To
check what changed compared to your &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; configuration
file, run &lt;code&gt;sudo gitlab-ctl diff-config&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

  &lt;p&gt;If you&#x27;re GitLab EE user, please be aware that in 9.0 release we bumped the required version of Elasticsearch from 2.4.x to 5.1.x.
Please update it following the official &lt;a href=&quot;https:&#x2F;&#x2F;www.elastic.co&#x2F;guide&#x2F;en&#x2F;elasticsearch&#x2F;reference&#x2F;5.1&#x2F;setup-upgrade.html&quot;&gt;documentation&lt;&#x2F;a&gt;.
Indexes created by Elasticsearch 2.4.x can be read by Elasticsearch 5.1.x.&lt;&#x2F;p&gt;
&lt;&#x2F;section&gt;
&lt;!-- END OF UPGRADE BAROMETER BLOCK --&gt;

&lt;section class=&quot;gray-section&quot;&gt;
  &lt;div class=&quot;release-row align-top&quot;&gt;
    &lt;div class=&quot;column&quot;&gt;
      &lt;h3 id=&quot;changelog&quot;&gt;Changelog&lt;&#x2F;h3&gt;

      &lt;p&gt;Please check out the changelog to see all the named changes:&lt;&#x2F;p&gt;

      &lt;ul&gt;
        &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;GitLab CE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
        &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;GitLab EE&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;&#x2F;ul&gt;

      &lt;h3 id=&quot;installing&quot;&gt;Installing&lt;&#x2F;h3&gt;

      &lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

      &lt;h3 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h3&gt;

      &lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

    &lt;&#x2F;div&gt;
    &lt;div class=&quot;column&quot;&gt;

      &lt;h3 id=&quot;gitlab-products&quot;&gt;GitLab Products&lt;&#x2F;h3&gt;

      &lt;p&gt;We offer four different &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;products&lt;&#x2F;a&gt; for you and your company:&lt;&#x2F;p&gt;

      &lt;ul&gt;
        &lt;li id=&quot;ce&quot;&gt;&lt;strong&gt;GitLab Community Edition (CE)&lt;&#x2F;strong&gt;: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&quot;&gt;Open source&lt;&#x2F;a&gt;, self-managed solution of GitLab. Ideal for personal projects or small teams with minimal user management and workflow control needs. Every feature available in GitLab CE, is also available on GitLab Enterprise Edition (Starter and Premium), and GitLab.com.&lt;&#x2F;li&gt;
        &lt;li id=&quot;ee&quot;&gt;&lt;strong&gt;&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;a&gt; (EE)&lt;&#x2F;strong&gt;: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;&quot;&gt;Open core&lt;&#x2F;a&gt;, self-managed, fully featured solution of GitLab. Available in two different subscriptions:
          &lt;ul&gt;
            &lt;li id=&quot;ees&quot;&gt;&lt;strong&gt;GitLab Enterprise Edition Starter (EES)&lt;&#x2F;strong&gt;: Ideal for co-located teams who need additional security and workflow controls for their professional projects.&lt;&#x2F;li&gt;
            &lt;li id=&quot;eep&quot;&gt;&lt;strong&gt;GitLab Enterprise Edition Premium (EEP)&lt;&#x2F;strong&gt;: Ideal for distributed teams who need advanced workflow controls, premium features, High Availability, and Premium Support.&lt;&#x2F;li&gt;
          &lt;&#x2F;ul&gt;
        &lt;&#x2F;li&gt;
        &lt;li id=&quot;gitlab-dot-com&quot;&gt;**&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com&lt;&#x2F;a&gt; **: Free GitLab solution, which runs on top of GitLab EES, hosted by GitLab, Inc. Ideal for individuals who want to get their projects up and running quickly. Administrated by GitLab (users don&#x27;t have access to admin settings).&lt;&#x2F;li&gt;
      &lt;&#x2F;ul&gt;

    &lt;&#x2F;div&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;section&gt;

&lt;section class=&quot;release-post-section&quot;&gt;
  &lt;p class=&quot;note text-center&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.pexels.com&#x2F;photo&#x2F;landscape-nature-mountain-lake-37650&#x2F;&quot;&gt;Cover image&lt;&#x2F;a&gt; licensed under &lt;a href=&quot;https:&#x2F;&#x2F;www.pexels.com&#x2F;photo-license&#x2F;&quot;&gt;CC0&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;section&gt;

&lt;style&gt;
  .badge-container a {
    margin-right: 3px;
  }
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;9_0&#x2F;9_0-cover-image.jpeg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.17.4, 8.16.8, and 8.15.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/20/gitlab-8-dot-17-dot-4-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/20/gitlab-8-dot-17-dot-4-security-release/</id>
<published>2017-03-20T23:59:00+00:00</published>
<updated>2017-03-20T23:59:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.17.4, 8.16.8, and 8.15.8 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including an important security
fix for a critical information disclosure vulnerability, protection against Server-Side
Request Forgery (SSRF) attacks, a fix for some links vulnerable to tabnabbing, a fix for
a flaw that could leak private email addresses in Atom feeds, and a fix for private
repository data leakage into ElasticSearch (EE-specific). We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt;
that all affected GitLab installations be upgraded to one of these versions
&lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;information-disclosure-in-issue-and-merge-request-trackers&quot;&gt;Information Disclosure in Issue and Merge Request Trackers&lt;&#x2F;h2&gt;

&lt;p&gt;During an internal code review a critical vulnerability in the GitLab Issue and
Merge Request trackers was discovered. This vulnerability could allow a user
with access to assign ownership of an issue or merge request to another user
to disclose that user&#x27;s private token, email token, email address, and
encrypted OTP secret. Reporter-level access to a GitLab project is required to
exploit this flaw.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability is the result of a bug in the serialization of a user object
and was introduced in GitLab 8.7.0. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29661&quot;&gt;the issue&lt;&#x2F;a&gt; for more
details.&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2017-0882&quot;&gt;CVE-2017-0882&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;8.7.0 through 8.15.7&lt;&#x2F;li&gt;
  &lt;li&gt;8.16.0 through 8.16.7&lt;&#x2F;li&gt;
  &lt;li&gt;8.17.0 through 8.17.3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;post-upgrade-steps&quot;&gt;Post-Upgrade Steps&lt;&#x2F;h3&gt;

&lt;p&gt;Due to the nature of this vulnerability it is possible that sensitive user tokens
have been cached by proxies or web browsers. We therefore recommend that
administrators reset private tokens and incoming email tokens for all users. A
rake task for performing token resets is included with this announcement.&lt;&#x2F;p&gt;

&lt;p&gt;Encrypted One-Time Password (OTP) secrets may also have been leaked by the
vulnerability. These secrets are encrypted, require the key for decrypting the
secret, and cannot be used on their own without a copy of the user password,
however we are still recommending that all users who utilize One-Time Passwords
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;account&#x2F;two_factor_authentication.html&quot;&gt;disable and then re-enable their 2FA&lt;&#x2F;a&gt; for all GitLab instances. This will
reset the OTP secret.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;rake-task-for-resetting-user-tokens&quot;&gt;Rake Task for Resetting User Tokens&lt;&#x2F;h3&gt;

&lt;p&gt;After upgrading we recommended that all GitLab installations reset all user
private tokens and email tokens. To do so please save the following rake task
in the appropriate location.&lt;&#x2F;p&gt;

&lt;p&gt;For Omnibus: &lt;code&gt;&#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;service&#x2F;gitlab-rails&#x2F;lib&#x2F;tasks&#x2F;reset_token.rake&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For Source: &lt;code&gt;&amp;lt;gitlab_installation_dir&amp;gt;&#x2F;lib&#x2F;tasks&#x2F;reset_token.rake&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;c1&quot;&gt;# lib&#x2F;tasks&#x2F;reset_token.rake&lt;&#x2F;span&gt;
&lt;span class=&quot;nb&quot;&gt;require_relative&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;..&#x2F;..&#x2F;app&#x2F;models&#x2F;concerns&#x2F;token_authenticatable.rb&#x27;&lt;&#x2F;span&gt;

&lt;span class=&quot;no&quot;&gt;STDOUT&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;sync&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;kp&quot;&gt;true&lt;&#x2F;span&gt;

&lt;span class=&quot;n&quot;&gt;namespace&lt;&#x2F;span&gt; &lt;span class=&quot;ss&quot;&gt;:tokens&lt;&#x2F;span&gt; &lt;span class=&quot;k&quot;&gt;do&lt;&#x2F;span&gt;
  &lt;span class=&quot;n&quot;&gt;desc&lt;&#x2F;span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;Reset all GitLab user auth tokens&quot;&lt;&#x2F;span&gt;
  &lt;span class=&quot;n&quot;&gt;task&lt;&#x2F;span&gt; &lt;span class=&quot;ss&quot;&gt;reset_all: :environment&lt;&#x2F;span&gt; &lt;span class=&quot;k&quot;&gt;do&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;reset_all_users_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;:reset_authentication_token!&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
  &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;

  &lt;span class=&quot;n&quot;&gt;desc&lt;&#x2F;span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;Reset all GitLab email tokens&quot;&lt;&#x2F;span&gt;
  &lt;span class=&quot;n&quot;&gt;task&lt;&#x2F;span&gt; &lt;span class=&quot;ss&quot;&gt;reset_all_email: :environment&lt;&#x2F;span&gt; &lt;span class=&quot;k&quot;&gt;do&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;reset_all_users_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;:reset_incoming_email_token!&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
  &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;

  &lt;span class=&quot;k&quot;&gt;def&lt;&#x2F;span&gt; &lt;span class=&quot;nf&quot;&gt;reset_all_users_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
    &lt;span class=&quot;no&quot;&gt;TmpUser&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;find_in_batches&lt;&#x2F;span&gt; &lt;span class=&quot;k&quot;&gt;do&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;|&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;batch&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;|&lt;&#x2F;span&gt;
      &lt;span class=&quot;nb&quot;&gt;puts&lt;&#x2F;span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;Processing batch starting with user ID: &lt;&#x2F;span&gt;&lt;span class=&quot;si&quot;&gt;#{&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;batch&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;first&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;id&lt;&#x2F;span&gt;&lt;span class=&quot;si&quot;&gt;}&lt;&#x2F;span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;&lt;&#x2F;span&gt;

      &lt;span class=&quot;n&quot;&gt;batch&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;each&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;&amp;amp;&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
    &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;
  &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;
&lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;

&lt;span class=&quot;k&quot;&gt;class&lt;&#x2F;span&gt; &lt;span class=&quot;nc&quot;&gt;TmpUser&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;&amp;lt;&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;ActiveRecord&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;::&lt;&#x2F;span&gt;&lt;span class=&quot;no&quot;&gt;Base&lt;&#x2F;span&gt;
  &lt;span class=&quot;kp&quot;&gt;include&lt;&#x2F;span&gt; &lt;span class=&quot;no&quot;&gt;TokenAuthenticatable&lt;&#x2F;span&gt;

  &lt;span class=&quot;nb&quot;&gt;self&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;table_name&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;users&#x27;&lt;&#x2F;span&gt;

  &lt;span class=&quot;k&quot;&gt;def&lt;&#x2F;span&gt; &lt;span class=&quot;nf&quot;&gt;reset_authentication_token!&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;write_new_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;:authentication_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;save!&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;validate: &lt;&#x2F;span&gt;&lt;span class=&quot;kp&quot;&gt;false&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
  &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;

  &lt;span class=&quot;k&quot;&gt;def&lt;&#x2F;span&gt; &lt;span class=&quot;nf&quot;&gt;reset_incoming_email_token!&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;write_new_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;:incoming_email_token&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
    &lt;span class=&quot;n&quot;&gt;save!&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;ss&quot;&gt;validate: &lt;&#x2F;span&gt;&lt;span class=&quot;kp&quot;&gt;false&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;)&lt;&#x2F;span&gt;
  &lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;
&lt;span class=&quot;k&quot;&gt;end&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Omnibus users would then run:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo gitlab-rake tokens:reset_all
sudo gitlab-rake tokens:reset_all_email
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Source users would run:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo -u git -H bundle exec rake tokens:reset_all RAILS_ENV=production
sudo -u git -H bundle exec rake tokens:reset_all_email RAILS_ENV=production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The rake file can be deleted after this task finishes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab installation
against this vulnerability using the workaround outlined below until you
have time to upgrade.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;securing-via-patch&quot;&gt;Securing via patch&lt;&#x2F;h3&gt;

&lt;p&gt;To temporarily patch just the critical vulnerability, change to the appropriate
directory and apply the attached diff.&lt;&#x2F;p&gt;

&lt;p&gt;Omnibus:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;$ cd &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;service&#x2F;gitlab-rails&#x2F;
$ git apply &amp;lt;path_to_diff&amp;gt;
$ sudo gitlab-ctl restart unicorn
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Source:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;$ cd &amp;lt;gitlab_installation_dir&#x2F;
$ git apply &amp;lt;path_to_diff&amp;gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Patch:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight diff&quot;&gt;&lt;code&gt;&lt;span class=&quot;gh&quot;&gt;diff --git a&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;issues_controller.rb b&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;issues_controller.rb
index 1151555..857d907 100644
&lt;&#x2F;span&gt;&lt;span class=&quot;gd&quot;&gt;--- a&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;issues_controller.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+++ b&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;issues_controller.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gu&quot;&gt;@@ -129,7 +129,7 @@ class Projects::IssuesController &amp;lt; Projects::ApplicationController
&lt;&#x2F;span&gt;       end

       format.json do
&lt;span class=&quot;gd&quot;&gt;-        render json: @issue.to_json(include: { milestone: {}, assignee: { methods: :avatar_url }, labels: { methods: :text_color } }, methods: [:task_status, :task_status_short])
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+        render json: @issue.to_json(include: { milestone: {}, assignee: { only: [:name, :username], methods: [:avatar_url] }, labels: { methods: :text_color } }, methods: [:task_status, :task_status_short])
&lt;&#x2F;span&gt;       end
     end

&lt;span class=&quot;gh&quot;&gt;diff --git a&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;merge_requests_controller.rb b&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;merge_requests_controller.rb
index 82f9b6e..677a8a1 100644
&lt;&#x2F;span&gt;&lt;span class=&quot;gd&quot;&gt;--- a&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;merge_requests_controller.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+++ b&#x2F;app&#x2F;controllers&#x2F;projects&#x2F;merge_requests_controller.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gu&quot;&gt;@@ -308,7 +308,7 @@ class Projects::MergeRequestsController &amp;lt; Projects::ApplicationController
&lt;&#x2F;span&gt;       end

       format.json do
&lt;span class=&quot;gd&quot;&gt;-        render json: @merge_request.to_json(include: { milestone: {}, assignee: { methods: :avatar_url }, labels: { methods: :text_color } }, methods: [:task_status, :task_status_short])
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+        render json: @merge_request.to_json(include: { milestone: {}, assignee: { only: [:name, :username], methods: [:avatar_url] }, labels: { methods: :text_color } }, methods: [:task_status, :task_status_short])
&lt;&#x2F;span&gt;       end
     end
   rescue ActiveRecord::StaleObjectError
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h3 id=&quot;verifying-the-workaround&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Browse to a project&lt;&#x2F;li&gt;
  &lt;li&gt;Open the project&#x27;s issue tracker&lt;&#x2F;li&gt;
  &lt;li&gt;Create an issue and assign ownership of the issue to another user&lt;&#x2F;li&gt;
  &lt;li&gt;View the returned JSON and verify that no private information such as tokens are included&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;other-fixes-in-8174-8168-and-8158&quot;&gt;Other fixes in 8.17.4, 8.16.8, and 8.15.8&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;ssrf-when-importing-a-project-from-a-repo-by-url&quot;&gt;SSRF when importing a project from a Repo by URL&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab instances that have enabled project imports using &quot;Repo by URL&quot; were
vulnerable to Server-Side Request Forgery attacks. By specifying a project import
URL of &lt;code&gt;localhost&lt;&#x2F;code&gt; an attacker could target services that are bound to the local
interface of the server. These services often do not require authentication.
Depending on the service an attacker might be able craft an attack using the
project import request URL.&lt;&#x2F;p&gt;

&lt;p&gt;This update blocks all import attempts from &lt;code&gt;localhost&lt;&#x2F;code&gt; and all bound server
interfaces other than those assigned as GitLab web or SSH services (Typically
ports 22 and 443). This update also blocks all import attempts from TCP ports
below 1024 with the exception of ports 22, 80 and 443. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;17286&quot;&gt;17286&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;strukt&quot;&gt;Strukt&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;links-in-environments-tab-vulnerable-to-tabnabbing&quot;&gt;Links in Environments tab vulnerable to tabnabbing&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;EdOverflow&quot;&gt;edio&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported that user-configured Environment links include
&lt;code&gt;target=_blank&lt;&#x2F;code&gt; but do not also include &lt;code&gt;rel: noopener noreferrer&lt;&#x2F;code&gt;. Anyone
clicking on these links may therefore be subjected to tabnabbing attacks where
a link back to the requesting page is maintained and can be manipulated by the
target server.&lt;&#x2F;p&gt;

&lt;p&gt;This update also includes patches for several other locations that might be
vulnerable. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;29081&quot;&gt;29081&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;accounts-with-email-set-to-do-not-show-on-profile-have-addresses-exposed-in-public-atom-feed&quot;&gt;Accounts with email set to &quot;Do not show on profile&quot; have addresses exposed in public atom feed&lt;&#x2F;h3&gt;

&lt;p&gt;Several GitLab users reported that even with &quot;Do not show on profile&quot; configured
for their email addresses those addresses were still being leaked in Atom feeds
if they commented on a public project. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;28058&quot;&gt;28058&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;elasticsearch-returns-internal-code-snippets-issues-wiki-pages-and-mrs-on-public-projects-ee-only&quot;&gt;Elasticsearch returns internal code, snippets, issues, wiki pages and MRs on public projects (EE only)&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab-EE Users have reported that when Elasticsearch was enabled for searching GitLab
instances data from internal or private projects may be leaked in searches. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1067&quot;&gt;1067&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;All GitLab-EE instances with Elasticsearch enabled should run a rake task
post-installation to configure privilege levels for Elasticsearch data.&lt;&#x2F;p&gt;

&lt;p&gt;Note: &lt;em&gt;There &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1958&quot;&gt;is a bug&lt;&#x2F;a&gt; in
the rake task deployed with this security release.&lt;&#x2F;em&gt; Users wishing to run this
task should wait for GitLab 9.1 or apply the patch included with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1473&#x2F;diffs&quot;&gt;this merge
request&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Omnibus users:&lt;&#x2F;p&gt;
&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo gitlab-rake gitlab:elastic:add_feature_visibility_levels_to_project
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Source users:&lt;&#x2F;p&gt;
&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo -u git -H bundle exec rake gitlab:elastic:add_feature_visibility_levels_to_project RAILS_ENV=production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations and will not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing March 20, 2017 Critical Security Update</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/17/gitlab-critical-release-preannouncement/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/17/gitlab-critical-release-preannouncement/</id>
<published>2017-03-17T00:00:00+00:00</published>
<updated>2017-03-17T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;On Monday, March 20th, 2017 at 23:59 UTC, we will publish a critical GitLab
security update. More details will be forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;, including
which versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Patch Release: 8.17.3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/10/gitlab-8-dot-17-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/10/gitlab-8-dot-17-dot-3-released/</id>
<published>2017-03-10T00:00:00+00:00</published>
<updated>2017-03-10T00:00:00+00:00</updated>
<author>
<name>Felipe Artur</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.17.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;&quot;&gt;last month&#x27;s 8.17 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the redirect to custom home page URL. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9518&quot;&gt;!9518&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken migration when upgrading straight to 8.17.1. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9613&quot;&gt;!9613&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make projects dropdown only show projects you are a member of. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9614&quot;&gt;!9614&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix creating a file in an empty repository using the API. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9632&quot;&gt;!9632&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t copy tooltip when copying GFM.(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9563&quot;&gt;!9563&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cherry-picking or reverting through an MR.(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9640&quot;&gt;!9640&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is granted by a &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>We are changing the IP of GitLab Pages on GitLab.com</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/06/we-are-changing-the-ip-of-gitlab-pages-on-gitlab-com/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/06/we-are-changing-the-ip-of-gitlab-pages-on-gitlab-com/</id>
<published>2017-03-06T00:00:00+00:00</published>
<updated>2017-03-06T00:00:00+00:00</updated>
<author>
<name>Marcia Ramos</name>
</author>
<content type='html'>&lt;p class=&quot;alert alert-webcast&quot;&gt;&lt;strong&gt;GitLab Pages&#x27; IP&lt;&#x2F;strong&gt; on &lt;strong&gt;GitLab.com&lt;&#x2F;strong&gt; is changing from &lt;code&gt;104.208.235.32&lt;&#x2F;code&gt; to &lt;del&gt;&lt;code&gt;52.167.214.135&lt;&#x2F;code&gt;&lt;&#x2F;del&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Update&lt;&#x2F;strong&gt;: As of August 2018, as a result of the GitLab.com migration to Google Cloud Platform,
the IP address for your Pages &lt;code&gt;A&lt;&#x2F;code&gt; record has changed to &lt;code&gt;35.185.44.232&lt;&#x2F;code&gt;. See our latest &lt;a href=&quot;&#x2F;blog&#x2F;2018&#x2F;08&#x2F;28&#x2F;gitlab-pages-update&#x2F;&quot;&gt;GitLab Pages Update&lt;&#x2F;a&gt; post.&lt;&#x2F;p&gt;

&lt;p&gt;Learn which websites are affected by this change, which settings you&#x27;ll have to update, and how much time you have to do it.&lt;&#x2F;p&gt;



&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;what-is-changing&quot;&gt;What is changing?&lt;&#x2F;h2&gt;

&lt;p&gt;We are changing the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;marketing&#x2F;issues&#x2F;883&quot;&gt;IP address of &lt;strong&gt;GitLab Pages&lt;&#x2F;strong&gt; server on &lt;strong&gt;GitLab.com&lt;&#x2F;strong&gt;&lt;&#x2F;a&gt; to &lt;code&gt;52.167.214.135&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;which-websites-will-be-affected&quot;&gt;Which websites will be affected?&lt;&#x2F;h2&gt;

&lt;p&gt;Only websites hosted with GitLab Pages &lt;strong&gt;on GitLab.com&lt;&#x2F;strong&gt; set up with a &lt;strong&gt;custom root domain&lt;&#x2F;strong&gt;, such as &lt;code&gt;example.com&lt;&#x2F;code&gt;, which has a DNS &lt;code&gt;A&lt;&#x2F;code&gt; record pointing to &lt;code&gt;104.208.235.32&lt;&#x2F;code&gt;, will be affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;which-gitlab-pages-websites-will-not-be-affected&quot;&gt;Which GitLab Pages websites will NOT be affected?&lt;&#x2F;h2&gt;

&lt;p&gt;No other websites hosted with GitLab Pages will be affected, more specifically:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;On-premise GitLab will not be affected.&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab.com websites with default Pages domains (&lt;code&gt;*.gitlab.io&lt;&#x2F;code&gt;) will not be affected.&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab.com websites with custom subdomains, like &lt;code&gt;subdomain.example.com&lt;&#x2F;code&gt;, set up with DNS &lt;code&gt;CNAME&lt;&#x2F;code&gt; records will not be affected.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;what-do-i-have-to-do&quot;&gt;What do I have to do?&lt;&#x2F;h2&gt;

&lt;p&gt;If you have a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;pages&#x2F;custom_domains_ssl_tls_certification&#x2F;index.html#dns-a-record&quot;&gt;DNS &lt;code&gt;A&lt;&#x2F;code&gt; record&lt;&#x2F;a&gt; pointing your domain to &lt;code&gt;104.208.235.32&lt;&#x2F;code&gt;, edit it to point to &lt;code&gt;52.167.214.135&lt;&#x2F;code&gt;. If you cannot edit it, delete it and create a new one.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;when-will-the-old-ip-be-deactivated&quot;&gt;When will the old IP be deactivated?&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;strong&gt;31 March 2017 at 23:59h UTC&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;can-i-change-the-dns-a-record-right-now&quot;&gt;Can I change the DNS &lt;code&gt;A&lt;&#x2F;code&gt; record right now?&lt;&#x2F;h3&gt;

&lt;p&gt;Yes, and we ask you to do so as soon as possible. Currently we have both IPs working but from 1 April 2017 only the new IP address will work.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;what-happens-if-i-dont-do-anything&quot;&gt;What happens if I don&#x27;t do anything?&lt;&#x2F;h3&gt;

&lt;p&gt;If you have a website hosted with GitLab Pages &lt;strong&gt;on GitLab.com&lt;&#x2F;strong&gt; set up with a &lt;strong&gt;custom root domain&lt;&#x2F;strong&gt; and don&#x27;t update your DNS &lt;code&gt;A&lt;&#x2F;code&gt; record by the deadline, your website will be inaccessible from 1 April 2017.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;why-is-this-happening&quot;&gt;Why is this happening?&lt;&#x2F;h2&gt;

&lt;p&gt;Due to recent GitLab.com infrastructure improvements a number of IP addresses, including the one used for GitLab Pages, had to change.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;questions&quot;&gt;Questions?&lt;&#x2F;h2&gt;

&lt;p&gt;Please leave a comment below or in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;marketing&#x2F;issues&#x2F;883&quot;&gt;this issue&lt;&#x2F;a&gt; thread.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;we-are-changing-the-ip-of-gitlab-pages-on-gitlab-com-cover.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.17.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/03/01/gitlab-8-dot-17-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/03/01/gitlab-8-dot-17-dot-2-released/</id>
<published>2017-03-01T00:00:00+00:00</published>
<updated>2017-03-01T00:00:00+00:00</updated>
<author>
<name>DJ Mountney</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.17.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a bug in our previous patch where an invalid asset may
have been cached in the web browser, causing errors in the user interface.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;p&gt;The &lt;code&gt;8.17.1+ce.0&lt;&#x2F;code&gt; and &lt;code&gt;8.17.1+ee.0&lt;&#x2F;code&gt; packages contained an invalid asset, causing
JavaScript errors when the site was accessed. This asset has been corrected in
the &lt;code&gt;8.17.1+ce.2&lt;&#x2F;code&gt; and &lt;code&gt;8.17.1+ee.2&lt;&#x2F;code&gt; packages, but if you installed the previous
packages, you would continue to encounter errors due to outdated assets being
cached by the browser.&lt;&#x2F;p&gt;

&lt;p&gt;This patch includes a fix that will cause users&#x27; browsers to use the new asset
instead of the invalid one. It also includes one additional bug fix for GitLab
CI.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Expire all webpack assets (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9602&quot;&gt;!9602&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix concurrent access on builds&#x2F;register (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9600&quot;&gt;!9600&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations and does not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.17.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/28/gitlab-8-dot-17-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/28/gitlab-8-dot-17-dot-1-released/</id>
<published>2017-02-28T00:00:00+00:00</published>
<updated>2017-02-28T00:00:00+00:00</updated>
<author>
<name>James Lopez</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.17.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;02&#x2F;22&#x2F;gitlab-8-17-released&#x2F;&quot;&gt;recent 8.17
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;re wondering what happened to the packages &lt;code&gt;8.17.1+(ce|ee).0&lt;&#x2F;code&gt; and
&lt;code&gt;8.17.1+(ce|ee).1&lt;&#x2F;code&gt;, good eye! The first version was accidentally packaged with
some Javascript tooling errors that we tried to fix in the &lt;code&gt;.1&lt;&#x2F;code&gt; version but
there was an error tagging the release. The correct packages are &lt;code&gt;8.17.1+ce.2&lt;&#x2F;code&gt;
and &lt;code&gt;8.17.1+ee.2&lt;&#x2F;code&gt; now.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Utilize bundler-ready Vue distribution (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9357&quot;&gt;!9357&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve performance of User Agent Detail (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9129&quot;&gt;!9129&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the commit search UI (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9411&quot;&gt;!9411&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Spam check and reCAPTCHA improvements (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9248&quot;&gt;!9248&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue where files on a fork could not be edited (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9349&quot;&gt;!9349&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Create compare object with default branch when target branch is missing (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9263&quot;&gt;!9263&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Chat slash commands show labels correctly (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9408&quot;&gt;!9408&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added tooltip to add issues button on issue boards (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9142&quot;&gt;!9142&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Upgrade GitLab Pages to v0.3.2 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9474&quot;&gt;!9474&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable unused tags count cache for Projects, Builds and Runners (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9467&quot;&gt;!9467&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix MR changes tab size count (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9091&quot;&gt;!9091&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow searching issues for strings containing colons (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9400&quot;&gt;!9400&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Query performance regression fix affecting &quot;Dashboard::ProjectsController#index.atom&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9526&quot;&gt;!9526&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Replace setInterval with setTimeout to prevent highly frequent requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9271&quot;&gt;!9271&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable invalid service templates (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8850&quot;&gt;!8850&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Squash default (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1272&quot;&gt;!1272&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Don&#x27;t try to update a project&#x27;s external service caches on a secondary Geo node (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1273&quot;&gt;!1273&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Chat slash commands show labels correctly (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1280&quot;&gt;!1280&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix admin email notification recipient group select list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1277&quot;&gt;!1277&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; remove Turbolinks from lockfile.js, do page refresh instead (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1299&quot;&gt;!1299&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add repository storage field back to projects API (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1300&quot;&gt;!1300&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Improve error messages when squashing fails (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1318&quot;&gt;!1318&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Re-compile merge request Vue app after jQuery ajax (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1264&quot;&gt;!1264&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a migration that adds an index concurrently and should
not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.7 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/27/gitlab-8-dot-16-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/27/gitlab-8-dot-16-dot-7-released/</id>
<published>2017-02-27T00:00:00+00:00</published>
<updated>2017-02-27T00:00:00+00:00</updated>
<author>
<name>James Lopez</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.16.7 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;last month&#x27;s 8.16
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix hash of ruby in update documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8735&quot;&gt;!8735&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix MR changes tab size count when there are over 100 files in the diff. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9091&quot;&gt;!9091&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Read true-up info from license and validate it. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1206&quot;&gt;!1206&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed merge request state not updating when approvals feature is active. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1264&quot;&gt;!1264&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations and does not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.17 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/22/gitlab-8-17-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/22/gitlab-8-17-released/</id>
<published>2017-02-22T00:00:00+00:00</published>
<updated>2017-02-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;For many years, content management systems (CMS) have been used
to manage simple websites. The advent of static sites allows organizations to
no longer worry about having to secure, update and maintain an underlying CMS.
Static websites are fast, yet powerful and
&lt;a href=&quot;https:&#x2F;&#x2F;www.smashingmagazine.com&#x2F;2015&#x2F;11&#x2F;modern-static-website-generators-next-big-thing&#x2F;&quot;&gt;seen as the next big thing in publishing to internet&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 8.17 allows anyone to easily create and collaborate on a static website
through &lt;a href=&quot;https:&#x2F;&#x2F;pages.gitlab.io&#x2F;&quot;&gt;GitLab Pages&lt;&#x2F;a&gt;, now available in GitLab Community Edition.&lt;&#x2F;p&gt;



&lt;hr &#x2F;&gt;

&lt;p&gt;In addition to Pages moving to CE, we&#x27;ve made improvements to Issue
Boards, added an audit user role, added the ability to squash commits on merge
and much more!&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s &lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt; is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Sanson&quot;&gt;Horacio Sanson&lt;&#x2F;a&gt;.
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;Last release&lt;&#x2F;a&gt;,
Horacio added PlantUML support for Asciidoc; this release,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8588&quot;&gt;he added it&lt;&#x2F;a&gt; for
Markdown, too!
Thanks Horacio!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-pages-in-community-edition&quot;&gt;GitLab Pages in Community Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Hardcoded static websites take a long time to set up and maintain for everyone
but the invested web developer. Static Site Generators are the best solution to
&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;06&#x2F;03&#x2F;ssg-overview-gitlab-pages-part-1-dynamic-x-static&#x2F;&quot;&gt;this problem&lt;&#x2F;a&gt;. &lt;a href=&quot;https:&#x2F;&#x2F;pages.gitlab.io&#x2F;&quot;&gt;GitLab Pages&lt;&#x2F;a&gt; allows you to
&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;04&#x2F;07&#x2F;gitlab-pages-setup&#x2F;&quot;&gt;host static websites&lt;&#x2F;a&gt; straight from GitLab, with
&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;06&#x2F;17&#x2F;ssg-overview-gitlab-pages-part-3-examples-ci&#x2F;&quot;&gt;any Static Site Generator&lt;&#x2F;a&gt;. Previously this functionality was only
available on GitLab.com and GitLab Enterprise Edition. After receiving
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;14605&quot;&gt;over 100 votes&lt;&#x2F;a&gt;
we decided to move GitLab Pages to GitLab Community Edition.&lt;&#x2F;p&gt;

&lt;p&gt;Static websites are much faster than their dynamic counterparts (CMS), this
makes them great for high volume public marketing and documentation sites or
even as a way to easily visualize data from your continuous integration suite.&lt;&#x2F;p&gt;

&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;pages&#x2F;&quot;&gt;GitLab Pages documentation&lt;&#x2F;a&gt; covers everything from getting
started with different Static Site Generators to advanced CI and SSL
configurations. To learn how to set up GitLab Pages to your own GitLab instance,
read through the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;pages&#x2F;&quot;&gt;admin documentation&lt;&#x2F;a&gt; or watch the &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;dD8c7WNcc6s&quot;&gt;video tutorial&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;easily-search-and-add-issues-to-issue-boards&quot;&gt;Easily Search and Add Issues to Issue Boards&lt;&#x2F;h2&gt;

&lt;p&gt;Prior to 8.17, the Backlog list in the &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;issueboard&#x2F;&quot;&gt;Issue Board&lt;&#x2F;a&gt; contained issues
that you had not yet added to your workflow (the &quot;main&quot; area of the board).
Finding issues to add was somewhat difficult given that small area, and you
could only add them one by one. Most of the time, you didn&#x27;t even need to see
the Backlog list at all, and it was just hanging around taking up valuable
screen real estate.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;board_modal.png&quot; alt=&quot;Add issues modal in board in GitLab 8.17&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With 8.17, you now add issues through a dedicated modal window.
Click the &lt;code&gt;Add issues&lt;&#x2F;code&gt; button at the top-right, and you get an expansive modal
to search and filter for issues you care about.
Select one or many issues, and even choose the list where you want to put them
in before adding them to the board, saving just a few more clicks and drags.
To remove an issue from your board, select it to bring up the sidebar, and hit
&lt;code&gt;Remove from board&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Take a look at the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issue_board.html&quot;&gt;Issue Board documentation&lt;&#x2F;a&gt; to learn more.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;board_remove.png&quot; alt=&quot;Remove issue from board in GitLab 8.17&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;squash-and-merge-ee&quot;&gt;Squash and Merge (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;To improve code collaboration, we suggest teams share their merge requests as
soon as possible in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;drafts.html&quot;&gt;WIP form&lt;&#x2F;a&gt;.
This naturally results in many commits as the merge request evolves.
With 8.17, you can now squash your commits together into a single commit, as
part of merging, giving you a much cleaner Git history.
Simply select the option in the merge request itself.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;squash_and_merge.html&quot;&gt;See our documentation to learn more about squash and merge.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;squash_edit_form.png&quot; alt=&quot;Squash and merge in GitLab 8.17&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;copy-and-paste-gitlab-markdown&quot;&gt;Copy and Paste GitLab Markdown&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;markdown.html#gitlab-flavored-markdown-gfm&quot;&gt;GitLab Flavored Markdown (GFM)&lt;&#x2F;a&gt; is a powerful system, but
transcribing formatted text to it may be a little bit difficult for newcomers to
Markdown. You may find yourself going to the edit mode of an issue description
or comment to just copy the plaintext GFM, paste it in another GitLab textarea,
make some changes, before submitting it.&lt;&#x2F;p&gt;

&lt;p&gt;With 8.17, you can simply copy any issue &#x2F; merge request description &#x2F; comment
(i.e. GFM textarea) in regular view mode, and paste it in another GFM textarea.
All the formatting is carried over automatically. This even includes links and
images. Pro tip: Now you can quickly learn from GFM experts by copying their
issues and merge requests.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;gitlab_markdown_copy_paste.gif&quot; alt=&quot;Copy and paste GitLab markdown in GitLab 8.17&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;link-from-merge-request-interface-to-environment&quot;&gt;Link from Merge Request interface to Environment&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Review Apps are great for previewing changes in a merge request by providing a link to a temporary environment running the changes. But when a change is buried in your application&#x27;s interface, you still have to navigate to a specific place to see an actual change.&lt;&#x2F;p&gt;

&lt;p&gt;With the new ability to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;environments&#x2F;index.html#go-directly-from-source-files-to-public-pages-on-the-environment&quot;&gt;deep link files in a merge request to live previews of those files&lt;&#x2F;a&gt;,
you can now jump directly to the URL that shows off the changes in a given file.&lt;&#x2F;p&gt;

&lt;p&gt;Using the new &lt;code&gt;.gitlab&#x2F;route-map.yml&lt;&#x2F;code&gt; file, you can map routes to their
respective URLs to allow for easy preview of specific changes. This is more
difficult for dynamic apps built with frameworks like Rails or Django, but for
static sites this is perfect.&lt;&#x2F;p&gt;

&lt;p&gt;For example, this is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;www-gitlab-com&#x2F;blob&#x2F;master&#x2F;.gitlab&#x2F;route-map.yml&quot;&gt;the current &lt;code&gt;route-map.yml&lt;&#x2F;code&gt; for about.gitlab.com&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight yaml&quot;&gt;&lt;code&gt;&lt;span class=&quot;c1&quot;&gt;# Team data&lt;&#x2F;span&gt;
&lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;na&quot;&gt;source&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;data&#x2F;team.yml&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# data&#x2F;team.yml&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;public&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;team&#x2F;&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# team&#x2F;&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# Blogposts&lt;&#x2F;span&gt;
&lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;na&quot;&gt;source&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;&#x2F;source\&#x2F;posts\&#x2F;([0-9]{4})-([0-9]{2})-([0-9]{2})-(.+?)\..*&#x2F;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# source&#x2F;posts&#x2F;2017-01-30-around-the-world-in-6-releases.html.md.erb&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;public&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;\1&#x2F;\2&#x2F;\3&#x2F;\4&#x2F;&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# 2017&#x2F;01&#x2F;30&#x2F;around-the-world-in-6-releases&#x2F;&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# HTML files&lt;&#x2F;span&gt;
&lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;na&quot;&gt;source&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;&#x2F;source\&#x2F;(.+?\.html).*&#x2F;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# source&#x2F;index.html.haml&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;public&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;\1&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# index.html&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# Generators&lt;&#x2F;span&gt;
&lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;na&quot;&gt;source&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;&#x2F;source\&#x2F;(.*)\&#x2F;template\..*&#x2F;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# source&#x2F;direction&#x2F;template.html.md.erb&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;public&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;\1&#x2F;&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# direction&#x2F;&lt;&#x2F;span&gt;
&lt;span class=&quot;c1&quot;&gt;# Other files&lt;&#x2F;span&gt;
&lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;na&quot;&gt;source&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;&#x2F;source\&#x2F;(.*)&#x2F;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# source&#x2F;images&#x2F;blogimages&#x2F;around-the-world-in-6-releases-cover.png&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;public&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;\1&#x27;&lt;&#x2F;span&gt; &lt;span class=&quot;c1&quot;&gt;# images&#x2F;blogimages&#x2F;around-the-world-in-6-releases-cover.png&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;gitlab_environment_link.png&quot; alt=&quot;Go directly from source files to public pages on the environment&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;streamlining-project-settings-and-navigation&quot;&gt;Streamlining Project Settings and Navigation&lt;&#x2F;h2&gt;

&lt;p&gt;We are continuing to streamline project settings and navigation, which we first
started in &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;8.16&lt;&#x2F;a&gt;. We&#x27;ve combined the existing &lt;code&gt;Runners&lt;&#x2F;code&gt;, &lt;code&gt;Variables&lt;&#x2F;code&gt;,
&lt;code&gt;Triggers&lt;&#x2F;code&gt;, and &lt;code&gt;CI&#x2F;CD Pipelines&lt;&#x2F;code&gt; menu items into one item simply called
&lt;code&gt;CI&#x2F;CD Pipelines&lt;&#x2F;code&gt;. Navigating to &lt;code&gt;CI&#x2F;CD Pipelines&lt;&#x2F;code&gt; will show you one page with
all the settings that were previously spread across the 4 original pages.&lt;&#x2F;p&gt;

&lt;p&gt;As we work on merging settings together, we are also working to improve the UX of these pages in order to make it easier to navigate. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;28451&quot;&gt;Contribute to the issue&lt;&#x2F;a&gt; and watch for updates in the upcoming releases!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;settings_new.png&quot; alt=&quot;Improved settings navigation in GitLab 8.17&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;additional-pipeline-details-included-in-merge-request-workflow&quot;&gt;Additional Pipeline Details Included in Merge Request Workflow&lt;&#x2F;h2&gt;

&lt;p&gt;We have made improvements to the look and feel of the Merge Request workflow,
as well as included additional details on the CI&#x2F;CD Pipeline status. You are
now able to easily review the progress of the entire Pipeline, and take action directly from the Merge Request summary. For example you could review a pipeline that needs attention, navigate to a failed job, and trigger a quick retry or manual action.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;merge_request_minigraph.png&quot; alt=&quot;Merge Request Pipeline Minigraph&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redesigned-slack-and-mattermost-issue-messages&quot;&gt;Redesigned Slack and Mattermost Issue Messages&lt;&#x2F;h2&gt;

&lt;p&gt;The ChatOps message replies for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;slack_slash_commands.html&quot;&gt;Slack&lt;&#x2F;a&gt; and
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;mattermost_slash_commands.html&quot;&gt;Mattermost&lt;&#x2F;a&gt; have been improved. GitLab&#x27;s replies will now
include additional details like assignee, current status, and more; all presented
in a cleaner interface. Searching GitLab or creating a new issue all within the
context of the channel you are working in has never been easier or prettier!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_17&#x2F;slack_issue_show.png&quot; alt=&quot;Slack Issue Show&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improving-terminology-within-cicd&quot;&gt;Improving Terminology within CI&#x2F;CD&lt;&#x2F;h2&gt;

&lt;p&gt;We have clarified the terminology used to discuss parts of &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;&quot;&gt;CI&#x2F;CD&lt;&#x2F;a&gt;,
replacing the usage of &lt;code&gt;Build&lt;&#x2F;code&gt;. In 8.17, &lt;code&gt;Pipeline&lt;&#x2F;code&gt; will be used when referring
to the entire pipeline, and &lt;code&gt;Job&lt;&#x2F;code&gt; will be used for a specific action.&lt;&#x2F;p&gt;

&lt;p&gt;With the upcoming 9.0 release API v4 will utilize the new naming convention, with v3 remaining unchanged.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;monitoring-gitlab-with-prometheus&quot;&gt;Monitoring GitLab with Prometheus&lt;&#x2F;h2&gt;

&lt;p&gt;With 8.17 we are continuing to build upon our Prometheus integration initially
&lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;released in 8.16&lt;&#x2F;a&gt;. Three new exporters have been added to the
Omnibus package providing insight into Redis, Postgres, and GitLab service
metrics. Administrators will now be able to track the status of Sidekiq jobs, Redis, and important database metrics. It is now easier than ever to
ensure GitLab is feeling good and snappy!&lt;&#x2F;p&gt;

&lt;p&gt;Prometheus and its exporters &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;monitoring&#x2F;prometheus&#x2F;index.html&quot;&gt;can be enabled&lt;&#x2F;a&gt; by editing &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt;,
and will be enabled by default in 9.0.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-v4-beta&quot;&gt;API v4 Beta&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab has a powerful API that allows you to do almost everything that you&#x27;d
otherwise do through the interface. For the last several years, our API has been
version 3 (v3). To be able to make changes to our existing API endpoints, while
maintaining support for your integrations, we&#x27;re rolling out a new API version
next month (March 22nd, GitLab 9.0).&lt;&#x2F;p&gt;

&lt;p&gt;With this release, we&#x27;re giving you access to the Beta of API v4. This will
allow you to upgrade your integrations so that they&#x27;ll continue working
after we deprecate API v3. We&#x27;ll continue working on API v4 and will introduce
other changes with GitLab 9.0, such as:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Present related resource URI&#x27;s within each API response (facilitating API
navigation)&lt;&#x2F;li&gt;
  &lt;li&gt;Enable pagination for all endpoints&lt;&#x2F;li&gt;
  &lt;li&gt;Allow queries on issues and merge requests endpoints with IIDs (same as web
version URL ids)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Keep track on &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;v3_to_v4.html&quot;&gt;CE&lt;&#x2F;a&gt; and
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;v3_to_v4.html&quot;&gt;EE&lt;&#x2F;a&gt; v4 API changes docs for
further information.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;api-v3-deprecation&quot;&gt;API v3 Deprecation&lt;&#x2F;h3&gt;

&lt;p&gt;API v3 will be deprecated with GitLab 9.0. That means API v3 will only receive
bug and security fixes from that version on, but no further updates and will
not support new features.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend that you update your integrations with GitLab&#x27;s API to v4.&lt;&#x2F;p&gt;

&lt;p&gt;We plan to remove API v3 from GitLab in a future release, but not
before GitLab 9.3. For detailed information on the deprecation and removal of
API v3 &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;20070&quot;&gt;see our issue on GitLab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;audit-users-ee-only&quot;&gt;Audit Users (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;Many large or regulated organizations require oversight across the entire
development environment. GitLab Enterprise Edition now features a great new
capability to assign an &lt;code&gt;Audit&lt;&#x2F;code&gt; role to a user. This role allows the user
read-only access to all projects, groups, users and other resources.&lt;&#x2F;p&gt;

&lt;p&gt;Unlike the &lt;code&gt;Administrator&lt;&#x2F;code&gt; role, Audit users don&#x27;t have the ability to modify
projects settings or access the Admin Area, making it the perfect solution to
provide powerful, read-only access across the entire GitLab instance.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;auditor_users.html&quot;&gt;Find out more&lt;&#x2F;a&gt; about how this role works and the capabilities it
allows.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;configurable-mirror-synchronization-time-ee-only&quot;&gt;Configurable Mirror Synchronization Time (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;repository_mirroring.html&quot;&gt;Repository mirroring&lt;&#x2F;a&gt; is a great feature in GitLab Enterprise Edition that
allows you to synchronize remote repositories with your repository on GitLab.
Previously, synchronization happened every hour; you can now &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;repository_mirroring.html#pulling-from-a-remote-repository&quot;&gt;adjust this&lt;&#x2F;a&gt;
for more fine-grained synchronization windows.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;amazing-community-contributions&quot;&gt;Amazing community contributions&lt;&#x2F;h2&gt;

&lt;p&gt;For 8.17, we merged 62 merge requests from the community, including new
features, bug fixes, and backstage improvements!&lt;&#x2F;p&gt;

&lt;p&gt;The most noticeable contributed changes are as follows:&lt;&#x2F;p&gt;

&lt;h3 id=&quot;new-features--improvements&quot;&gt;New features &amp;amp; improvements&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Create a TODO for user who set auto-merge when a build fails or merge conflict occurs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8056&quot;&gt;!8056&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add a &lt;code&gt;&#x2F;target_branch&lt;&#x2F;code&gt; slash command functionality for merge requests. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7216&quot;&gt;!7216&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Allow to search within project by commit hash. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8028&quot;&gt;!8028&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add PlantUML support for Markdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8588&quot;&gt;!8588&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Allow to promote project labels to group labels. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7242&quot;&gt;!7242&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add sorting pipeline for a commit. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8319&quot;&gt;!8319&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add the ability to define a coverage regex in the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7447&quot;&gt;!7447&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add system hook for when a project is updated (other than rename&#x2F;transfer). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5711&quot;&gt;!5711&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Display project ID in project settings. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8572&quot;&gt;!8572&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Mark merge request as WIP when pushing WIP commits. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8124&quot;&gt;!8124&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add hover style to copy icon on commit page header. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8619&quot;&gt;!8619&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Support unauthenticated LFS object downloads for public projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8824&quot;&gt;!8824&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Force new password after password reset via API. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8933&quot;&gt;!8933&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;bugfixes&quot;&gt;Bugfixes&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Remove flash warning from login page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8864&quot;&gt;!8864&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix tab index order on branch commits list page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8489&quot;&gt;!8489&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix &lt;code&gt;Sort by Recent Sign-in&lt;&#x2F;code&gt; in Admin Area. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8637&quot;&gt;!8637&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix notifications when set at group level. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6813&quot;&gt;!6813&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix broken anchor links when special characters are used. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8961&quot;&gt;!8961&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix incorrect Sidekiq concurrency count in admin background page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9359&quot;&gt;!9359&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix disable storing of sensitive information when importing a new repo. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8885&quot;&gt;!8885&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-runner&quot;&gt;GitLab Runner&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.11 today. Most interesting changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Add &lt;code&gt;post_build_script&lt;&#x2F;code&gt; to call scripts after user-defined build scripts &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;460&quot;&gt;!460&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add the runner name to the first line of log output, after the version &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;473&quot;&gt;!473&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add timezone support for OffPeak intervals &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;479&quot;&gt;!479&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add ubuntu&#x2F;yakkety to packages generation list &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;458&quot;&gt;!458&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Update targets on packages generation list (for Linux Mint, Ubuntu and Fedora) &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;485&quot;&gt;!485&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Reduce size of &lt;code&gt;gitlab-runner-helper&lt;&#x2F;code&gt; images &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;456&quot;&gt;!456&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Rename &lt;code&gt;Build (succeeded|failed)&lt;&#x2F;code&gt; to &lt;code&gt;Job (succeeded|failed)&lt;&#x2F;code&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;459&quot;&gt;!459&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Set &lt;code&gt;GIT_SUBMODULE_STRATEGY=SubmoduleNone&lt;&#x2F;code&gt; when &lt;code&gt;GIT_STRATEGY=GitNone&lt;&#x2F;code&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;480&quot;&gt;!480&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix crash on machine creation &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;461&quot;&gt;!461&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix race in &lt;code&gt;helpers&#x2F;prometheus&#x2F;log_hook.go: Fire()&lt;&#x2F;code&gt; method &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;463&quot;&gt;!463&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix missing &lt;code&gt;VERSION&lt;&#x2F;code&gt; on Mac build &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;465&quot;&gt;!465&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;To see the full list of all changes please read &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;v1.11.0&#x2F;CHANGELOG.md&quot;&gt;the Runner&#x27;s CHANGELOG file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;additional-changes&quot;&gt;Additional Changes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Added &lt;code&gt;repository_storage&lt;&#x2F;code&gt; and &lt;code&gt;approvals_before_merge&lt;&#x2F;code&gt; fields to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;projects.html&quot;&gt;API v3 Projects&lt;&#x2F;a&gt; (EE only).&lt;&#x2F;li&gt;
  &lt;li&gt;Moved the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;license.html&quot;&gt;License Breakdown&lt;&#x2F;a&gt; to the Admin Overview page (EE only).&lt;&#x2F;li&gt;
  &lt;li&gt;Email confirmation link will no longer automatically log you into your GitLab instance. This was changed due to security concerns, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7472&quot;&gt;gitlab-org&#x2F;gitlab-ce!7472&lt;&#x2F;a&gt; for details.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab-package-changes&quot;&gt;Omnibus GitLab package changes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;postgresql-version-upgrade&quot;&gt;PostgreSQL version upgrade&lt;&#x2F;h3&gt;

&lt;p&gt;As mentioned &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;#postgresql-version-upgrade&quot;&gt;in the 8.15 release post&lt;&#x2F;a&gt;,
omnibus-gitlab packages are equipped with &lt;code&gt;gitlab-ctl pg-upgrade&lt;&#x2F;code&gt; tool.
This tool will upgrade the bundled PostgreSQL database version.&lt;&#x2F;p&gt;

&lt;p&gt;Please plan the upgrade ahead of GitLab 9.0 release (scheduled for Mar. 22, 2017).&lt;&#x2F;p&gt;

&lt;p&gt;The omnibus-gitlab packages for GitLab 9.0 will attempt to automatically upgrade
your database. Additionally, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1916&quot;&gt;default version of PostgreSQL&lt;&#x2F;a&gt;
will change for GitLab 9.0.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;database.html#upgrade-packaged-postgresql-server&quot;&gt;Read more about database upgrade in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Ran into issues? Create an issue at the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&quot;&gt;omnibus-gitlab issue tracker&lt;&#x2F;a&gt;,
and reference it in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1783&quot;&gt;upgrade problems meta issue.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;deprecations&quot;&gt;Deprecations&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;git-annex-support&quot;&gt;Git-Annex Support&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;re &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1648&quot;&gt;deprecating&lt;&#x2F;a&gt; support
for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;git_annex.html&quot;&gt;Git-Annex&lt;&#x2F;a&gt; available in
GitLab Enterprise Edition, and it will be completely removed in the upcoming
release, GitLab 9.0 (2017&#x2F;03&#x2F;22).&lt;&#x2F;p&gt;

&lt;p&gt;Read through the
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;git&#x2F;lfs&#x2F;migrate_from_git_annex_to_git_lfs.html&quot;&gt;Git-Annex to Git-LFS migration guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;raspbian-wheezy-package&quot;&gt;Raspbian Wheezy package&lt;&#x2F;h3&gt;

&lt;p&gt;8.17 will be &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1947&quot;&gt;the last release&lt;&#x2F;a&gt;
with support for Raspbian Wheezy Raspberry Pi2 packages. GitLab 9.0 will continue
to be available on Raspbian Jessie.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;change-in-package-repository-distribution-for-raspberry-pi&quot;&gt;Change in package repository distribution for Raspberry PI&lt;&#x2F;h3&gt;

&lt;p&gt;Due to a migration to new build infrastructure, several months ago Raspberry PI
packages &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1303&quot;&gt;started being released&lt;&#x2F;a&gt;
under &lt;code&gt;debian&lt;&#x2F;code&gt; distribution of &lt;a href=&quot;https:&#x2F;&#x2F;packages.gitlab.com&#x2F;gitlab&#x2F;raspberry-pi2&#x2F;&quot;&gt;raspberry pi2 repository&lt;&#x2F;a&gt;.
This was not the original intention and in the following months users needed to do
a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1303#note_21058665&quot;&gt;manual change in their package repository sources&lt;&#x2F;a&gt;
to fetch the latest package.
With 9.0 we will deprecate the &lt;code&gt;debian&lt;&#x2F;code&gt; distribution and move back to &lt;code&gt;raspbian&lt;&#x2F;code&gt; which was the previous default.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;standalone-gitlab-ci-configuration&quot;&gt;Standalone GitLab CI configuration&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CI standalone was merged into GitLab application with version 8.0. We
shipped configuration that helped users migrate their infrastructure to the new situation.
With GitLab 9.0 omnibus-gitlab package, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;792&quot;&gt;we are removing&lt;&#x2F;a&gt; all
support for standalone GitLab CI. If you still make use of configuration such as
&lt;code&gt;ci_external_url&lt;&#x2F;code&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;index.html&quot;&gt;redirecting traffic to the old address&lt;&#x2F;a&gt;,
please update your configuration in time.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release does not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Some of the migrations could take some time and on larger instances, it may be
advisable to take approximately 15 minutes downtime to ease the load of the
database.&lt;&#x2F;p&gt;

&lt;p&gt;The slow migrations add columns with default values to &lt;code&gt;users&lt;&#x2F;code&gt; and &lt;code&gt;projects&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;By default, GitLab will stop, run migrations and start again. See the note
below on changing this behavior.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upcoming-changes-to-defaults-in-gitlab-ciyml&quot;&gt;Upcoming changes to defaults in &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;&lt;&#x2F;h3&gt;

&lt;p&gt;As part of our 9.0 release, we will be changing the default behavior of two
flags in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;&quot;&gt;&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; to provide an improved standard experience.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#cachekey&quot;&gt;&lt;code&gt;cache:key&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; directive will default to a constant string. This
means that the cache will now be shared across branches and stages, reducing
build time making more efficient use of Runners. Note a cache is never shared
across projects.&lt;&#x2F;li&gt;
  &lt;li&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#artifacts-expire_in&quot;&gt;&lt;code&gt;artifacts:expire_in&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; default will be able to be
controlled by the GitLab administrator. Previously unless a specific duration
was set, artifacts would never expire. By enabling control over the default
value, administrators can more easily manage artifacts that do not need to be
stored indefinitely. Developers should set this value to their desired
duration if an artifact should persist for a specific time.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult
the upgrade barometers of any intermediate versions you are skipping. If you are
upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have
to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;New configuration options got introduced in the omnibus-gitlab packages. To
check what changed when compared to your &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; configuration
file, run &lt;code&gt;sudo gitlab-ctl diff-config&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p class=&quot;note&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;unsplash.com&#x2F;?photo=5KvPQc1Uklk&quot;&gt;Cover image&lt;&#x2F;a&gt; by &lt;a href=&quot;https:&#x2F;&#x2F;unsplash.com&#x2F;@provenwong&quot;&gt;Ryan Wong&lt;&#x2F;a&gt;, licensed under &lt;a href=&quot;https:&#x2F;&#x2F;unsplash.com&#x2F;license&quot;&gt;CC0 1.0&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;unsplash&#x2F;fireworks.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/17/gitlab-8-dot-16-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/17/gitlab-8-dot-16-dot-6-released/</id>
<published>2017-02-17T00:00:00+00:00</published>
<updated>2017-02-17T00:00:00+00:00</updated>
<author>
<name>DJ Mountney</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.16.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;recent 8.16
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; API: Fix file downloading. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8953&quot;&gt;!8953&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Reduce hits to LDAP on Git HTTP auth by reordering auth mechanisms. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8752&quot;&gt;!8752&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix filtered search user autocomplete for gitlab instances that are hosted on a subdirectory. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8891&quot;&gt;!8891&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix wrong call to ProjectCacheWorker.perform. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8910&quot;&gt;!8910&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove unnecessary queries for .atom and .json in Dashboard::ProjectsController#index. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8956&quot;&gt;!8956&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken anchor links when special characters are used. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8961&quot;&gt;!8961&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not display deploy keys in user&#x27;s own ssh keys list. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9024&quot;&gt;!9024&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show merge errors in merge request widget. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9229&quot;&gt;!9229&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t delete assigned MRs&#x2F;issues when user is deleted. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8634&quot;&gt;!8634&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Refresh authorizations when transferring projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9029&quot;&gt;!9029&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t use backup Active Record connections for Sidekiq. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;9001&quot;&gt;!9001&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Check public snippets for spam. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8911&quot;&gt;!8911&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Read true-up info from license and validate it. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1159&quot;&gt;!1159&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: send the new event type with the backfill function. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1157&quot;&gt;!1157&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Move RepositoryUpdateRemoteMirrorWorker jobs to project_mirror Sidekiq queue. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1234&quot;&gt;!1234&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed merge request environment link not displaying. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1154&quot;&gt;!1154&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Reduce queries needed to check if node is a primary or secondary Geo node. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1178&quot;&gt;!1178&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Make sure ssh_keygen creates the directory first (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1249&quot;&gt;!1249&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a migration that adds an index concurrently and should
not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.15.7 and 8.14.10 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/16/gitlab-8-dot-15-dot-7-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/16/gitlab-8-dot-15-dot-7-security-release/</id>
<published>2017-02-16T00:00:00+00:00</published>
<updated>2017-02-16T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.15.7 and 8.14.10 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix for Omnibus GitLab installations
with Mattermost. We recommend that all GitLab installations running Omnibus
versions 8.15 or 8.14 with Mattermost enabled be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;This release does not affect GitLab versions 8.16.0 and above.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;mattermost-security-update&quot;&gt;Mattermost Security Update&lt;&#x2F;h2&gt;
&lt;p&gt;Mattermost has not yet released full details, however a high severity security
release was published and Mattermost has advised all users to upgrade immediately.
A patch for Mattermost 3.6, shipped with Omnibus versions of GitLab 8.16, was
released with GitLab 8.16.5 on February 14, 2017. A matching patch for Mattermost
3.5, shipped with GitLab Omnibus versions 8.15 and 8.14, has now been made available.
See the Mattermost &lt;a href=&quot;https:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html?highlight=changelog#notes-on-patch-release&quot;&gt;release notes&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CE+EE Omnibus w&#x2F;Mattermost 8.14.0 - 8.14.9, 8.15.0 - 8.15.6&lt;&#x2F;p&gt;

&lt;p&gt;We recommend that all installations listed above with Mattermost enabled be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab users who do not have Mattermost enabled are not affected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no new migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.5, 8.15.6, and 8.14.9 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/15/gitlab-8-dot-16-dot-5-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/15/gitlab-8-dot-16-dot-5-security-release/</id>
<published>2017-02-15T00:00:00+00:00</published>
<updated>2017-02-15T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.16.5, 8.15.6, and 8.14.9 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including three fixes for
persistent cross-site scripting (XSS) vulnerabilities, an upgrade to Mattermost,
and a fix for project imports causing labels and comments to appear on the wrong
project. We recommend that all GitLab installations be upgraded to one of these
versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;persistent-xss-vulnerability-in-asciidoc-support&quot;&gt;Persistent XSS vulnerability in AsciiDoc support&lt;&#x2F;h2&gt;

&lt;p&gt;A customer security audit discovered an XSS vulnerability in project README
files using the AsciiDoc format. The Ruby gem that converts AsciiDoc to HTML did
not properly filter dangerous code and was therefore vulnerable to persistent
script injection. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;27024&quot;&gt;#27024&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-vulnerability-in-rubydoc-restructuredtext-and-textile-support&quot;&gt;Persistent XSS vulnerability in RubyDoc, reStructuredText, and Textile support&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;SecurityYasin&quot;&gt;Yasin Soliman&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported XSS vulnerabilities in project README
files using the RubyDoc, reStructuredText, and Textile formats. GitLab code that
converts these formats to HTML did not properly filter dangerous code and was
therefore vulnerable to persistent script injection. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;27153&quot;&gt;#27153&lt;&#x2F;a&gt; for more
details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-vulnerability-in-svg-support&quot;&gt;Persistent XSS vulnerability in SVG support&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;nettar&quot;&gt;NETTAR Adel&lt;&#x2F;a&gt; reported via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; an XSS vulnerability in GitLab&#x27;s SVG support.
SVG files that were displayed inline in user comments were properly filtered for
dangerous code, however direct links to these files were not being filtered and
were therefore vulnerable to persistent script injection should a user click on
a direct link to the SVG file. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;27471&quot;&gt;#27471&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-security-update&quot;&gt;Mattermost security update&lt;&#x2F;h2&gt;

&lt;p&gt;Mattermost has not yet released full details, however a high severity security
release (3.6.2) was recently published and Mattermost has advised all users to
upgrade immediately. See their &lt;a href=&quot;https:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html?highlight=changelog#notes-on-patch-release&quot;&gt;release notes&lt;&#x2F;a&gt; for more.&lt;&#x2F;p&gt;

&lt;p&gt;Note: GitLab 8.15 and 8.14 Omnibus packages include Mattermost 3.5.x, while 8.16
includes Mattermost 3.6.x. Mattermost normally only provides security updates to
the most recent version (3.6.x). At GitLab&#x27;s request Mattermost is releasing a
backport to version 3.5, however it is not yet available at the time of this release.&lt;&#x2F;p&gt;

&lt;p&gt;When Mattermost releases version 3.5.2 including this most recent security fix
GitLab will provide updated Omnibus packages for GitLab versions 8.15 and 8.14.
In the meantime it is recommended that any GitLab 8.15 or earlier Omnibus users
with Mattermost enabled either upgrade to GitLab 8.16.5, disable Mattermost, or
migrate to a non-Omnibus Mattermost version 3.6.2.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-importer-assigning-labels-and-comments-to-the-wrong-project&quot;&gt;GitHub importer assigning labels and comments to the wrong project&lt;&#x2F;h2&gt;

&lt;p&gt;A bug in the GitHub importer would cause labels and comments on imported GitHub
repositories to sometimes be assigned to the wrong GitLab project. A race
condition existed in the comment and label assignment functions so that if a new
issue or merge request was created with the same internal ID (&lt;code&gt;iid&lt;&#x2F;code&gt;) on any
project between the time that an importer created an issue or merge request and
the time the labels and comments were assigned, the labels or comments would be
assigned to the wrong project. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;27659&quot;&gt;#27659&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Cross-site scripting: 7.12.0 through 8.16.4&lt;&#x2F;li&gt;
  &lt;li&gt;Mattermost: 8.14.0 through 8.16.4&lt;&#x2F;li&gt;
  &lt;li&gt;Project import: 8.15.0 through 8.16.4&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend that all installations running a version mentioned above be
upgraded as soon as possible. No workarounds are available for these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no new migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/02/gitlab-8-dot-16-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/02/gitlab-8-dot-16-dot-4-released/</id>
<published>2017-02-02T00:00:00+00:00</published>
<updated>2017-02-02T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.16.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;recent 8.16
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix user validation error in Import&#x2F;Export. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8909&quot;&gt;!8909&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add settings dropdown to mobile screens. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8896&quot;&gt;!8896&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue that prevented LDAP users from logging in with 2FA and U2F.
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8730&quot;&gt;!8730&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix search bar search param encoding. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8753&quot;&gt;!8753&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Associate the “Project name” label with the correct input field in Project
settings. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8795&quot;&gt;!8795&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent the Profile settings form from submitting twice. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8825&quot;&gt;!8825&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix filtering label and milestone with multiple words. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8830&quot;&gt;!8830&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed cancel button in the services form not redirecting back to the
integrations settings view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8843&quot;&gt;!8843&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve performance of triggered chat commands. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8876&quot;&gt;!8876&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add project ID index to &lt;code&gt;project_authorizations&lt;&#x2F;code&gt; table to optimize queries.
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8890&quot;&gt;!8890&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix permalink discussion note being collapsed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8773&quot;&gt;!8773&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix filtering usernames with multiple words in issues filter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8851&quot;&gt;!8851&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Disable all merge acceptance buttons pending MR approval. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1101&quot;&gt;!1101&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a migration that adds an index concurrently and should
not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16 release webcast recording and highlights</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/02/02/gitlab-8-16-webcast-recording/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/02/02/gitlab-8-16-webcast-recording/</id>
<published>2017-02-02T00:00:00+00:00</published>
<updated>2017-02-02T00:00:00+00:00</updated>
<author>
<name>Rebecca Dodd</name>
</author>
<content type='html'>&lt;p&gt;In this webcast, our Head of Product &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;markpundsack&quot;&gt;Mark Pundsack&lt;&#x2F;a&gt; and Product Manager &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;regisf&quot;&gt;Régis Freyd&lt;&#x2F;a&gt; show us what&#x27;s new in our latest release, demo auto deploy, web terminal and monitoring, let us in on what&#x27;s next for GitLab, and take your questions.&lt;&#x2F;p&gt;



&lt;p&gt;With GitLab 8.15 and 8.16 we brought you auto deploy with Kubernetes using Google Kubernetes Engine, introduced our popular Time Tracking tool to the Community Edition, made it easier to fix bugs right within our UI with the Web Terminal, released monitoring functionality with Prometheus and added Merge Request Approvals to our Enterprise Edition. You can watch the recording of our release webcast and check out the highlights below.&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
&lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;iYPhXm8RlxI&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h2 id=&quot;highlights&quot;&gt;Highlights&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;0137-introduction-to-git-and-gitlab&quot;&gt;[01:37] Introduction to Git and GitLab&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;0353-gitlabs-idea-to-production-vision&quot;&gt;[03:53] GitLab&#x27;s Idea to Production Vision&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;At the end of 2016 we completed our vision of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.highspot.com&#x2F;spots&#x2F;615dd7e3911d70c4887812a7&quot;&gt;Idea to Production&lt;&#x2F;a&gt; and with the release of &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;GitLab 8.16&lt;&#x2F;a&gt;, we took the first step toward our new goal of making world-class monitoring easier for everyone by bundling in Prometheus and its Node Exporter with our Omnibus package.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;0605-auto-deploy&quot;&gt;[06:05] Auto Deploy&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Auto deploy adds a single button to your project which, when clicked, creates a merge request with a template that will automatically deploy your application using Docker to your container scheduler. This immediately leverages Review Apps, meaning you can see it working before even merging the merge request – as close as you can get to one-click deploys. Jump ahead to 09:33 for a demo.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;0733-web-terminal&quot;&gt;[07:33] Web Terminal&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Traditionally, gaining direct access to review apps or a staging or production environment for your project has been a little painful. We&#x27;ve made it much easier with the Web Terminal which shipped in 8.15: just visit the environments page in your project and click on the terminal button. GitLab will SSH into the instance for you and allow you to tinker away or debug a problem quickly. You&#x27;ll find a demo for this at 14:47.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;0814-monitoring-with-prometheus&quot;&gt;[08:14] Monitoring with Prometheus&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;This release included Prometheus and its Node Exporter as part of our Omnibus package, providing high-quality, time-series monitoring of your GitLab server&#x27;s resources. After you&#x27;ve enabled Prometheus you have access to the Prometheus console, or you connect a compatible dashboard tool such as Grafana. The demo starts at 15:56.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;1721-time-tracking-for-ce&quot;&gt;[17:21] Time Tracking for CE&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Time tracking lets you record estimates and time spent on issues and merge requests, making it not only a powerful reporting tool, but a useful planning tool as well. And we&#x27;ve brought it to CE! Visit our &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;08&#x2F;gitlab-8-14-webcast&#x2F;&quot;&gt;8.14 webcast recap&lt;&#x2F;a&gt; for a demo. We&#x27;ve also added an API, so from now on, everything you can do in the UI, you can do with the API.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;1849-merge-request-approval-ee&quot;&gt;[18:49] Merge Request Approval (EE)&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;The merge request approvals mechanism is simple: you can define a set of approvers for merge requests that are submitted, and you won’t be able to merge unless all approvers have given their consent. Until now, once the approval was given, there was no way of undoing the action, but we&#x27;ve now added a handy button that lets you remove your approval if you’ve given it. You now also see who have already approved a merge request.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;1939-other-improvements-in-815--816&quot;&gt;[19:39] Other Improvements in 8.15 &amp;amp; 8.16&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;New issues search and filter bar&lt;&#x2F;li&gt;
  &lt;li&gt;Limit Shared Runner usage (EE)&lt;&#x2F;li&gt;
  &lt;li&gt;New slash command: &#x2F;merge&lt;&#x2F;li&gt;
  &lt;li&gt;Plus some great contributions from our community&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Check out the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;8.16 release blog post&lt;&#x2F;a&gt; for the full list of improvements.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;2103-whats-next&quot;&gt;[21:03] What&#x27;s next&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Squash commits and auto rebase for merge requests are a highly requested feature and we&#x27;re happy to say it’s coming soon. We’re also working on improving our issue boards – we think they&#x27;re a valuable project-planning tool with a lot of potential. We&#x27;re also working on introducing a License Finder and better audit logs. GitLab 9.0 is coming on March 22nd!&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;2254-qa&quot;&gt;[22.54] Q&amp;amp;A&lt;&#x2F;h3&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Tweet us &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;gitlab&quot;&gt;@GitLab&lt;&#x2F;a&gt;, check out our &lt;a href=&quot;&#x2F;jobs&#x2F;&quot;&gt;job openings&lt;&#x2F;a&gt;, or add your questions and suggestions to our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&quot;&gt;issue tracker&lt;&#x2F;a&gt;!&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p class=&quot;note&quot;&gt;Image by &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;dfranca&quot;&gt;David França&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;8-16-webcast-recap.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/01/27/gitlab-8-dot-16-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/01/27/gitlab-8-dot-16-dot-3-released/</id>
<published>2017-01-27T00:00:00+00:00</published>
<updated>2017-01-27T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re releasing version 8.16.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;recent 8.16
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;


&lt;p&gt;UPDATE (2017-01-28): We&#x27;ve bumped the 8.16.3 Omnibus package version to fix a problem with
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1913&quot;&gt;bundler complaining about &quot;Your home directory is not set properly&quot;&lt;&#x2F;a&gt;.
For CE, you should check that version &lt;code&gt;8.16.3-ce.1&lt;&#x2F;code&gt; is installed instead of &lt;code&gt;8.16.3-ce.0&lt;&#x2F;code&gt;.
For EE, you should check that version &lt;code&gt;8.16.3-ee.1&lt;&#x2F;code&gt; is installed instead of &lt;code&gt;8.16.3-ee.0&lt;&#x2F;code&gt;.
If you are upgrading from .0 to .1 and the install fails, you may have to skip the backup step
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1913#note_22301050&quot;&gt;as described here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed label select toggle not updating correctly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8601&quot;&gt;!8601&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix autocomplete initial undefined state (loading). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8667&quot;&gt;!8667&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Introduced an offset limit to prevent the dropdown from going far
right. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8679&quot;&gt;!8679&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix race conditions for AuthorizedProjectsWorker. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8701&quot;&gt;!8701&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add caching of droplab ajax requests. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8725&quot;&gt;!8725&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed flexbox and wrap issues. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8745&quot;&gt;!8745&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make the time estimate migrations reversible. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8749&quot;&gt;!8749&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix filtered search so that labels selected from discussion notes
display correctly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8756&quot;&gt;!8756&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix access to the wiki code via HTTP when repository feature
disabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8758&quot;&gt;!8758&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t call &lt;code&gt;#uniq&lt;&#x2F;code&gt; on a relation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8784&quot;&gt;!8784&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Revert filter-assigned-to-me. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8785&quot;&gt;!8785&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Clicking line anchor multiple times causes scroll position
to over-correct&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8791&quot;&gt;!8791&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &#x2F;explore sorting trending. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8792&quot;&gt;!8792&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 when repositories contain annotated tags pointing to
blobs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8800&quot;&gt;!8800&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Document removing approval. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1086&quot;&gt;!1086&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; EE port: Fix race conditions for AuthorizedProjectsWorker. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1100&quot;&gt;!1100&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix sidekiq cluster mishandling of queue names. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1117&quot;&gt;!1117&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix GitLab Pages not refreshing upon new content. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1134&quot;&gt;!1134&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no new migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.2 and 8.14.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/01/25/gitlab-8-dot-16-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/01/25/gitlab-8-dot-16-dot-2-released/</id>
<published>2017-01-25T00:00:00+00:00</published>
<updated>2017-01-25T00:00:00+00:00</updated>
<author>
<name>DJ Mountney</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.16.2 and 8.14.8 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions resolve a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2017&#x2F;01&#x2F;22&#x2F;gitlab-8-16-released&#x2F;&quot;&gt;recent 8.16
release&lt;&#x2F;a&gt; and include some backported bug fixes
for the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;&quot;&gt;8.14 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;8162-fixes-and-improvements&quot;&gt;8.16.2 Fixes and Improvements&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added current user filter to assignee dropdown (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8653&quot;&gt;!8653&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix errors with the Mattermost Notification Service (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8681&quot;&gt;!8654&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow issue filter bar to be operated with mouse only ([!8681])&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Search Bar not working in IE11 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8689&quot;&gt;!8689&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed bug with merge immediately button not working (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8696&quot;&gt;!8696&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add Prometheus docs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8699&quot;&gt;!8699&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8703&quot;&gt;!8703&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Reveal Variables button may overrun width of screen&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8221&quot;&gt;!8221&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed keyboard navigation not working in filtered search bar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8656&quot;&gt;!8656&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8777&quot;&gt;!8777&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes a bug with the filtered search lists rendering the same item several times (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8710&quot;&gt;!8710&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove blue border from comment box hover (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8720&quot;&gt;!8720&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make cycle_analytics_events_spec.rb side-effect free (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8594&quot;&gt;!8594&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8778&quot;&gt;!8778&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix CI requests concurrency for newer runners that prevents from picking pending builds (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8760&quot;&gt;!8760&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8657&quot;&gt;!8657&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Track Mattermost usage in usage ping (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1071&quot;&gt;!1071&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed incorrect class names used in merge request widget (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1093&quot;&gt;!1093&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed the &#x27;Content-Type&#x27; bug with Vue Resource (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1095&quot;&gt;!1095&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Removed project edit visibility radio buttons (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1097&quot;&gt;!1097&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix count of required approvals displayed on MR edit form (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1082&quot;&gt;!1082&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Don&#x27;t try to show assignee in approved_merge_request_email if there&#x27;s no assignee (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1103&quot;&gt;!1103&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Show correct exceeding limit value on LFS push when it&#x27;s rejected (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1105&quot;&gt;!1105&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix updating approvals count when editing an MR (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1106&quot;&gt;!1106&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;8148-fixes-and-improvements&quot;&gt;8.14.8 Fixes and Improvements&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Accept environment variables from the &lt;code&gt;pre-receive&lt;&#x2F;code&gt; script (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7967&quot;&gt;!7967&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Speed up group milestone index by passing group_id to IssuesFinder (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8363&quot;&gt;!8363&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Memoize Milestoneish#issues_visible_to_user to reduce lookups (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8146&quot;&gt;!8146&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump gitlab-shell to 4.1.1 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8143&quot;&gt;!8143&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure issuable state changes only fire webhooks once (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8101&quot;&gt;!8101&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix N+1 queries on milestone show pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8185&quot;&gt;!8185&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Reject blank environment variables in Gitlab::Git::RevList (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8189&quot;&gt;!8189&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16.1, 8.15.5, 8.14.7, and 8.13.12 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/01/23/gitlab-8-dot-16-dot-1-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/01/23/gitlab-8-dot-16-dot-1-security-release/</id>
<published>2017-01-23T00:00:00+00:00</published>
<updated>2017-01-23T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.16.1, 8.15.5, 8.14.7, and 8.13.12 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we recommend that all
affected GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;prevent-users-from-creating-notes-on-resources-they-cant-access&quot;&gt;Prevent users from creating notes on resources they can&#x27;t access&lt;&#x2F;h2&gt;

&lt;p&gt;An attacker was able to use the API to post comments on resources that they
would not otherwise be able to view, which would &quot;subscribe&quot; them to the
notifications for that resource and allow them to receive future updates about
it, which may contain sensitive information. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26249&quot;&gt;#26249&lt;&#x2F;a&gt; and
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26250&quot;&gt;#26250&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prevent-users-from-deleting-system-deploy-keys-via-the-project-deploy-key-api&quot;&gt;Prevent users from deleting system deploy keys via the project deploy key API&lt;&#x2F;h2&gt;

&lt;p&gt;An attacker was able to delete a system-level deploy key by deleting it from a
project they owned via the Deploy Key API. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26243&quot;&gt;#26243&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ensure-export-files-are-removed-after-a-namespace-is-deleted&quot;&gt;Ensure export files are removed after a namespace is deleted&lt;&#x2F;h2&gt;

&lt;p&gt;If a user performed a project export and then deleted (or moved) its containing
namespace, an attacker could claim the namespace and access the existing project
export if less than an hour had passed. We now ensure that project exports are
immediately removed along with the namespace. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26242&quot;&gt;#26242&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of
&lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing these
issues to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-omniauth-gem-to-132&quot;&gt;Upgrade omniauth gem to 1.3.2&lt;&#x2F;h2&gt;

&lt;p&gt;OmniAuth 1.3.1 improperly stored POST data in callback parameters. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26813&quot;&gt;the
issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.16 released with auto deploy on Google Kubernetes Engine and Prometheus monitoring as part of GitLab</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/01/22/gitlab-8-16-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/01/22/gitlab-8-16-released/</id>
<published>2017-01-22T00:00:00+00:00</published>
<updated>2017-01-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We’re on a mission to &lt;a href=&quot;&#x2F;company&#x2F;mission&#x2F;#mission&quot;&gt;make sure everyone can contribute&lt;&#x2F;a&gt;. That means making &lt;a href=&quot;&#x2F;direction&#x2F;#scope&quot;&gt;the tools in GitLab&lt;&#x2F;a&gt;
easy to use, easy to set up and easy to maintain. Along the way some of the major steps were the introduction of zero-setup continuous integration (CI), and auto deploy on Kubernetes in &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;&quot;&gt;GitLab 8.15&lt;&#x2F;a&gt; last month. This month, we’re leaping into the new year with the
introduction of the next step.&lt;&#x2F;p&gt;



&lt;p&gt;With GitLab 8.16 we’re not only making idea to production on Kubernetes &lt;em&gt;much&lt;&#x2F;em&gt;
more accessible by making it work on Google Cloud, we’re also leaping to the
next step in idea to production: monitoring. From this release onwards, we’ll
be shipping the powerful monitoring tool &lt;a href=&quot;https:&#x2F;&#x2F;prometheus.io&#x2F;&quot;&gt;Prometheus&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We found that if you deploy an application, you can&#x27;t do so in a black hole.
You need to get feedback about the effects of the deployment. You can use this
feedback to revert deployments that cause problems and to get ideas about
future improvements. Adding Prometheus is the first step to make sure you get feedback about system, application, and business metrics as an integrated part of deployments done with GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;toupeira&quot;&gt;Markus Koller&lt;&#x2F;a&gt; for his contribution of
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7754&quot;&gt;more storage statistics&lt;&#x2F;a&gt;.
Thanks Markus!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;from-cancun-to-production-on-google-kubernetes-engine-gke&quot;&gt;From Cancun to Production on Google Kubernetes Engine (GKE)&lt;&#x2F;h2&gt;

&lt;p&gt;Every nine months all GitLab team-members and their significant others are invited to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;summits&#x2F;Summit-2017&#x2F;&quot;&gt;our summit&lt;&#x2F;a&gt;.
This gives us the opportunity to bond in person and to share our ideas
and ambitions in an informal way. We&#x27;ve just returned from our summit in Cancún, Mexico,
where GitLab CEO Sid gave a keynote on the past, current and future of GitLab:&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;xGxLi3PtxHM&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;This was an internal presentation meant for our team members. We share it because transparency is &lt;a href=&quot;&#x2F;handbook&#x2F;values&#x2F;&quot;&gt;one of our values&lt;&#x2F;a&gt;. It is not a formal announcement, for example we&#x27;re still evaluating the subscription plans for GitLab.com.&lt;&#x2F;p&gt;

&lt;p&gt;If you don&#x27;t have the time to watch the full video, have a look at
&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=xGxLi3PtxHM&amp;amp;feature=youtu.be&amp;amp;t=2688&quot;&gt;44:48&lt;&#x2F;a&gt;, where Sid gives a challenge to the present team:&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;If you are the first one to present the idea to production demo working on Google Kubernetes Engine (GKE) on stage during the Summit, I will dance the Sid Shuffle from &lt;em&gt;Ice Age 4&lt;&#x2F;em&gt; on stage out of pure happiness.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;If you&#x27;re not familiar with the Sid shuffle, hold your breath. But first, the
context of the challenge:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;&quot;&gt;Last month&lt;&#x2F;a&gt; we showed you a glimpse of the future of development:
in a few minutes from a container scheduler without GitLab to deploying an app to a Kubernetes cluster from a
GitLab instance with auto-scaling CI. This powerful flow was only available
for people using Kubernetes in combination with Openshift, and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25292&quot;&gt;people asked&lt;&#x2F;a&gt; how they could replicate it.&lt;&#x2F;p&gt;

&lt;p&gt;Google Kubernetes Engine is a part of Google Cloud and can be used by anyone –
getting it to work there is a big win for everyone. Motivated by both the
potential for developers around the world and that of seeing Sid dancing,
GitLab&#x27;s engineers worked hard to make it happen.&lt;&#x2F;p&gt;

&lt;p&gt;You can deploy GitLab 8.16 straight to Google Kubernetes Engine, it will have
auto-scaling CI, auto deploy to your own Kubernetes cluster, Mattermost,
use your private Docker registry and set up certificates using Let&#x27;s Encrypt:&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;3A8mdJl_icM&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;Below is a less polished video of this same demo being given during the summit and Sid being happy and dancing out of excitement. If you want to skip the demo please go to &lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=39chczWRKws#t=28m29s&quot;&gt;28:29&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;39chczWRKws&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h3 id=&quot;details-on-deploying-to-gke&quot;&gt;Details on deploying to GKE&lt;&#x2F;h3&gt;

&lt;p&gt;You can do everything shown in the &lt;em&gt;second&lt;&#x2F;em&gt; video
right now &lt;a href=&quot;https:&#x2F;&#x2F;cloud.google.com&#x2F;&quot;&gt;by signing up at Google Cloud&lt;&#x2F;a&gt; and simply following our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;kubernetes-gitlab-demo&#x2F;blob&#x2F;master&#x2F;README.md&quot;&gt;documentation on idea to production on Google Kubernetes Engine&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For deploying to Kubernetes, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html&quot;&gt;see our documentation on auto deploy&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re working to make it even easier for &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25986&quot;&gt;everyone to replicate idea to production&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;monitoring-gitlab-with-prometheus&quot;&gt;Monitoring GitLab with Prometheus&lt;&#x2F;h2&gt;

&lt;p&gt;We have outlined an &lt;a href=&quot;&#x2F;2017&#x2F;01&#x2F;05&#x2F;prometheus-and-gitlab&#x2F;&quot;&gt;extensive vision&lt;&#x2F;a&gt; for making world-class monitoring
easier for everyone, and with GitLab 8.16 we have taken our first step towards that goal. In this release we have included &lt;a href=&quot;https:&#x2F;&#x2F;prometheus.io&quot;&gt;Prometheus&lt;&#x2F;a&gt; and its
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;prometheus&#x2F;node_exporter&quot;&gt;Node Exporter&lt;&#x2F;a&gt; as part of our Omnibus package. This will provide
high-quality, time-series monitoring of your GitLab server&#x27;s resources.&lt;&#x2F;p&gt;

&lt;p&gt;Both Prometheus and Node exporter are off by default for this release, but we
plan on having them on by default, starting with GitLab version 9.0 that is scheduled for March 22.
To enable monitoring now, simply &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;monitoring&#x2F;prometheus&#x2F;index.html&quot;&gt;enable the features&lt;&#x2F;a&gt; and
reconfigure GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;After you have enabled Prometheus you can visit &lt;code&gt;&amp;lt;your_domain_name&amp;gt;:9090&lt;&#x2F;code&gt; to access the Prometheus console, or connect a compatible dashboard tool such as Grafana.&lt;&#x2F;p&gt;

&lt;p&gt;In the coming months we&#x27;ll be adding &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26905&quot;&gt;more charts to the environments pages&lt;&#x2F;a&gt;, for example to see how &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26944&quot;&gt;a deployment affected memory usage&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;time-tracking-in-ce-and-api&quot;&gt;Time Tracking in CE and API&lt;&#x2F;h2&gt;

&lt;p&gt;We &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;&quot;&gt;introduced&lt;&#x2F;a&gt; time tracking in GitLab 8.14 Enterprise Edition.
Since its introduction, we&#x27;ve seen massive usage on GitLab.com; and many people
argued that time tracking can also be essential for smaller teams and not just
for enterprises. We heard you and have therefore decided to move time tracking
to GitLab Community Edition with this release.&lt;&#x2F;p&gt;

&lt;p&gt;On top of that, time tracking has now a proper API, which lets you achieve the
same actions you can do with the user interface. This means you can set
estimates and record time spent on issues and merge requests.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;time_tracking.html&quot;&gt;Time tracking feature documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Time tracking API documentation for &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;merge_requests.html#set-a-time-estimate-for-a-merge-request&quot;&gt;merge requests&lt;&#x2F;a&gt;
  and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;issues.html#set-a-time-estimate-for-an-issue&quot;&gt;issues&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;gitlab-pages-in-817&quot;&gt;GitLab Pages in 8.17&lt;&#x2F;h2&gt;

&lt;p&gt;We &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;24&#x2F;were-bringing-gitlab-pages-to-community-edition&#x2F;&quot;&gt;promised to bring GitLab Pages to CE&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8463&quot;&gt;started to work on this&lt;&#x2F;a&gt;. We expect to ship this next month in GitLab 8.17.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-issues-search-and-filter-interface&quot;&gt;New issues search and filter interface&lt;&#x2F;h2&gt;

&lt;p&gt;If you use issues, you probably have a lot of them.
So we&#x27;ve had the ability to search and filter issues based on different
attributes in GitLab. With 8.16, we&#x27;ve redesigned that interface to be more
natural and intuitive, and modernized the look along the way.
This will also allow us to expand search and filtering with more powerful
features in the future.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;issues_search_1.png&quot; alt=&quot;Improved issue search and filters in GitLab 8.16&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve started out with issues, but we&#x27;re planning to bring the new design to
other parts of GitLab soon as well.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;issues_search_2.png&quot; alt=&quot;Improved issue search and filters in GitLab 8.16&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;removing-your-approval-in-ee-merge-requests&quot;&gt;Removing your approval in EE merge requests&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab Enterprise Edition Starter, you have been able to approve merge
requests. As an approver, clicking approve means that you&#x27;ve committed to that
action. But there are many scenarios where you may want to undo your approval.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;approve_merge_request.png&quot; alt=&quot;Unapprove merge requests in GitLab 8.16&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Perhaps you saw something in the diff that you missed earlier.
Or maybe another approver brings up another point of discussion,
and so the approver wants to remove their approval in the meantime,
and reapply it later.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;unapprove_merge_request.png&quot; alt=&quot;Unapprove merge requests in GitLab 8.16&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.16 EE, you can now do that. You simply click in the merge request
widget to remove a previously made approval. As expected, system notes in the
merge request thread are recorded and notification emails are sent for both
approving and removing approvals.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;email_unapprove_merge_request.png&quot; alt=&quot;Unapprove merge requests in GitLab 8.16&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Updated approvals are available in GitLab Enterprise Edition Starter, Premium
and on GitLab.com.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deploy-keys-with-write-access&quot;&gt;Deploy keys with write access&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ssh&#x2F;&quot;&gt;Deploy keys&lt;&#x2F;a&gt; are ideal for giving limited read access to your repository from external sources, for instance for deploys.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve added the ability to give deploy keys write access. This will allow the
holder of the key to push to your repository, which can be useful for all sorts
of things, such as setting a Git tag on deploys, pushing artifacts to the
repository and more.&lt;&#x2F;p&gt;

&lt;p&gt;By default, deploy keys are read-only and your existing keys are not changed.&lt;&#x2F;p&gt;

&lt;p&gt;Deploy keys with write access was contributed by &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;aliibrahim&quot;&gt;Ali Ibrahim&lt;&#x2F;a&gt;. Thanks Ali!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;limit-shared-runner-usage-ee-starterpremium&quot;&gt;Limit Shared Runner Usage (EE Starter&#x2F;Premium)&lt;&#x2F;h2&gt;

&lt;p&gt;Not only does GitLab CI scale up automatically based on demand,
shared Runners make it incredibly easy to offer CI to your entire organisation.
In fact, it&#x27;s so easy to offer CI services that we saw a need arise to be able
to limit the usage of those shared resources.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;bm1.png&quot; alt=&quot;Limit build minutes usage in GitLab 8.16 EE&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.16 Enterprise Edition you can limit build minutes of shared
Runners per group. Once surpassed, pipelines will no longer execute on shared
Runners. This will allow you to prevent over-usage of shared resources when
using GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;bm2.png&quot; alt=&quot;Limit build minutes usage in GitLab 8.16 EE&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;continuous_integration.html#shared-runners-build-minutes-quota&quot;&gt;Read more about the Shared Runners build minutes quota&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;introduce-a-new-merge-slash-command-for-merge-requests&quot;&gt;Introduce a new &lt;code&gt;&#x2F;merge&lt;&#x2F;code&gt; slash command for merge requests&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;quick_actions.html&quot;&gt;Slash commands&lt;&#x2F;a&gt; are a very quick way of executing a number of operations on
issues and merge requests in GitLab. Simply type one of the commands in
the description or comment of an issue or merge request and the commands will
be executed on submission.&lt;&#x2F;p&gt;

&lt;p&gt;You can now even merge using a slash command. Type &lt;code&gt;&#x2F;merge&lt;&#x2F;code&gt; and the merge
request will be merged when it&#x27;s ready, given you have permission to do so.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab has a large number of slash commands, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;quick_actions.html&quot;&gt;view them all here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;streamlining-project-settings-and-navigation&quot;&gt;Streamlining project settings and navigation&lt;&#x2F;h2&gt;

&lt;p&gt;Here at GitLab we iterate quickly. So every now and then we revisit and
streamline our settings and navigation to accommodate.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab 8.15, the project settings dropdown menu had
many items. Furthermore, it&#x27;s confusing that the menu itself is
located far away from the rest of the tabbed navigation toward the center of
the page. In the next few releases, we will be streamlining that navigation,
and combining settings pages appropriately.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;settings_new.png&quot; alt=&quot;Improved settings navigation in GitLab 8.16&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With 8.16 we are just starting, by combining the &lt;code&gt;Members&lt;&#x2F;code&gt; and &lt;code&gt;Groups&lt;&#x2F;code&gt; menu
items into just one, called &lt;code&gt;Members&lt;&#x2F;code&gt;. Navigating to that page will show the
two previous pages combined into one. Similarly, we combined &lt;code&gt;Webhooks&lt;&#x2F;code&gt; and
&lt;code&gt;Services&lt;&#x2F;code&gt; together into &lt;code&gt;Integrations&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;record-and-show-last-used-date-of-ssh-keys&quot;&gt;Record and show last used date of SSH Keys&lt;&#x2F;h2&gt;

&lt;p&gt;If you have uploaded several SSH keys, it can be hard to tell which
you&#x27;ve been using most recently.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab will now report when a SSH has been used last. Find this information
in your profile, under keys: &lt;code&gt;&#x2F;profile&#x2F;keys&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;wingyu&quot;&gt;Vincent Wong&lt;&#x2F;a&gt; for contributing this useful feature!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;storage-statistics&quot;&gt;Storage statistics&lt;&#x2F;h2&gt;

&lt;p&gt;Okay, we admit it, we do our best to make it easy to use a lot of disk space:
You can use GitLab to store your build artifacts, your docker images,
LFS objects, Git objects, and more.&lt;&#x2F;p&gt;

&lt;p&gt;To make it a bit easier to see &lt;em&gt;where&lt;&#x2F;em&gt; you are using all this disk space,
GitLab will now report per project and group how much space is being used
and by what (repository, artifacts (includes Docker images) or LFS).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_16&#x2F;storage_usage.png&quot; alt=&quot;See how storage is being used in GitLab 8.16&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to this month&#x27;s MVP &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;toupeira&quot;&gt;Markus Koller&lt;&#x2F;a&gt; for contributing this feature!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-runner&quot;&gt;GitLab Runner&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.10 today. The most interesting changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Add termination grace period for Kubernetes executor &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;383&quot;&gt;!383&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add configuration options for Kubernetes resource requests &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;391&quot;&gt;!391&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add poll interval and timeout parameters for Kubernetes executor &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;384&quot;&gt;!384&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Pass ImagePullSecrets for Kubernetes executor &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;449&quot;&gt;!449&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add Namespace overwrite possibility for Kubernetes executor &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;444&quot;&gt;!444&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add support for GIT_SUBMODULE_STRATEGY &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;443&quot;&gt;!443&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add Prometheus metric that counts number of catched errors &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;439&quot;&gt;!439&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Update Docker Machine in official Runner images to v0.9.0 &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;454&quot;&gt;!454&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add &#x27;–run-tagged-only&#x27; cli option for runners &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;438&quot;&gt;!438&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add armv6l to the ARM replacements list for docker executor helper image &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;446&quot;&gt;!446&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;To see the full list of all changes please read &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;v1.10.0&#x2F;CHANGELOG.md&quot;&gt;the Runner&#x27;s CHANGELOG file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost-36&quot;&gt;GitLab Mattermost 3.6&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.16 includes &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;mattermost-3-6&quot;&gt;Mattermost 3.6&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;&quot;&gt;an open source Slack-alternative&lt;&#x2F;a&gt; whose newest release offers improved multi-team deployment, an early version of emoji reactions, an improved command line interface and much more.&lt;&#x2F;p&gt;

&lt;p&gt;This version includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt; and upgrade is recommended.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;amazing-community-contributions&quot;&gt;Amazing community contributions&lt;&#x2F;h2&gt;

&lt;p&gt;For 8.16, we merged 50 merge requests from the community, including new
features, bug fixes, or even backstage improvements!&lt;&#x2F;p&gt;

&lt;p&gt;The most noticeable contributed changes are as follows (some were highlighted above):&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Allow to add deploy keys with write-access. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5807&quot;&gt;!5807&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Allow to use &lt;code&gt;+&lt;&#x2F;code&gt; symbol in snippet filenames. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6644&quot;&gt;!6644&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Order projects by latest activity in the &quot;Go to a project&quot; quick switcher. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7737&quot;&gt;!7737&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Introduce a new &lt;code&gt;&#x2F;merge&lt;&#x2F;code&gt; slash command for merge requests. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7746&quot;&gt;!7746&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add storage statistics for build artifacts, and LFS objects. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7754&quot;&gt;!7754&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Log LDAP blocking&#x2F;unblocking events to application log. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8042&quot;&gt;!8042&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Allow to use ENV variables in the Redis config. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8073&quot;&gt;!8073&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Record and show last used date of SSH Keys. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8113&quot;&gt;!8113&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add support for PlantUML diagrams in Asciidoc. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8537&quot;&gt;!8537&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Expire related caches after changing HEAD. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8584&quot;&gt;!8584&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Autoresize markdown preview. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8607&quot;&gt;!8607&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab-package-changes&quot;&gt;Omnibus GitLab package changes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;postgresql-version-upgrade&quot;&gt;PostgreSQL version upgrade&lt;&#x2F;h3&gt;

&lt;p&gt;As mentioned &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;#postgresql-version-upgrade&quot;&gt;in the 8.15 release post&lt;&#x2F;a&gt;,
omnibus-gitlab packages are equipped with &lt;code&gt;gitlab-ctl pg-upgrade&lt;&#x2F;code&gt; tool.
This tool will upgrade the bundled PostgreSQL database version.&lt;&#x2F;p&gt;

&lt;p&gt;Please plan the upgrade ahead of GitLab 9.0 release (scheduled for Mar. 22, 2017).&lt;&#x2F;p&gt;

&lt;p&gt;The omnibus-gitlab packages for GitLab 9.0 will prevent upgrades until the database
is upgraded.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;database.html#upgrade-packaged-postgresql-server&quot;&gt;Read more about database upgrade in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Ran into issues? Create an issue at the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&quot;&gt;omnibus-gitlab issue tracker&lt;&#x2F;a&gt;,
and reference it in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1783&quot;&gt;upgrade problems meta issue.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;reduced-package-size&quot;&gt;Reduced package size&lt;&#x2F;h3&gt;

&lt;p&gt;When you download the omnibus-gitlab 8.16 package you might notice the reduced
package size. Do not be alarmed, this is intentional.
Even with the new addition of monitoring in the package, the size was reduced
by almost 50MB!
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1778&quot;&gt;We&#x27;ve been working&lt;&#x2F;a&gt;
and will continue working on further size optimizations of the package.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-changes&quot;&gt;Performance Changes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Refactored note edit form to improve frontend performance on MR and Issues pages, especially pages with has a lot of discussions in it &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8356&quot;&gt;8356&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Reduce DB-load for build-queues by storing last_update in Redis &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8084&quot;&gt;8084&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release requires downtime.&lt;&#x2F;p&gt;

&lt;p&gt;This release migrates project related statistics to a separate table, removing
existing columns in the process. This migration process requires downtime,
and can take 10-15 minutes for large installations.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE-only features and things like LDAP group support can be found in GitLab Enterprise Edition Starter and Premium.
For a complete overview please have a look at &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;all GitLabs products&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_16&#x2F;pic.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.15.4, 8.14.6, and 8.13.11 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/01/10/gitlab-8-dot-15-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/01/10/gitlab-8-dot-15-dot-4-released/</id>
<published>2017-01-10T00:00:00+00:00</published>
<updated>2017-01-10T00:00:00+00:00</updated>
<author>
<name>Douglas Barbosa Alexandre</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.15.4, 8.14.6, and 8.13.11 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we recommend that all
affected GitLab installations be upgraded to one of these versions.
Additionally, the 8.15.4 version resolves a number of regressions and bugs in
last month&#x27;s &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;&quot;&gt;8.15 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;security-fixes-in-8154-8146-and-81311&quot;&gt;Security fixes in 8.15.4, 8.14.6 and 8.13.11&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;cross-site-scripting-vulnerability-in-turbolinks&quot;&gt;Cross-Site Scripting Vulnerability in Turbolinks&lt;&#x2F;h3&gt;

&lt;p&gt;These releases include a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25842&quot;&gt;patch&lt;&#x2F;a&gt; for a cross-site scripting vulnerability in the
Ruby gem Turbolinks. Versions 2.5.4 and earlier of Turbolinks are vulnerable to
cross-site scripting attacks when loading attachments with HTML content types.
We&#x27;ve released a temporary GitLab fork of Turbolinks while we make a decision
on migrating to Turbolinks version 5 or abandoning Turbolinks.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cross-site-scripting-vulnerability-in-gitlab-markup&quot;&gt;Cross-Site Scripting Vulnerability in GitLab-Markup&lt;&#x2F;h3&gt;

&lt;p&gt;Also included with these releases is a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;26411&quot;&gt;patch&lt;&#x2F;a&gt; for a cross-site scripting
vulnerability in the GitLab Markup gem, forked from the GitHub Markup gem.
This vulnerability can be exploited by tricking users into clicking on
ReStructuredText files that specify a raw HTML format. Thanks to Jason Ritzke
(@Rtzq0) for reporting this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;additional-changes-in-8154&quot;&gt;Additional changes in 8.15.4&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use #parts instead of #part to read all the parts of the Message. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8507&quot;&gt;!8507&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Re-add Google Cloud Storage as a backup strategy (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8481&quot;&gt;!8481&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t instrument 405 Grape calls (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8445&quot;&gt;!8445&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Speed up group milestone index by passing group_id to IssuesFinder (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8363&quot;&gt;!8363&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; With Gitea v1.0.0, notes are imported (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8298&quot;&gt;!8298&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make successful pipeline emails off for watchers (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8176&quot;&gt;!8176&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Switch to using gitlab-psql for query against db (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1197&quot;&gt;!1197&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Adding &#x2F;bin&#x2F;sh to command for analyze_new_cluster.sh call (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1194&quot;&gt;!1194&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions have no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.15.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2017/01/06/gitlab-8-dot-15-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2017/01/06/gitlab-8-dot-15-dot-3-released/</id>
<published>2017-01-06T00:00:00+00:00</published>
<updated>2017-01-06T00:00:00+00:00</updated>
<author>
<name>Douglas Barbosa Alexandre</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.15.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;&quot;&gt;recent 8.15
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This version includes a migration which will &lt;strong&gt;rename projects&lt;&#x2F;strong&gt; that became
inaccessible in version 8.15 due to reserved names. We would have preferred
to do this in the monthly release rather than a patch release, but weighed
against inaccessible projects we believe it&#x27;s a reasonable tradeoff.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Rename projects with reserved path names (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8234&quot;&gt;!8234&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Whitelist next project names: assets, profile, public (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8470&quot;&gt;!8470&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 500 error when visit group from admin area if group name contains dot (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8342&quot;&gt;!8342&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GFM dropdown not showing at beginning of new lines (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8338&quot;&gt;!8338&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 renaming group. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8201&quot;&gt;!8201&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pipeline stylesheets changes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8224&quot;&gt;!8224&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cross-project references copy to include the project reference (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8232&quot;&gt;!8232&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Revert MattermostNotificationService and SlackNotificationService (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8240&quot;&gt;!8240&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use stable icon for Mattermost integration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8252&quot;&gt;!8252&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Labels are not consistent on all pages&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8256&quot;&gt;!8256&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 500 errors when creating a user with identity via API (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8442&quot;&gt;!8442&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove bottom border from Issuable titles (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8278&quot;&gt;!8278&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project hooks params (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8425&quot;&gt;!8425&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Gitlab::LDAP::Person uses LDAP attributes configuration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8418&quot;&gt;!8418&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; LDAP attributes needs default values (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8465&quot;&gt;!8465&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Removes invalid HTML and unneeded CSS to prevent shaking in the pipelines tab (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8411&quot;&gt;!8411&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; API: extern_uid is a string (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8404&quot;&gt;!8404&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Increases pipeline graph drowdown width in order to prevent strange position (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8399&quot;&gt;!8399&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Copy, don&#x27;t move uploaded avatar files (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8396&quot;&gt;!8396&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add API route slack slash commands (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8362&quot;&gt;!8362&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed regression of note-headline-light where it was always placed on 2 lines (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8348&quot;&gt;!8348&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix left border in session tabs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8346&quot;&gt;!8346&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix unclear closing issue behaviour on Merge Request show page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8345&quot;&gt;!8345&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix grammar error in text about mentioned issues (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8337&quot;&gt;!8337&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only limit container width on issues &amp;amp; MRs within fixed-width container (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8330&quot;&gt;!8330&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Cache project authorizations even when user has access to zero projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8327&quot;&gt;!8327&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Only fetch repo once on secondary after push (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1015&quot;&gt;!1015&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Disable LDAP permission override in project members edit list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;1018&quot;&gt;!1018&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes a post-deploy migration and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend clearing the GitLab cache (&lt;code&gt;gitlab-rake cache:clear&lt;&#x2F;code&gt;) after
upgrading to 8.15.3 due to the renamed projects.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.15.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/28/gitlab-8-dot-15-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/28/gitlab-8-dot-15-dot-2-released/</id>
<published>2016-12-28T00:00:00+00:00</published>
<updated>2016-12-28T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.15.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;&quot;&gt;recent 8.15
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;hr &#x2F;&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix merge request list timestamp alignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8271&quot;&gt;!8271&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix discussion overlap text in regular screens. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8273&quot;&gt;!8273&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix timeout when MR contains large files marked as binary by &lt;code&gt;.gitattributes&lt;&#x2F;code&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix mini-pipeline-graph dropdown animation and stage position in Chrome, Firefox and Safari. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8282&quot;&gt;!8282&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix line breaking in nodes of the pipeline graph in Firefox. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8292&quot;&gt;!8292&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix confidential warning text alignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8203&quot;&gt;!8203&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Hide Scroll Top button for failed build page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8295&quot;&gt;!8295&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Rename &quot;autodeploy&quot; to &quot;auto deploy&quot;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable PostgreSQL statement timeouts when removing unneeded services. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8322&quot;&gt;!8322&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix finding the latest pipeline. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8301&quot;&gt;!8301&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed GFM autocomplete error when no data exists.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added ability to put emojis into repository name. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7420&quot;&gt;!7420&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed resolve discussion note button color.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add hover states for collapsed Issue&#x2F;Merge Request sidebar for Time tracking Icon&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix ElasticSearch search for non-default branches (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;999&quot;&gt;!999&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab&lt;&#x2F;strong&gt; Add a delay option for pg-upgrade (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1164&quot;&gt;!1164&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>We’re bringing GitLab Pages to the Community Edition</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/24/were-bringing-gitlab-pages-to-community-edition/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/24/were-bringing-gitlab-pages-to-community-edition/</id>
<published>2016-12-24T00:00:00+00:00</published>
<updated>2016-12-24T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;The wider community asked us to open-source GitLab pages.
Inspired by the holiday-spirit we&#x27;re happy to bring GitLab Pages to the Community Edition (CE) of GitLab.&lt;&#x2F;p&gt;



&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;pages.gitlab.io&#x2F;&quot;&gt;GitLab Pages&lt;&#x2F;a&gt; allows you to &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;04&#x2F;07&#x2F;gitlab-pages-setup&#x2F;&quot;&gt;host static websites&lt;&#x2F;a&gt; straight from GitLab, with any kind of &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;06&#x2F;17&#x2F;ssg-overview-gitlab-pages-part-3-examples-ci&#x2F;&quot;&gt;static site generator&lt;&#x2F;a&gt;.
For instance, &lt;a href=&quot;http:&#x2F;&#x2F;www.jobvandervoort.com&quot;&gt;my personal website&lt;&#x2F;a&gt; is hosted
through GitLab Pages on GitLab.com using my favorite static site generator
&lt;a href=&quot;https:&#x2F;&#x2F;middlemanapp.com&#x2F;&quot;&gt;Middleman&lt;&#x2F;a&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;JobV&#x2F;jobv.gitlab.io&quot;&gt;see the source here&lt;&#x2F;a&gt;). Even our &lt;a href=&quot;&#x2F;2016&#x2F;12&#x2F;07&#x2F;building-a-new-gitlab-docs-site-with-nanoc-gitlab-ci-and-gitlab-pages&#x2F;&quot;&gt;documentation site&lt;&#x2F;a&gt; is
also fully built on GitLab Pages. Until today, GitLab Pages was exclusive to
the &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;&quot;&gt;Enterprise Edition&lt;&#x2F;a&gt; of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;When we chose to limit this functionality to EE, we did so based on the
reasoning that small teams wouldn’t be interested in this
functionality. We thought it met our &lt;a href=&quot;&#x2F;company&#x2F;stewardship&#x2F;&quot;&gt;stewardship&lt;&#x2F;a&gt; criteria that it was more relevant for organizations that have more than 100 potential users.&lt;&#x2F;p&gt;

&lt;p&gt;We thought that small teams would use the option of using GitLab.com (which runs EE) for free.
Or that they would set up only one website which is easy to do manually.&lt;&#x2F;p&gt;

&lt;p&gt;Yet, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;14605&quot;&gt;more than a hundred people voted&lt;&#x2F;a&gt; and discussed bringing
GitLab Pages to our open-source MIT-licensed Community Edition (CE). We’re
always willing to reconsider our decisions and the passionate messages we
received were more than enough reason to do so. Of course, for GitLab Inc. this
is also a business decision. When we decide to bring a feature from EE to CE,
this lowers the relative value of EE and therefore the potential of selling
subscriptions. Subscriptions allows us to keep investing in new features, packaging, bugfixing and performance improvements.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;In this case, I’m happy to announce that we will be bringing GitLab Pages to the Community Edition.&lt;&#x2F;strong&gt; We’ll do this at the earliest convenience, most likely
with GitLab 8.16 on January 22nd.&lt;&#x2F;p&gt;

&lt;p&gt;We’re very fortunate that the wider community keeps us
sharp. It’s our hope that in the new year, you will continue to support,
guide, criticize, and contribute to GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Want to give Pages a try? &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;pages&#x2F;index.html&quot;&gt;Read our documentation here&lt;&#x2F;a&gt;.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Happy holidays!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;pages_gift.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.15.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/23/gitlab-8-dot-15-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/23/gitlab-8-dot-15-dot-1-released/</id>
<published>2016-12-23T00:00:00+00:00</published>
<updated>2016-12-23T00:00:00+00:00</updated>
<author>
<name>Douglas Barbosa Alexandre</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.15.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;12&#x2F;22&#x2F;gitlab-8-15-released&#x2F;&quot;&gt;recent 8.15
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix viewing &quot;build failed&quot; TODOs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8262&quot;&gt;!8262&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not show retried builds in pipeline stage dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8260&quot;&gt;!8260&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t render inline math when dollar signs are inside markup. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8259&quot;&gt;!8259&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not override incoming Webhook channel for Slack&#x2F;Mattermost. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8270&quot;&gt;!8270&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Mattermost command creation by specifying username. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8257&quot;&gt;!8257&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve autodeploy documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8242&quot;&gt;!8242&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add more images to issue creation from unresolved discussions. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8279&quot;&gt;!8279&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Stops GFM special characters interfering with markdown tags. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8265&quot;&gt;!8265&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix dropdown content non appearing in MR view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8255&quot;&gt;!8255&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;state_event&lt;&#x2F;code&gt; parameter to reopen an issue. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8246&quot;&gt;!8246&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Titles are bigger than usual&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8235&quot;&gt;!8235&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Adds background color for disabled state to merge when succeeds dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8222&quot;&gt;!8222&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add Slack documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8269&quot;&gt;!8269&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix format of Slack when result is &lt;code&gt;nil&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8248&quot;&gt;!8248&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 on slash commands. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8285&quot;&gt;!8285&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve ProcessCommitWorker for large push payloads. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8267&quot;&gt;!8267&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Monkey-patch StrongParameters for ::UploadedFile&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8299&quot;&gt;!8299&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix 500 error while navigating to the &lt;code&gt;pages_domains&lt;&#x2F;code&gt; &#x27;show&#x27; page.. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;993&quot;&gt;!993&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.15 released with Auto Deploy and Web Terminal</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/22/gitlab-8-15-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/22/gitlab-8-15-released/</id>
<published>2016-12-22T00:00:00+00:00</published>
<updated>2016-12-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;With this last release of the year, we&#x27;re not only completing our &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;14&#x2F;gitlab-live-event-recap&#x2F;&quot;&gt;Master Plan&lt;&#x2F;a&gt;, but we
want to show you something cool we&#x27;ve been working on:&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;m0nYHPue5RU&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;



&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.15, we&#x27;re introducing Auto Deploy (shown in the video at
&lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;m0nYHPue5RU?t=102&quot;&gt;1:42&lt;&#x2F;a&gt;), which automates setting up deploys and review apps. For a
Ruby on Rails project, this brings setup time to under a minute.&lt;&#x2F;p&gt;

&lt;p&gt;Plus, to make accessing your environments easier and faster, you can now
access them directly through a terminal in GitLab (shown in the video at &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;m0nYHPue5RU?t=318&quot;&gt;5:18&lt;&#x2F;a&gt;).&lt;&#x2F;p&gt;

&lt;p&gt;We want to give the power of containers, continuous integration and deployment,
review apps and container schedulers to everyone. With GitLab 8.15, we
take away all the hard work without hiding anything. In the demonstration we
set up and deploy a Ruby application with review apps, multiple environments,
chatops to a Kubernetes cluster in about 12 minutes. This typically takes days,
if not weeks to set up and use without GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;For many people, December is a month of celebration and gift giving.
This month, GitLab was again so lucky to receive many great contributions.&lt;&#x2F;p&gt;

&lt;p&gt;The MVP of this month is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;Munken&quot;&gt;Michael Munch&lt;&#x2F;a&gt; for bringing beautifully-typeset math
(LaTeX) to GitLab. Michael worked over a period of 6 months in merge requests
with in total more than three hundred comments to bring this to GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;d also like to thank &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;warren.postma&quot;&gt;Warren Postma&lt;&#x2F;a&gt; for his contributions on the issue trackers, and the &lt;a href=&quot;https:&#x2F;&#x2F;forum.gitlab.com&#x2F;users&#x2F;warren.postma&#x2F;activity&quot;&gt;community forum&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;warren.postma&#x2F;gitlab-ce&#x2F;wikis&#x2F;home&quot;&gt;generally being a great advocate of the product and the company&lt;&#x2F;a&gt;.
And lastly, we want to thank &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;glensc&quot;&gt;Elan Ruusamäe&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;dirker&quot;&gt;Dirk Hörner&lt;&#x2F;a&gt; for their
contributions in technical design and implementation that have given super
powers to Git Hooks.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Warren, Michael, Elan, and Dirk!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;auto-deploy&quot;&gt;Auto Deploy&lt;&#x2F;h2&gt;

&lt;p&gt;We want everyone to quickly get a fully functioning CI&#x2F;CD pipeline that deploys
to a container scheduler. It shouldn&#x27;t require any effort to get started,
but should also be scalable and not hide any of the magic.&lt;&#x2F;p&gt;

&lt;p&gt;Auto Deploy does this. Auto Deploy adds a single button to your project,
that when clicked, will create a merge request with a template that will
automatically deploy your application using Docker to your container scheduler.
The cool thing about this is that this immediately leverages Review Apps,
meaning you can see it working before even merging the merge request!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;auto_deploy.png&quot; alt=&quot;Auto deploy in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This is as close as you can get to one-click deploys, while exposing what
is happening and having all this version-controlled, ready
to collaborate and iterate on.&lt;&#x2F;p&gt;

&lt;p&gt;See &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;m0nYHPue5RU?t=102&quot;&gt;1:42&lt;&#x2F;a&gt; in the video for a quick demo of
Auto Deploy, as it is available in GitLab 8.15.&lt;&#x2F;p&gt;

&lt;p&gt;For this first iteration, we ship Auto Deploy with a template for deploying to an external OpenShift cluster. We use &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gliderlabs&#x2F;herokuish&quot;&gt;Herokuish&lt;&#x2F;a&gt; and Heroku Buildpacks to
package your application into a Docker Image that then is deployed to
Kubernetes on Openshift. We want to add support for more container
schedulers and cloud platforms later (vanilla Kubernetes cluster, Mesos, Docker
Swarm). Contributions are very welcome in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-yml&quot;&gt;our template repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;See &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;topics&#x2F;autodevops&#x2F;stages.html&quot;&gt;the Autodeploy documentation&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;web-terminal&quot;&gt;Web Terminal&lt;&#x2F;h2&gt;

&lt;p&gt;Working together with your container scheduler, GitLab happily spins up several
(dynamic) environments on request for your projects. Be that for review apps
or a staging or production environment.
Traditionally, getting direct access to these environments has been a little
painful. And that&#x27;s a shame: it&#x27;s very useful to quickly try something in a
live environment to debug a problem, or just to experiment.&lt;&#x2F;p&gt;

&lt;p&gt;With the web terminal, this has become extremely easy. Just visit the
environments page in your project and click on the terminal button.
GitLab will SSH into the instance for you and allow you to do anything
you would be able to do from your local instance.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;terminal_gif.gif&quot; alt=&quot;Web Terminal in GitLab 8.15&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In the demonstration at &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;m0nYHPue5RU?t=318&quot;&gt;5:18&lt;&#x2F;a&gt; we show you
give you a quick peek at the web terminal. We can&#x27;t wait to see how you&#x27;ll
use it to speed up your workflow.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;See the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;integration&#x2F;terminal.html&quot;&gt;administrator&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;environments&#x2F;index.html#terminal-support&quot;&gt;environments&lt;&#x2F;a&gt; documentation on the web terminal&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;improved-bitbucket-importer&quot;&gt;Improved Bitbucket Importer&lt;&#x2F;h2&gt;

&lt;p&gt;Importing from Bitbucket has become even more powerful. With GitLab 8.15 we&#x27;ll
also import all pull requests as individual merge requests plus pull
request comments, milestones and the wiki from Bitbucket.
That makes the things we import from any Bitbucket project:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Repository description&lt;&#x2F;li&gt;
  &lt;li&gt;Git repository&lt;&#x2F;li&gt;
  &lt;li&gt;Issues and their comments&lt;&#x2F;li&gt;
  &lt;li&gt;Pull Requests and their comments&lt;&#x2F;li&gt;
  &lt;li&gt;Milestones&lt;&#x2F;li&gt;
  &lt;li&gt;Wiki&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;When importing a project all references to pull requests and issues are
preserved and so is the access level (public&#x2F;private).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;import&#x2F;bitbucket.html&quot;&gt;Read the docs on the Bitbucket importer&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;global-git-hooks&quot;&gt;Global Git Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;If you want to enforce rules and triggers based on Git pushes and their
contents, you have been able to use custom Git hooks in GitLab. But if you
want to standardize on these rules, you&#x27;d have to copy and paste them
to every new project.&lt;&#x2F;p&gt;

&lt;p&gt;With Global Git Hooks you can now create Git hooks that will be run
for each project on the GitLab instance. This should make it much easier
to set up rules that you want all incoming code to comply with.&lt;&#x2F;p&gt;

&lt;p&gt;Create the hooks in &lt;code&gt;hooks&#x2F;&amp;lt;hook_name&amp;gt;.d&#x2F;&lt;&#x2F;code&gt; directory or tell GitLab Shell where the directories are.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;server_hooks.html&quot;&gt;See the documentation on Custom Hooks&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;chained-custom-git-hooks&quot;&gt;Chained Custom Git Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;If you have set up custom Git hooks, the order might matter: when an initial
hook fails, there is no point in moving forward. With Chained Custom Hooks
hooks will execute in lexical order, failing on the first failing script.&lt;&#x2F;p&gt;

&lt;p&gt;This means you can create hooks &lt;code&gt;1-hook.sh&lt;&#x2F;code&gt; and &lt;code&gt;2-hook.sh&lt;&#x2F;code&gt; and you&#x27;ll know that
&lt;code&gt;1&lt;&#x2F;code&gt; will execute before &lt;code&gt;2&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This gives a lot of power to your hooks and allows endless customization of
what happens when a commit is about to land in your GitLab project.&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;server_hooks.html#chained-hooks-support&quot;&gt;custom git hooks documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to both Elan Ruusamäe and Dirk Hörner for both helping to define Global Git Hooks and this feature, and providing the implementation!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ldap-group-membership-overrides-ee&quot;&gt;LDAP Group membership overrides (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab EE, you can sync any LDAP group with any GitLab group and give
everyone automatically a certain permission. For instance, you
can give everyone in the LDAP group &lt;code&gt;developers&lt;&#x2F;code&gt; the &lt;code&gt;Developer&lt;&#x2F;code&gt;
permission level. New developers just have to be added to the LDAP
group and GitLab will take care of giving them access automatically.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.15, this has become even more powerful. In addition to the
automatically synced permissions, you can now override this permission
per user. This should make it easier to manage complex permissions across
groups and projects.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;ldap_overrides.gif&quot; alt=&quot;Override LDAP permissions in GitLab 8.15 EE&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;slack-chatops&quot;&gt;Slack Chatops&lt;&#x2F;h2&gt;

&lt;p&gt;After bringing Chatops to GitLab with &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#chat-commands-experimental&quot;&gt;our Mattermost integration&lt;&#x2F;a&gt;,
we&#x27;re now doing the same for everyone using Slack! This
means you can create, show and search for issues straight from Slack. Super
convenient to bridge that gap from a casual conversation to an actual issue.&lt;&#x2F;p&gt;

&lt;p&gt;In addition, you can actually deploy from and to any environment.
For instance, you can do&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;awesome-website deploy from staging to production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;And GitLab will deploy the latest commit from staging onto master.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;slack.png&quot; alt=&quot;Slack Chatops in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Configure Chatops for Slack in your project services. As always,
we&#x27;re looking forward to see contributions to help expand the power of
chat integration with GitLab!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;one-click-mattermost-configuration&quot;&gt;One-click Mattermost configuration&lt;&#x2F;h2&gt;

&lt;p&gt;Setting up the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#chat-commands-experimental&quot;&gt;awesome Mattermost integration&lt;&#x2F;a&gt; with GitLab has been made
much easier. It&#x27;s a matter of a single click now, as you can see &lt;a href=&quot;https:&#x2F;&#x2F;youtu.be&#x2F;m0nYHPue5RU?t=196&quot;&gt;in the video at 3:16&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;mattermost.png&quot; alt=&quot;Super easy Mattermost configuration in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The Mattermost and Slack integrations allow you to do the same things:
create, show and search for issues and deploy to any environment.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;mattermost_slash_commands.html&quot;&gt;Read the docs on the Mattermost Chatops integration&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;diff-in-notification-emails&quot;&gt;Diff in Notification Emails&lt;&#x2F;h2&gt;

&lt;p&gt;When you get a notification email from a comment on a diff, GitLab will now
send along a bit of the diff, so you have the correct context immediately
available.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;diff_emails.png&quot; alt=&quot;Diffs in Notification emails in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;interface-improvements&quot;&gt;Interface improvements&lt;&#x2F;h2&gt;

&lt;p&gt;Our amazing usability team has been working hard on making GitLab easier to use,
enhancing GitLab&#x27;s personality and improving readability. This release contains
various changes that will make using GitLab more enjoyable!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;fresh-typefaces&quot;&gt;Fresh typefaces!&lt;&#x2F;h3&gt;

&lt;p&gt;To improve readability and cross-OS&#x2F;browser support in GitLab, we have
changed to using system fonts. These fonts are optimized for your platform
and should therefore provide a better experience, independent of where you&#x27;re
viewing GitLab from.&lt;&#x2F;p&gt;

&lt;p&gt;If you want to get a feel of GitLab across platforms, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7545&quot;&gt;check out the original merge request&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;slimmed-down-widths&quot;&gt;Slimmed down widths&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve reduced the max-width for issues and merge requests container in order to
provide a more readable line length. This is the first step for us to correct
the huge line lengths you see throughout GitLab.
Follow our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;13680&quot;&gt;meta issue&lt;&#x2F;a&gt;
as we continue to improve GitLab&#x27;s line length.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unique-labels&quot;&gt;Unique Labels&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve given labels a unique look in order to differentiate them from buttons.
We are continuing work on this to make our
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25518&quot;&gt;labels&lt;&#x2F;a&gt; and
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25564&quot;&gt;status badges&lt;&#x2F;a&gt;
even more consistent in further iterations.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;labels.png&quot; alt=&quot;Unique Labels in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;improved-build-scrolling-and-loading&quot;&gt;Improved Build Scrolling and Loading&lt;&#x2F;h3&gt;

&lt;p&gt;Build scrolling and loading works and looks quite a bit better now:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;build_scroll.gif&quot; alt=&quot;Improved Build Scrolling and Loading in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;smaller-page-size&quot;&gt;Smaller page size&lt;&#x2F;h3&gt;

&lt;p&gt;Between system fonts and improvements to autocomplete, we&#x27;ve reduced the
average page size of any page in GitLab significantly. A given merge request
in the GitLab CE project went from 1800kb to now 718kb!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;improved-empty-states&quot;&gt;Improved empty states&lt;&#x2F;h3&gt;

&lt;p&gt;In order to improve our experience for users who are just getting started with
GitLab, we&#x27;ve added informative and fun empty states to many of our pages
across the application!
View our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15632&quot;&gt;meta issue&lt;&#x2F;a&gt; to
see where we&#x27;ve placed new empty states and feel free to suggest new ones!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;empty.png&quot; alt=&quot;Even empty is beautiful in GitLab 8.15&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;other-changes-and-tweaks&quot;&gt;Other changes and tweaks&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Improved accessibility by adding a focus state to dropdown options&lt;&#x2F;li&gt;
  &lt;li&gt;Added hover states to our primary navigation and tabs throughout the site.&lt;&#x2F;li&gt;
  &lt;li&gt;Improved hover, focus, and active states for buttons &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7797&quot;&gt;!7797&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Added hover states to collapsed items with the issues&#x2F;mr&#x27;s sidebar &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7777&quot;&gt;!7777&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;mathematics-support-for-markdown-and-asciidoc-using-katex&quot;&gt;Mathematics support for Markdown and AsciiDoc, using KaTeX&lt;&#x2F;h2&gt;

&lt;p&gt;Comments and repository files can now contain beautifully-typeset mathematics, using the &lt;a href=&quot;https:&#x2F;&#x2F;khan.github.io&#x2F;KaTeX&#x2F;&quot;&gt;KaTeX&lt;&#x2F;a&gt; library from Khan Academy.&lt;&#x2F;p&gt;

&lt;p&gt;To render inline mathematics, use dollar signs around inline code: &lt;code&gt;$`a^2+b^2=c^2`$&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;To render multiline mathematics, use the &lt;code&gt;math&lt;&#x2F;code&gt; language for the code block:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;```math
a^2+b^2=c^2
```
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;In addition to working for Markdown, this is also available for AsciiDoc documents. &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;markdown.html#math&quot;&gt;Read the documentation on mathematics support.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;math.png&quot; alt=&quot;Beautifully rendered math in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Michael Munch for this feature!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cleaner-merge-commit-messages&quot;&gt;Cleaner merge commit messages&lt;&#x2F;h2&gt;

&lt;p&gt;Previously, merge commit messages included the title and description of the
merge request, and a reference to the merge request. This didn&#x27;t read well when
using &lt;code&gt;git log&lt;&#x2F;code&gt; and similar tools, because merge request descriptions often
contain requests for review, screenshots, and other details incidental to the
code change.&lt;&#x2F;p&gt;

&lt;p&gt;Now, the default merge commit message is in the following format:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;Merge branch &#x27;$SOURCE_BRANCH&#x27; into &#x27;$TARGET_BRANCH&#x27;

$TITLE

Closes $CLOSING_ISSUE_REFERENCES # only present if the MR closes issues

See merge request $MERGE_REQUEST_REFERENCE
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The previous default message is available as an option when customizing the
merge commit message.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Gabriel Gizotti!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;shorthand-cross-project-references-in-gitlab-flavored-markdown&quot;&gt;Shorthand cross-project references in GitLab Flavored Markdown&lt;&#x2F;h2&gt;

&lt;p&gt;Previously, a reference to something in another project always included the
namespace, even if the project was in the same namespace.&lt;&#x2F;p&gt;

&lt;p&gt;Now, shorthand references are available. So from within the
&lt;code&gt;gitlab-org&#x2F;gitlab-ce&lt;&#x2F;code&gt; project, you can refer to issue #1 in GitLab Workhorse
by writing &lt;code&gt;gitlab-workhorse#1&lt;&#x2F;code&gt; instead of &lt;code&gt;gitlab-org&#x2F;gitlab-workhorse#1&lt;&#x2F;code&gt;,
saving precious keystrokes!&lt;&#x2F;p&gt;

&lt;p&gt;For more information, see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;markdown.html#special-gitlab-references&quot;&gt;special GitLab references&lt;&#x2F;a&gt; section of our Markdown documentation.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Oswaldo Ferreira!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;create-an-issue-with-unresolved-discussion-from-a-merge-request&quot;&gt;Create an issue with unresolved discussion from a merge request&lt;&#x2F;h2&gt;

&lt;p&gt;In 8.14, we &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;#prevent-merge-until-review-is-done&quot;&gt;added the ability to block a merge when there are unresolved discussions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Now, we have added an option to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;discussions&#x2F;index.html#move-all-unresolved-discussions-in-a-merge-request-to-an-issue&quot;&gt;create a new issue from the unresolved discussions in a merge request&lt;&#x2F;a&gt;, and resolve those discussions at the same time! This is perfect for those cases where you need to merge something now, but don&#x27;t want to forget about the code review comments.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Bob van Landuyt!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;manual-actions-from-the-pipeline-graph&quot;&gt;Manual Actions from the Pipeline Graph&lt;&#x2F;h2&gt;

&lt;p&gt;Manual actions allow you to require manual interaction before moving
forward with a particular job in CI. Your entire pipeline can run
automatically, but the actual deploy to production will require a click.&lt;&#x2F;p&gt;

&lt;p&gt;You can do this straight from the pipeline graph. Just click on the play
button to execute that particular job.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;manual_actions_graph.png&quot; alt=&quot;Manual actions on the pipeline graph&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-activities-api&quot;&gt;User Activities API&lt;&#x2F;h2&gt;

&lt;p&gt;To quickly get an idea of when a user last interacted with GitLab,
we&#x27;ve added a special admin-only API to GitLab that allows you to get
the last activity timestamp of every user on the instance.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;users.html#get-user-activities-admin-only&quot;&gt;Find the details in the docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sort-project-and-group-members&quot;&gt;Sort Project and Group members&lt;&#x2F;h2&gt;

&lt;p&gt;You can now find people in projects and groups more easily by sorting them
by name, access level and date of joining.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_15&#x2F;sort_members.png&quot; alt=&quot;Easily find people in projects and groups in GitLab 8.15&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-changes&quot;&gt;API Changes&lt;&#x2F;h2&gt;

&lt;p&gt;Every month we make many additions to our API. Here are the highlights
for GitLab 8.15:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Allow some Project API GET endpoints to be requested anonymously&lt;&#x2F;li&gt;
  &lt;li&gt;Allow Repositories &amp;amp; Files API GET endpoints to be requested anonymously&lt;&#x2F;li&gt;
  &lt;li&gt;Allow some Tag API GET endpoints to be requested anonymously&lt;&#x2F;li&gt;
  &lt;li&gt;Add scopes for personal access tokens and OAuth tokens&lt;&#x2F;li&gt;
  &lt;li&gt;Add ability to cherry pick a commit (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Add ability to unshare a project from a group (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Add ability to set &lt;code&gt;should_remove_source_branch&lt;&#x2F;code&gt; on merge requests (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Add simple representation of group&#x27;s projects (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Expose committer details for commits (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Expose merge status for branch API (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Expose personal snippets as &#x2F;snippets (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Expose pipeline coverage&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab-package-changes&quot;&gt;Omnibus GitLab package changes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;postgresql-version-upgrade&quot;&gt;PostgreSQL version upgrade&lt;&#x2F;h3&gt;

&lt;p&gt;Starting last month with GitLab 8.14 omnibus-gitlab package, we are providing a
way to upgrade the PostgreSQL database version.&lt;&#x2F;p&gt;

&lt;p&gt;The current version of PostgreSQL we are packaging (9.2.18) is slowly
approaching its EOL. Due to the &lt;a href=&quot;https:&#x2F;&#x2F;www.postgresql.org&#x2F;support&#x2F;versioning&#x2F;&quot;&gt;PostgreSQL versioning policy&lt;&#x2F;a&gt;,
upgrades between major releases require downtime and the use of the &lt;code&gt;pg_upgrade&lt;&#x2F;code&gt; tool.&lt;&#x2F;p&gt;

&lt;p&gt;For this purpose, we are packaging the newest available PostgreSQL version (9.6.1).
We are also introducing &lt;code&gt;gitlab-ctl pg-upgrade&lt;&#x2F;code&gt; tool which should make this
transition as painless as possible.
When upgrading to GitLab 8.15, this &lt;em&gt;action will not be run automatically&lt;&#x2F;em&gt;.
This will allow you to plan the database upgrade downtime.&lt;&#x2F;p&gt;

&lt;p&gt;After version 9.0 is released, we plan on setting the PostgreSQL version 9.6 as
default so please make sure that you plan your upgrade before that release.
We&#x27;re expecting to ship GitLab 9.0 on or after February 22nd.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;database.html#upgrade-packaged-postgresql-server&quot;&gt;Read more about database upgrade in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Ran into issues? Create an issue at the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&quot;&gt;omnibus-gitlab issue tracker&lt;&#x2F;a&gt;,
and reference it in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1783&quot;&gt;upgrade problems meta issue.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;performance-improvements&quot;&gt;Performance Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab CE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Retrieving commit counts has been improved for certain cases: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7668&quot;&gt;!7668&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Polling intervals have been adjusted to reduce system load: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7762&quot;&gt;!7762&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Refreshing authorized projects is done in a smarter way to reduce database load: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7956&quot;&gt;!7956&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The most recent commit ID for a path is now cached: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8098&quot;&gt;!8098&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab EE:&lt;&#x2F;p&gt;

&lt;p&gt;GitLab EE now ships with a command called &lt;code&gt;sidekiq-cluster&lt;&#x2F;code&gt;. This command can be used to start extra Sidekiq workers that process only a limited number of queues. This feature can be used to process queues that receive a lot of jobs, without it affecting other parts of Sidekiq. This was added in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;922&quot;&gt;922&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This command is not yet used by Omnibus, our goal is to add this in 8.16.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-runner-19&quot;&gt;GitLab Runner 1.9&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.9 today. Some highlights:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Add a retry mechanism to prevent failed clones in builds &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;399&quot;&gt;!399&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add Kubernete Node Selector &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;328&quot;&gt;!328&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Push prebuilt images to dockerhub &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;420&quot;&gt;!420&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Use prebuilt containers with Kubernetes executor &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;425&quot;&gt;!425&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add path and share cache settings for S3 cache &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;423&quot;&gt;!423&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Split prepare stage to be: prepare, git_clone, restore_cache, download_artifacts &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;406&quot;&gt;!406&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Introduce docker.Client timeouts &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;411&quot;&gt;!411&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Allow network-sourced variables to specify that they should be files &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;413&quot;&gt;!413&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix docker hanging for docker-engine 1.12.4 &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;415&quot;&gt;!415&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add pprof HTTP endpoints to metrics server &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;398&quot;&gt;!398&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add a multiple prometheus metrics: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;401&quot;&gt;!401&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;To see the full list of all changes please read &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;v1.9.0&#x2F;CHANGELOG.md&quot;&gt;the Runner&#x27;s CHANGELOG file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost-351&quot;&gt;GitLab Mattermost 3.5.1&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.15 includes &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;&quot;&gt;Mattermost 3.5.1&lt;&#x2F;a&gt;, an open
source Slack-alternative providing workplace messaging for web, PC and phone
with archiving and search. Improvements this month include new &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;mattermost-december-2016-update&#x2F;&quot;&gt;Xen Orchestra and Homebrew integrations, plus upgraded Desktop Apps for Windows, Mac and Linux&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This version includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt; and upgrade from earlier versions is recommended.&lt;&#x2F;p&gt;

&lt;p&gt;Mattermost 3.5.1 was included in GitLab 8.14.1, so anyone on GitLab 8.14.1 or
later should have the patch already.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;To upgrade to GitLab 8.15, downtime is required. Larger instances (&amp;gt;1000 users)
should expect about 15 minutes of downtime.&lt;&#x2F;p&gt;

&lt;p&gt;The specific migrations requiring downtime are described below.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Columns with default values are added, this process may take some time depending on the number of rows in these tables&lt;&#x2F;li&gt;
  &lt;li&gt;Some indexes are added concurrently, which does not require downtime but may take some time to complete&lt;&#x2F;li&gt;
  &lt;li&gt;The environments table is cleaned up, and a new column is added with a generated default value (this could take some time depending on the number of environments)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_15&#x2F;pic.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14.5, 8.13.10, and 8.12.13 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/14/gitlab-8-dot-14-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/14/gitlab-8-dot-14-dot-5-released/</id>
<published>2016-12-14T19:00:00+00:00</published>
<updated>2016-12-14T19:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.14.5, 8.13.10, and 8.12.13 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we recommend that all
affected GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;security-fixes-in-8145-81310-and-81213&quot;&gt;Security fixes in 8.14.5, 8.13.10 and 8.12.13&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix missing Note access checks in by moving Note#search to updated NoteFinder (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23867&quot;&gt;#23867&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Filter &lt;code&gt;incoming_email_token&lt;&#x2F;code&gt; and &lt;code&gt;runners_token&lt;&#x2F;code&gt; parameters (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25687&quot;&gt;#25687&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;security-fixes-in-8145-and-81310&quot;&gt;Security fixes in 8.14.5 and 8.13.10&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Issue#visible_to_user moved to IssuesFinder (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;24637&quot;&gt;#24637&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;other-fixes-in-8145-81213-and-81310&quot;&gt;Other fixes in 8.14.5, 8.12.13 and 8.13.10&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; API: Memoize the current_user so that the sudo can work properly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8017&quot;&gt;!8017&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;other-fixes-in-8145&quot;&gt;Other fixes in 8.14.5&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;Omnibus GitLab&lt;&#x2F;strong&gt;: Add attribute client_output_buffer_limit_slave for redis (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1147&quot;&gt;!1147&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove &#x27;Leave Project&#x27; and &#x27;Leave Group&#x27; from settings dropdowns (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7600&quot;&gt;!7600&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix display hook error message (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7775&quot;&gt;!7775&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Shows group members in the project members list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7899&quot;&gt;!7899&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Correct autocomplete for values with special characters (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7910&quot;&gt;!7910&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove wrong &#x27;.builds-feature&#x27; class from the MR settings fieldset (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7930&quot;&gt;!7930&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Avoid escaping relative links in Markdown twice (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7940&quot;&gt;!7940&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow branch names with dots on API endpoint (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7963&quot;&gt;!7963&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed timeago re-rendering every element (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7969&quot;&gt;!7969&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use a single query in Projects::ProjectMembersController to fetch members (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7997&quot;&gt;!7997&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Displays milestone remaining days only when it&#x27;s present (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7998&quot;&gt;!7998&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Crontab typo for PruneOldEventsWorker to run 4x&#x2F;day instead of 60x&#x2F;hour (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8051&quot;&gt;!8051&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Encode when migrating ProcessCommitWorker jobs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8064&quot;&gt;!8064&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Updates the docs to require GitLab Shell 4.0.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;8050&quot;&gt;!8050&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix milestone total weight is missing on the milestone page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;944&quot;&gt;!944&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove wrong &#x27;.builds-feature&#x27; class from the MR settings fieldset (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;947&quot;&gt;!947&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Group members in project members view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;958&quot;&gt;!958&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do include a single migration, and will require brief
downtime of typically less than one minute.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14.4, 8.13.9, and 8.12.12 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/08/gitlab-8-dot-14-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/08/gitlab-8-dot-14-dot-4-released/</id>
<published>2016-12-08T19:00:00+00:00</published>
<updated>2016-12-08T19:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.14.4, 8.13.9, and 8.12.12 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain important security fixes, and we &lt;strong&gt;strongly
recommend&lt;&#x2F;strong&gt; that all affected GitLab installations be upgraded to one of these
versions &lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;security-fixes-in-8144-8139-and-81212&quot;&gt;Security fixes in 8.14.4, 8.13.9 and 8.12.12&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Replace MR access checks with use of &lt;code&gt;MergeRequestsFinder&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23867&quot;&gt;#23867&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;security-fixes-in-8144&quot;&gt;Security fixes in 8.14.4&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Destroy a user&#x27;s session when they delete their account. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25015&quot;&gt;#25015&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Filter authentication tokens from Sentry output.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; XSS when &lt;code&gt;LegacyDiffNote&lt;&#x2F;code&gt; is created on a merge request diff containing HTML (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25249&quot;&gt;#25249&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Thanks to Kristiyan Bogdanov via HackerOne.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;other-fixes-in-8144&quot;&gt;Other fixes in 8.14.4&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipeline author for Slack and use pipeline id for pipeline link (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7506&quot;&gt;!7506&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Highlighting lines is broken&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7090&quot;&gt;!7090&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipelines tabs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7709&quot;&gt;!7709&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix compatibility with Internet Explorer 11 for merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7525&quot;&gt;!7525&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Authorize users into imported GitLab project (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7936&quot;&gt;!7936&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove caching of Repository#has_visible_content? (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7947&quot;&gt;!7947&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump gitlab-shell version to 4.0.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7953&quot;&gt;!7953&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Prevent remote mirrors from failing when project is in pending_delete (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;938&quot;&gt;!938&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do include a single migration, and will require brief
downtime of typically less than one minute.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14 webcast recording &amp; highlights</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/08/gitlab-8-14-webcast/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/08/gitlab-8-14-webcast/</id>
<published>2016-12-08T10:33:00+00:00</published>
<updated>2016-12-08T10:33:00+00:00</updated>
<author>
<name>Erica Lindberg</name>
</author>
<content type='html'>&lt;p&gt;On 22 October we released &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;&quot;&gt;GitLab 8.14&lt;&#x2F;a&gt;, our 60th consecutive monthly release. In this webcast, GitLab&#x27;s Head of Product &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;MarkPundsack&quot;&gt;Mark Pundsack&lt;&#x2F;a&gt; and Product Manager &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;djaiss&quot;&gt;Régis Freyd&lt;&#x2F;a&gt; show off what&#x27;s new, including live demos of Time Tracking Beta (EE), Mattermost Chat
Commands, and &lt;a href=&quot;&#x2F;2016&#x2F;11&#x2F;22&#x2F;introducing-review-apps&#x2F;&quot;&gt;Review Apps&lt;&#x2F;a&gt;. Watch the recording and get the highlights below.&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
&lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;CteZol_7pxo&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h2 id=&quot;highlights&quot;&gt;Highlights&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;0121-introduction-to-git-and-gitlab&quot;&gt;[01:21] Introduction to Git and GitLab&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;0407-gitlabs-idea-to-production-vision&quot;&gt;[04:07] GitLab&#x27;s Idea to Production Vision&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;0610-time-tracking-beta-ee&quot;&gt;[06:10] Time Tracking Beta (EE)&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Recording time has always been painful. You have to use many different systems, and even then, you don&#x27;t get a complete picture because your work is in one place, and your time tracking data in another. This is why we&#x27;ve decided to release Time Tracking in Beta in 8.14.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;1218-mattermost-chat-commands&quot;&gt;[12:18] Mattermost Chat Commands&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Team communication has changed, more and more ideas are first discussed in chat. GitLab wants to make it easier for you to get your ideas from chat into GitLab issues where they can be acted on.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;1540-review-apps&quot;&gt;[15:40] Review Apps&lt;&#x2F;h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Review Apps are the future of reviewing work! Rather than just looking at code, Review Apps serve up a fully functioning environment where your app is running, so you get a live preview of every branch and merge request. It’s perfect for testing complex changes where looking at the code isn’t enough.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;3350-other-improvements--whats-next&quot;&gt;[33:50] Other improvements &amp;amp; what&#x27;s next&lt;&#x2F;h3&gt;

&lt;h2 id=&quot;upcoming-live-streams&quot;&gt;Upcoming Live Streams&lt;&#x2F;h2&gt;

&lt;h2 id=&quot;1-monitoring-distributed-systems-with-prometheus&quot;&gt;1. Monitoring Distributed Systems with Prometheus&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=WzAzm0C15W8&quot;&gt;Watch live&lt;&#x2F;a&gt; on December 14 at 9am PT&#x2F;5pm GMT. &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;20161207_PrometheusWebcast_LandingPage.html&quot;&gt;Sign up to receive a reminder and the recording&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Infrastructure Lead Pablo Carranza will give a behind-the-scenes look at GitLab&#x27;s Prometheus set up, explain how we plan to ship Prometheus with GitLab CE, and give a tutorial on how you can set up your own dashboard. A live chat Q&amp;amp;A will follow the presentation.
For more information on the topic, read Pablo&#x27;s &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;11&#x2F;10&#x2F;why-choose-bare-metal&#x2F;&quot;&gt;blog post on how we knew it was time to leave the cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;2-introducing-the-codeship-gitlab-integration&quot;&gt;2. Introducing the Codeship GitLab Integration&lt;&#x2F;h2&gt;

&lt;p&gt;Hosted by &lt;a href=&quot;http:&#x2F;&#x2F;bit.ly&#x2F;2g2jFjG&quot;&gt;Codeship&lt;&#x2F;a&gt; on December 15 at 9am PT&#x2F;6pm GMT. &lt;a href=&quot;http:&#x2F;&#x2F;bit.ly&#x2F;2g2jFjG&quot;&gt;Register here&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Following &lt;a href=&quot;https:&#x2F;&#x2F;blog.codeship.com&#x2F;codeship-launches-gitlab-support&#x2F;&quot;&gt;Codeship&#x27;s announcement&lt;&#x2F;a&gt;, GitLab&#x27;s Mark Pundsack will join Codeship Senior Software Engineer Kyle Rames for a discussion on why Codeship built a GitLab integration and showcase a demo alongside Codeship&#x27;s Docker Platform.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;3-designing-gitlabs-user-experience-with-ux-lead-allison-whilden&quot;&gt;3. Designing GitLab&#x27;s User Experience with UX Lead Allison Whilden&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Lxy1jET5pww&quot;&gt;Watch live&lt;&#x2F;a&gt; on December 15 at 10am PT&#x2F;6pm GMT. &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;UXLiveStream_LandingPage.html&quot;&gt;Sign up to receive a reminder and the recording&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;User experience (UX) affects every interaction a user has with a product. Because of this, it can make or break the adoption of a website, or application. UX designers have to do dig into the who, the what, the why, and the how of everything that happens within a platform.
How does GitLab&#x27;s UX address the needs of many different types of users in a product that expands every month? Join GitLab&#x27;s UX Lead, Allison Whilden, and her team, as they discuss their process, the big challenges they face and how they solve them.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;4-prometheus-and-gitlab-completing-the-application-lifecycle-with-monitoring&quot;&gt;4. Prometheus and GitLab: Completing the application lifecycle with monitoring&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=rT92jecagQo&quot;&gt;Watch live&lt;&#x2F;a&gt; on December 15 at 1:30pm PT&#x2F;9:30pm GMT.&lt;&#x2F;p&gt;

&lt;p&gt;Tune in for this live broadcast with GitLab CEO &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;sytses&quot;&gt;Sid Sijbrandij&lt;&#x2F;a&gt; and Head of Product Mark Pundsack as
they share our future plans for GitLab and Prometheus.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;em&gt;Prometheus is not just for monitoring GitLab. It is not an optional feature. It is an essential part of deploying applications with GitLab. All GitLab users should have access to it to monitor the impact of their deployments to business&#x2F;application&#x2F;system metrics and do feature flags&#x2F;ab-testing&#x2F;etc.&lt;&#x2F;em&gt; - Sid Sijbrandij&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;!-- identifiers --&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14.3, 8.13.8, and 8.12.11 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/05/cve-2016-9469/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/05/cve-2016-9469/</id>
<published>2016-12-05T23:59:00+00:00</published>
<updated>2016-12-05T23:59:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.14.3, 8.13.8, and 8.12.11 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix for a critical
denial-of-service and data corruption vulnerability, and we &lt;strong&gt;strongly
recommend&lt;&#x2F;strong&gt; that all affected GitLab installations be upgraded to one of these
versions &lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;denial-of-service-and-data-corruption-vulnerability-in-issue-and-merge-request-trackers&quot;&gt;Denial-of-Service and Data Corruption Vulnerability in Issue and Merge Request Trackers&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported a critical vulnerability
in the GitLab Issue and Merge Request trackers that could allow a user with
access to any project to delete all issues and merge requests from all GitLab
projects. For GitLab instances with publicly available projects this vulnerability
could be exploited by an unauthenticated user.&lt;&#x2F;p&gt;

&lt;p&gt;This issue is the result of un-sanitized user input being passed to an internal
function that expects only trusted data. This code was introduced in GitLab
8.13.0. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;25064&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-9469&quot;&gt;CVE-2016-9469&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;8.14.0 through 8.14.2&lt;&#x2F;li&gt;
  &lt;li&gt;8.13.0 through 8.13.7&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab installation
against this vulnerability using one of the workarounds outlined below until you
have time to upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;You only need to apply &lt;em&gt;one&lt;&#x2F;em&gt; of these workarounds.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;securing-via-omnibus-configuration&quot;&gt;Securing via Omnibus configuration&lt;&#x2F;h3&gt;

&lt;p&gt;For Omnibus installations using the bundled Nginx web server, edit
&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; and add the following line:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;nginx&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;custom_gitlab_server_config&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;if ($args ~* &#x27;state=delete|state=destroy&#x27;) { return 404; }&lt;&#x2F;span&gt;&lt;span class=&quot;se&quot;&gt;\n&lt;&#x2F;span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Then run &lt;code&gt;sudo gitlab-ctl reconfigure&lt;&#x2F;code&gt; for the changes to take effect.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;securing-via-web-server-configuration&quot;&gt;Securing via web server configuration&lt;&#x2F;h3&gt;

&lt;p&gt;If you are using an external web server with Omnibus or have installed GitLab
from source, add the following lines to your web server&#x27;s configuration file.&lt;&#x2F;p&gt;

&lt;p&gt;For Nginx:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight nginx&quot;&gt;&lt;code&gt;&lt;span class=&quot;k&quot;&gt;if&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;(&lt;&#x2F;span&gt;&lt;span class=&quot;nv&quot;&gt;$args&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;~&lt;&#x2F;span&gt;&lt;span class=&quot;sr&quot;&gt;*&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;&#x27;state=delete|state=destroy&#x27;)&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;{&lt;&#x2F;span&gt; &lt;span class=&quot;kn&quot;&gt;return&lt;&#x2F;span&gt; &lt;span class=&quot;mi&quot;&gt;403&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;;&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;}&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;For Apache with mod_rewrite:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight apache&quot;&gt;&lt;code&gt; &lt;span class=&quot;nc&quot;&gt;RewriteEngine&lt;&#x2F;span&gt; On
 &lt;span class=&quot;nc&quot;&gt;RewriteCond&lt;&#x2F;span&gt; %{QUERY_STRING} ^.*(state=destroy).* [NC,OR]
 &lt;span class=&quot;nc&quot;&gt;RewriteCond&lt;&#x2F;span&gt; %{QUERY_STRING} ^.*(state=delete).* [NC]
 &lt;span class=&quot;nc&quot;&gt;RewriteRule&lt;&#x2F;span&gt; ^(.*)$ - [F,L]
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Then reload the server for changes to take effect.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;securing-via-haproxy-configuration&quot;&gt;Securing via HAProxy configuration&lt;&#x2F;h3&gt;

&lt;p&gt;Add the following lines to your configuration and restart the service:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;acl bad_filter_uri path_sub,url_dec -i state=destroy state=delete
http-request deny if bad_filter_uri
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h3 id=&quot;securing-via-patch&quot;&gt;Securing via patch&lt;&#x2F;h3&gt;

&lt;p&gt;To temporarily patch just the critical vulnerability, apply the following diff:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight diff&quot;&gt;&lt;code&gt;&lt;span class=&quot;gh&quot;&gt;diff --git a&#x2F;app&#x2F;finders&#x2F;issuable_finder.rb b&#x2F;app&#x2F;finders&#x2F;issuable_finder.rb
index e42d5af..2c9412b 100644
&lt;&#x2F;span&gt;&lt;span class=&quot;gd&quot;&gt;--- a&#x2F;app&#x2F;finders&#x2F;issuable_finder.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+++ b&#x2F;app&#x2F;finders&#x2F;issuable_finder.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gu&quot;&gt;@@ -7,7 +7,7 @@
&lt;&#x2F;span&gt; #   current_user - which user use
 #   params:
 #     scope: &#x27;created-by-me&#x27; or &#x27;assigned-to-me&#x27; or &#x27;all&#x27;
&lt;span class=&quot;gd&quot;&gt;-#     state: &#x27;open&#x27; or &#x27;closed&#x27; or &#x27;all&#x27;
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+#     state: &#x27;opened&#x27; or &#x27;closed&#x27; or &#x27;all&#x27;
&lt;&#x2F;span&gt; #     group_id: integer
 #     project_id: integer
 #     milestone_title: string
&lt;span class=&quot;gu&quot;&gt;@@ -183,10 +183,13 @@ class IssuableFinder
&lt;&#x2F;span&gt;   end

   def by_state(items)
&lt;span class=&quot;gd&quot;&gt;-    params[:state] ||= &#x27;all&#x27;
-
-    if items.respond_to?(params[:state])
-      items.public_send(params[:state])
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+    case params[:state].to_s
+    when &#x27;closed&#x27;
+      items.closed
+    when &#x27;merged&#x27;
+      items.respond_to?(:merged) ? items.merged : items.closed
+    when &#x27;opened&#x27;
+      items.opened
&lt;&#x2F;span&gt;     else
       items
     end

&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h3 id=&quot;verifying-the-workaround&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Browse to a project&lt;&#x2F;li&gt;
  &lt;li&gt;Open the project&#x27;s issue tracker&lt;&#x2F;li&gt;
  &lt;li&gt;Choose the &quot;closed&quot; tab&lt;&#x2F;li&gt;
  &lt;li&gt;Adjust the &quot;state&quot; field in your browser&#x27;s address bar to &quot;deleteme&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;Verify you receive a &lt;code&gt;403 Forbidden&lt;&#x2F;code&gt; error&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;Note: If you only applied the patch you will receive no errors here.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-security-patch&quot;&gt;Git Security Patch&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for these versions contain a security patch for git 2.7.4 that
prevents malicious repositories from using HTTP redirects to steal or corrupt
data. More information on this patch can be found &lt;a href=&quot;http:&#x2F;&#x2F;public-inbox.org&#x2F;git&#x2F;20161201090336.xjbb47bublfcpglo@sigill.intra.peff.net&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-fixes-in-8143&quot;&gt;Other fixes in 8.14.3&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Revert signin tab order fix. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7538&quot;&gt;!7538&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow dots in group names to pass validation for Create Group and Edit Group forms (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7723&quot;&gt;!7723&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pass commit data to ProcessCommitWorker (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7744&quot;&gt;!7744&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Merge request dashboard page takes over a minute to load&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7760&quot;&gt;!7760&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GitHub importer to import PR where source repo&#x2F;fork was renamed&#x2F;deleted (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7865&quot;&gt;!7865&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix URL rewritting in the Help section (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7875&quot;&gt;!7875&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes ActionView::Template::Error: undefined method &lt;code&gt;text?&lt;&#x2F;code&gt; for nil:NilClass (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7893&quot;&gt;!7893&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Save some queries on issuable dashboard. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;935&quot;&gt;!935&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Expose add-ons associated to the license in &#x2F;license endpoint. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;907&quot;&gt;!907&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do include a single migration, and will require brief
downtime of typically less than one minute.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Building GitLab Recap &amp; Recording</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/05/building-gitlab-office-hours/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/05/building-gitlab-office-hours/</id>
<published>2016-12-05T00:00:00+00:00</published>
<updated>2016-12-05T00:00:00+00:00</updated>
<author>
<name>Erica Lindberg</name>
</author>
<content type='html'>
&lt;p&gt;Following the release of &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;&quot;&gt;GitLab 8.14&lt;&#x2F;a&gt;, VP of Product &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;Jobvo&quot;&gt;Job van der Voort&lt;&#x2F;a&gt;
hosted a YouTube live stream to discuss how our team is working to realize GitLab&#x27;s vision and
some of the awesome features we just released. Check out the video and highlights below.&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;njP8Wvp45o0&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt;&lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h2 id=&quot;highlights&quot;&gt;Highlights&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;107-gitlabs-vision&quot;&gt;1:07 GitLab&#x27;s Vision&lt;&#x2F;h3&gt;

&lt;p&gt;&quot;When we &lt;a href=&quot;&#x2F;2016&#x2F;09&#x2F;13&#x2F;gitlab-master-plan&#x2F;&quot;&gt;announced our series B round in September&lt;&#x2F;a&gt;, we said, &quot;Ok, what we&#x27;re going to do is we&#x27;re going to try
and ship the whole &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;university&#x2F;training&#x2F;gitlab_flow.html&quot;&gt;GitLab flow&lt;&#x2F;a&gt;, going from idea all the way to production and we&#x27;re going to ship it by the end of the year.&quot;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;242-what-is-review-apps&quot;&gt;2:42 What is Review Apps?&lt;&#x2F;h3&gt;

&lt;p&gt;&quot;When you do a merge request, let&#x27;s say you have some change you want to make on the website.
In the past, you would create a merge request and then somebody would check out the code; maybe
you have &lt;a href=&quot;&#x2F;features&#x2F;continuous-integration&#x2F;&quot;&gt;continuous integration&lt;&#x2F;a&gt; running automatically to see if those tests past. Now, if
you wanted to actually &lt;em&gt;see&lt;&#x2F;em&gt; the changes, and play around with them, you would still have to
checkout the branch for the merge request locally and run it to your local development environment.&lt;&#x2F;p&gt;

&lt;p&gt;With &lt;a href=&quot;&#x2F;2016&#x2F;11&#x2F;22&#x2F;introducing-review-apps&#x2F;&quot;&gt;Review Apps&lt;&#x2F;a&gt;, what happens is that rather than you having to do anything,
on every single merge request we automatically create a new environment. In that environment,
we run a full, live environment.&quot;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;457-time-tracking-beta-released-for-gitlab-enterprise-edition&quot;&gt;4:57 Time Tracking Beta released for GitLab Enterprise Edition&lt;&#x2F;h3&gt;

&lt;p&gt;&quot;What you can do with GitLab 8.14 Enterprise Edition is you can set - for each issue
that you&#x27;re working on - an estimate and you can set how you are spent your time.
You don&#x27;t even need to do this all at once. You can just set an estimate at the beginning,
and as you spend time, you can just type a comment with a slash command for time spent.&quot;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;704-mattmost-chat-commands&quot;&gt;7:04 Mattmost Chat Commands&lt;&#x2F;h3&gt;

&lt;p&gt;&quot;As the whole world started hanging out in chat, we wanted to bridge the gap
from chat to GitLab. In GitLab 8.14, for the first time we released chat slash
commands.&quot;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;850-but-wait-theres-more&quot;&gt;8:50 But wait, there&#x27;s more&lt;&#x2F;h3&gt;

&lt;p&gt;&quot;There&#x27;s a few small feautures that we added that I think are extremely cool.&quot;
(Seriously, go find out!)&lt;&#x2F;p&gt;

&lt;h3 id=&quot;1023-ask-me-anything&quot;&gt;10:23 Ask me anything&lt;&#x2F;h3&gt;

&lt;p&gt;10:38 Is there a mobile handbook of GitLab for the Kindle?&lt;&#x2F;p&gt;

&lt;p&gt;11:02 What are your thoughts on the short term possibilities of NLP, chat,
Conversational Development, and local development data sets?&lt;&#x2F;p&gt;

&lt;p&gt;12:38 How do you decide what to work on each release?&lt;&#x2F;p&gt;

&lt;p&gt;15:29 Feature proposal to improve labels and issues&lt;&#x2F;p&gt;

&lt;p&gt;18:40 What kind of data do you receive from on-premise GitLab instances? What kind of
data insights can you obtain from this group of users?&lt;&#x2F;p&gt;

&lt;p&gt;21:22 Are there any downsides of only planning a few months ahead?&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upcoming-live-streams&quot;&gt;Upcoming Live Streams&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blogimages&#x2F;facebook-inside-gitlab-webcast-ad.png&quot; alt=&quot;Inside GitLab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;1-why-we-chose-vuejs&quot;&gt;1. Why We Chose Vue.js&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=ioogrvs2Ejc&quot;&gt;Watch the recording&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;A couple of months ago, &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jakecodes&quot;&gt;Jacob Schatz&lt;&#x2F;a&gt;, Front End Lead at GitLab, published a post
detailing &lt;a href=&quot;&#x2F;2016&#x2F;10&#x2F;20&#x2F;why-we-chose-vue&#x2F;&quot;&gt;why we chose Vue.js&lt;&#x2F;a&gt; as our JavaScript framework. Since,
this post has spurred tons of conversation on the topic. To facilitate the conversation
further, GitLab Front End engineer Phil Hughes presented a front end update
and host a Q&amp;amp;A session along with Jacob.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;2-monitoring-distributed-systems-with-prometheus&quot;&gt;2. Monitoring Distributed Systems with Prometheus&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=WzAzm0C15W8&quot;&gt;Watch live&lt;&#x2F;a&gt; on &lt;strong&gt;December 14 at 9am PT&#x2F;5pm GMT.&lt;&#x2F;strong&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;20161207_PrometheusWebcast_LandingPage.html&quot;&gt;Sign up to receive a reminder and the recording.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Infrastructure Lead &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;psczg&quot;&gt;Pablo Carranza&lt;&#x2F;a&gt; will give a behind-the-scenes
look at GitLab&#x27;s Prometheus set up, explain how we plan to ship Prometheus with
GitLab CE, and give a tutorial on how you can set up your own dashboard.
A live chat Q&amp;amp;A will follow the presentation. See more details and sign up for
a reminder &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;20161207_PrometheusWebcast_LandingPage.html&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For more information on the topic, read Pablo&#x27;s blog post on &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;11&#x2F;10&#x2F;why-choose-bare-metal&#x2F;&quot;&gt;how we knew it was time to leave the cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;3-designing-gitlabs-user-experience-with-ux-lead-allison-whilden&quot;&gt;3. Designing GitLab&#x27;s User Experience with UX Lead Allison Whilden&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=Lxy1jET5pww&quot;&gt;Watch live&lt;&#x2F;a&gt; on &lt;strong&gt;December 15 at 10am PT&#x2F;6pm GMT.&lt;&#x2F;strong&gt; &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;UXLiveStream_LandingPage.html&quot;&gt;Sign up to receive
a reminder and the recording.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;User experience (UX) affects every interaction a user has with a product. Because
of this, it can literally make or break the adoption of a website, or application.
UX designers have a really big job to do as they dig into the who, the what,
the why, and the how of essentially everything that happens within a platform.&lt;&#x2F;p&gt;

&lt;p&gt;How does GitLab&#x27;s UX team work to solve the challenge of creating an application
that has so many different types of users and releases a new version of its
product every month? Join GitLab&#x27;s UX Lead, Allison Whilden, and her team, as
they discuss their process, the big challenges they face and how they look to solve them.&lt;&#x2F;p&gt;

&lt;!-- identifiers --&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;facebook-open-office-hours-webcast.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/12/01/gitlab-8-dot-14-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/12/01/gitlab-8-dot-14-dot-2-released/</id>
<published>2016-12-01T00:00:00+00:00</published>
<updated>2016-12-01T00:00:00+00:00</updated>
<author>
<name>Alejandro Rodríguez</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.14.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;&quot;&gt;recent 8.14
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Rephrase some system notes to be compatible with new system note style (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7692&quot;&gt;!7692&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Create tag after running pre-hooks and pass updated SHA to post-hooks (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7700&quot;&gt;!7700&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed commit time not rendering after initial page load (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7704&quot;&gt;!7704&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent error when submitting a merge request and pipeline is not defined (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7707&quot;&gt;!7707&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix: Timeout creating and viewing merge request for binary file (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7713&quot;&gt;!7713&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; New system note design for commit discussion (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7721&quot;&gt;!7721&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Refresh project authorizations using a Redis lease (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7733&quot;&gt;!7733&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue boards issue sorting when dragging issue into list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7734&quot;&gt;!7734&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix for builds with no start date throwing an error in cycle analytics events (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7738&quot;&gt;!7738&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Clean up JiraService (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7756&quot;&gt;!7756&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update GitLab Workhorse to v1.0.1 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7759&quot;&gt;!7759&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipelines info being hidden in merge request widget (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7808&quot;&gt;!7808&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update Sidekiq-cron to fix compatibility issues with Sidekiq 4.2.1 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7815&quot;&gt;!7815&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a transient spec failure (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7825&quot;&gt;!7825&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes access to the wiki code with git when repository feature disabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7832&quot;&gt;!7832&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Revert bump in rufus-scheduler (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7844&quot;&gt;!7844&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make deleting with optimistic locking respect NULL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7867&quot;&gt;!7867&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove caching of events data (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6578&quot;&gt;!6578&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken external links in help&#x2F;index.html (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7582&quot;&gt;!7582&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Evalute time_ago method instead of printing it (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7634&quot;&gt;!7634&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolves updated and resolved status is not showing (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7655&quot;&gt;!7655&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed resolved discussion timeago not rendering (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7656&quot;&gt;!7656&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pick valid event objects for the events list (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7689&quot;&gt;!7689&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Port of rephrase-system-notes to EE (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;913&quot;&gt;!913&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Get rid of user activities table and replace it with redis (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;915&quot;&gt;!915&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: Display Custom Avatars in secondary nodes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;904&quot;&gt;!904&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Revert default IPv6 configuration for NGINX (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1133&quot;&gt;!1133&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Major Security Update for CVE-2016-9469</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/11/30/gitlab-major-security-update-for-cve-2016-9469/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/11/30/gitlab-major-security-update-for-cve-2016-9469/</id>
<published>2016-11-30T00:00:00+00:00</published>
<updated>2016-11-30T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;On Monday, December 5th, 2016 at 3:59pm PST (23:59 UTC), we will publish a major
GitLab security update to address CVE-2016-9469, a denial-of-service and data
corruption vulnerability. More details will be forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;,
including which versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14.1, 8.13.7 and 8.12.10 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/11/28/gitlab-8-14-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/11/28/gitlab-8-14-1-released/</id>
<published>2016-11-28T00:00:00+00:00</published>
<updated>2016-11-28T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.14.1, 8.13.7 and 8.12.10 for GitLab Community Edition (CE) and
Enterprise Edition (EE).
This version contains an important security fix for a critical remote command
execution vulnerability in Mattermost, and we &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that anyone
running GitLab 8.14.0 with Mattermost enabled upgrade to this version
&lt;strong&gt;immediately&lt;&#x2F;strong&gt;.
Please read on for more details.
&lt;&#x2F;p&gt;
&lt;h2 id=&quot;remote-command-execution-via-mattermost-service-in-8140&quot;&gt;Remote Command Execution via Mattermost Service in 8.14.0&lt;&#x2F;h2&gt;
&lt;p&gt;Mattermost recently released a critical security update to address a remote
command execution vulnerability. Because the Omnibus version of GitLab 8.14.0
ships with Mattermost we are providing this emergency security patch.
Details of the vulnerability can be found at
&lt;a href=&quot;https:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html#release-v3-5-1&quot;&gt;https:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html#release-v3-5-1&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running GitLab 8.14.0 with
Mattermost enabled upgrade immediately. Mattermost is &lt;em&gt;not&lt;&#x2F;em&gt; enabled by default.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab installation
against this vulnerability using the workaround outlined below until you have
time to upgrade.&lt;&#x2F;p&gt;
&lt;h4 id=&quot;disable-mattermost&quot;&gt;Disable Mattermost&lt;&#x2F;h4&gt;
&lt;p&gt;Login to your GitLab server(s) and perform the following:&lt;&#x2F;p&gt;
&lt;ol&gt;
  &lt;li&gt;Edit your &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; file&lt;&#x2F;li&gt;
  &lt;li&gt;Verify &lt;code&gt;mattermost[&#x27;gitlab_enable&#x27;]&lt;&#x2F;code&gt; is set to &lt;code&gt;false&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Save the file&lt;&#x2F;li&gt;
  &lt;li&gt;Run &lt;code&gt;sudo gitlab-ctl reconfigure&lt;&#x2F;code&gt;
Note: If you are running Mattermost on an external server and not through GitLab
this workaround will not be sufficient. Please consult your Mattermost
documentation on how to disable the service until you can install the patch.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;8141-8137-and-81210-security-fixes&quot;&gt;8.14.1, 8.13.7 and 8.12.10 Security fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;users-with-read-access-to-a-project-can-create-labels&quot;&gt;Users with Read Access to a Project Can Create Labels&lt;&#x2F;h3&gt;
&lt;p&gt;Hari Gopal reported a vulnerability involving non-members of a project who have
read-only access being able to create labels inside the project. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23416&quot;&gt;#23416&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;information-disclosure-for-private-project-names&quot;&gt;Information Disclosure for Private Project Names&lt;&#x2F;h3&gt;
&lt;p&gt;An internal code review discovered that it was possible to enumerate private
project names. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22869&quot;&gt;#22869&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;information-disclosure-for-private-issues&quot;&gt;Information Disclosure for Private Issues&lt;&#x2F;h3&gt;
&lt;p&gt;An internal code review discovered that it was possible to read private issues
using specifically-crafted search queries for projects with issues visibility
restricted to ‘Only team members&#x27;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-fixes-in-8141&quot;&gt;Other fixes in 8.14.1&lt;&#x2F;h2&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;11&#x2F;22&#x2F;gitlab-8-14-released&#x2F;&quot;&gt;recent 8.14 release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;ul&gt;
  &lt;li&gt;CE&#x2F;EE: Fix deselecting calendar days on contribution graph (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6453&quot;&gt;!6453&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: 500 error on project show when user is not logged in and project is still empty (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7376&quot;&gt;!7376&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Unify all MR widget text colors and background colors (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7571&quot;&gt;!7571&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: If Build running change accept merge request when build succeeds button from orange to blue (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7577&quot;&gt;!7577&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: External jobs do not have show page nor traces (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7617&quot;&gt;!7617&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Issue creation now accepts trailing whitespace (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7633&quot;&gt;!7633&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Resolve &quot;Labeling system notes downcase labels&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7636&quot;&gt;!7636&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Fix NPM install warnings due to incompatible dependency version (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7641&quot;&gt;!7641&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Clean up globals exemptions within .eslintrc (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7642&quot;&gt;!7642&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Fix IID filter for merge requests and milestones (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7648&quot;&gt;!7648&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Fix sidekiq stats in admin area (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7654&quot;&gt;!7654&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Fix exceptions when loading build trace (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7658&quot;&gt;!7658&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Fixed bug to do with calculating durations (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7663&quot;&gt;!7663&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Resolve &quot;Wrong &lt;code&gt;render &#x27;index&#x27;&lt;&#x2F;code&gt;, should be &lt;code&gt;render &#x27;show&#x27;&lt;&#x2F;code&gt; in &lt;code&gt;Projects::PipelinesSettingsController#update&lt;&#x2F;code&gt;&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7665&quot;&gt;!7665&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;CE&#x2F;EE: Fix spacing between icon and word in status badge (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7678&quot;&gt;!7678&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;EE: Fix MergeRequestSerializer breaks on  when source_project doesn&#x27;t exist anymore (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;903&quot;&gt;!903&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;
&lt;p&gt;These versions do not include any new migrations, and should not require any
downtime.
Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;
&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;
&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.14 Released with Time Tracking Beta and Chat Commands</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/11/22/gitlab-8-14-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/11/22/gitlab-8-14-released/</id>
<published>2016-11-22T00:00:00+00:00</published>
<updated>2016-11-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;You&#x27;re doing code review of a new feature and wonder how it&#x27;ll actually
feel, look and work when it&#x27;s live. Yesterday, you had to sacrifice your
local development environment&#x27;s state, checkout the remote branch, run
migrations, and then spin up the entire development environment.
Today, you can just go to GitLab and click the link in
the merge request to play with a fully functional, live environment.&lt;&#x2F;p&gt;



&lt;p&gt;Maybe you have some feedback on what you saw and start talking with your
colleague on chat. Rather than having to communicate on who moves the result to
issues, you just create an issue directly from chat.
You can immediately add a time estimate to the issue
and anyone peeking at the cycle analytics will see the new issue come by and
over time, move to production, giving you feedback on where things might get
stuck.&lt;&#x2F;p&gt;

&lt;p&gt;You can do all of the above and much more with GitLab 8.14, today. Time
tracking, Review Apps, Chat commands, Cycle Analytics improvements and much
more.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Toon Claes. Toon contributed the button to delete all merged branches,
a great addition to GitLab.
Thanks Toon Claes!&lt;&#x2F;p&gt;

&lt;p class=&quot;alert alert-webcast&quot;&gt;&lt;i class=&quot;fab fa-gitlab&quot; style=&quot;color:rgb(107,79,187); font-size:.85em&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;  
Tune in on Nov. 30 for our 8.14 release webcast with a live demo of Review Apps and Time Tracking for EE! &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;20161124_ReviewAppsWebcast_LandingPage.html&quot;&gt;Register here&lt;&#x2F;a&gt;!
  &lt;i class=&quot;fab fa-gitlab&quot; style=&quot;color:rgb(107,79,187); font-size:.85em&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;time-tracking-beta-ee&quot;&gt;Time Tracking Beta (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;Whether you&#x27;re a contractor that needs to keep track of their time,
or you&#x27;re managing time spent on issues and projects,
time tracking has traditionally been a painful experience: You have various
systems to keep track or log your time and these never seem to fit in your
day-to-day workflow.&lt;&#x2F;p&gt;

&lt;p&gt;You can now track your time right where you&#x27;re working, with Time Tracking
in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;With Time Tracking, you&#x27;re able to set estimates for how much time is necessary
for a particular issue. All you have to do is use a new slash command,
which can be entered in the issue description or a comment:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;estimate 6h
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You can adjust this at any time with the same command. Once you&#x27;ve spent time
on an issue, you can log this simply with:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;spend 3h
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You&#x27;ll see this reflected in the interface.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;time.gif&quot; alt=&quot;Time Tracking Beta in GitLab 8.14&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Time Tracking is made available as trial to all our Enterprise Edition
customers during the beta period,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1264&quot;&gt;after which it becomes available as a paid Product&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re interested in hearing how we can improve time tracking to fit your
workflow. Let us know by &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;new&quot;&gt;creating an issue&lt;&#x2F;a&gt; or below in the comments.&lt;&#x2F;p&gt;

&lt;p&gt;Some things we&#x27;re thinking about: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1271&quot;&gt;reporting&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1228&quot;&gt;an API&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1265&quot;&gt;Time Tracking in Issue Boards&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues?label_name%5B%5D=time+tracking&quot;&gt;others&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;time_tracking.html&quot;&gt;Read the docs on how to use Time Tracking in GitLab&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;chat-commands-experimental&quot;&gt;Chat Commands (experimental)&lt;&#x2F;h2&gt;

&lt;p&gt;It seems like communication has moved from the conference room to the online
chatroom in the last few years. In particular, collaboration and idea generation
seem to happen here, and that&#x27;s an important part of the
&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;13&#x2F;gitlab-master-plan&#x2F;#the-master-plan&quot;&gt;idea-to-production vision&lt;&#x2F;a&gt;
that we aim to capture with GitLab. With Chat Commands you can now bridge the
gap between chat and GitLab&#x27;s repositories, issue tracker, and CI&#x2F;CD pipelines
quickly and easily.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;chat1.gif&quot; alt=&quot;Chat Commands in GitLab 8.14 with Mattermost&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With this first iteration, you can quickly create or view an issue, for
instance, using this to make an issue with the title and description already filled in:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;gitlab issue create Even Better Issue Boards
Let&#x27;s make Issue boards _even_ better!
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You can also embrace ChatOps and trigger deploys to production (using the
proper identity and permissions of the user):&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;gitlab deploy staging to production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;This iteration supports Mattermost, which ships with GitLab Omnibus. Slack
support is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22182&quot;&gt;coming soon&lt;&#x2F;a&gt;.
The command set is limited, but we&#x27;re &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;24768&quot;&gt;looking to add
more&lt;&#x2F;a&gt; soon and would love
your feedback.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;mattermost_slash_commands.html&quot;&gt;Read the documentation on Mattermost Slash Commands&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;review-apps&quot;&gt;Review Apps&lt;&#x2F;h2&gt;

&lt;p&gt;Review Apps are the future of reviewing work. Rather than just looking at code,
Review Apps will serve you with a fully functioning environment in which your
app is running, ready for any kind of testing, trying or poking.&lt;&#x2F;p&gt;

&lt;p&gt;We initially offered experimental support for Review Apps in GitLab 8.12, and
improved it in the 8.13, but today we&#x27;re shipping the last bit to call it
&quot;complete&quot;.&lt;&#x2F;p&gt;

&lt;p&gt;Now with Review Apps properly set up, an app will spin up automatically
for each branch and be destroyed automatically when the branch is removed from
GitLab. We&#x27;re &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;www-gitlab-com&#x2F;blob&#x2F;master&#x2F;.gitlab-ci.yml#L33-71&quot;&gt;using it with this blog&lt;&#x2F;a&gt;, and it&#x27;s awesome. This feature is so exciting, there&#x27;s a whole other blog
post about it.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;11&#x2F;22&#x2F;introducing-review-apps&#x2F;&quot;&gt;Read the blog post introducing review apps&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;review_apps&#x2F;&quot;&gt;Read the documentation on Review Apps&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;cycle-analytics-events&quot;&gt;Cycle Analytics Events&lt;&#x2F;h2&gt;

&lt;p&gt;With Cycle Analytics you get actionable feedback on how fast your ideas are moving to product and where they might be getting stuck. This can seem a little abstract, so to make it more obvious what is happening, we&#x27;ll now show you the latest events in each stage.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;cycle_events.png&quot; alt=&quot;Improved Cycle Analytics in GitLab 8.14&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This should make it easier to get an overview of what is happening in each
stage, but also to quickly jump in and see if you can move things forward
faster.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;analytics&#x2F;value_stream_analytics.html&quot;&gt;Read the documentation on Cycle Analytics&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;prevent-merge-until-review-is-done&quot;&gt;Prevent merge until Review is done&lt;&#x2F;h2&gt;

&lt;p&gt;You shouldn&#x27;t merge code before all tests have passed and review is done.
The first was enforceable for a while in GitLab, but the second not yet.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.14, you can now prevent merges until all discussions on a merge
request have been resolved. This makes it impossible to miss those last
comments on the bottom of the page (even if we didn&#x27;t have that handy widget on
top) and make sure only code that has been checked and verified makes it to
production.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;dis1.png&quot; alt=&quot;Prevent merge until review is done in GitLab 8.14&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Enable this option in the project settings.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;dis2.png&quot; alt=&quot;Prevent merge until review is done in GitLab 8.14&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Rodolfo Arruda for contributing this awesome feature!&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;discussions&#x2F;index.html&quot;&gt;Read the documentation on merge request discussions&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;delete-all-merged-branches&quot;&gt;Delete all Merged Branches&lt;&#x2F;h2&gt;

&lt;p&gt;Toon Claes contributed an amazingly obvious, yet dubiously missing feature: a
single button to quickly delete all merged branches in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ll make sure to confirm your choice and then quickly set off a process to do
as requested. Find the button under your project&#x27;s &lt;strong&gt;Repository ➔ Branches&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;delete_mr.png&quot; alt=&quot;Quickly delete all merged branches in GitLab 8.14&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Deleting all merged branches will not delete any of your
protected branches.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Toon Claes!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;subscribe-to-group-labels&quot;&gt;Subscribe to Group Labels&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve introduced the convenient Group Labels in GitLab 8.13.
You can now finally subscribe to them, so you get notified on things that
matter to you, across entire groups. For instance, get notified whenever
a new issue is made with the &lt;code&gt;customer&lt;&#x2F;code&gt; label, so you&#x27;ll get a good overview
of customer issues across all projects in a group.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-pipeline-emails&quot;&gt;Better Pipeline emails&lt;&#x2F;h2&gt;

&lt;p&gt;Now when a pipeline fails, we&#x27;ll email you what went wrong, so you know whether
to simply retry a build, or call for all-hands-on-deck, without having to dive
into the logs immediately.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;emails.png&quot; alt=&quot;Better pipeline notifications in GitLab 8.14&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;jira-integration-improvements&quot;&gt;JIRA integration improvements&lt;&#x2F;h2&gt;

&lt;p&gt;We know many of you use JIRA intensively. We&#x27;re working very hard on
improving GitLab&#x27;s integration with it. Below are some of the improvements
we&#x27;ve made this release. We&#x27;re interested in hearing what else.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;jira&#x2F;&quot;&gt;Read the revamped documentation on JIRA integration&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;remote-issue-links-to-jira&quot;&gt;Remote issue links to JIRA&lt;&#x2F;h3&gt;

&lt;p&gt;To make it super easy how a JIRA ticket relates to commits in GitLab, now
whenever you mention a JIRA ticket in a commit or merge request,
we&#x27;ll add it to the remote issue links in the ticket. You can write
that it &lt;code&gt;Fixes&lt;&#x2F;code&gt; a JIRA ticket or just mention it and we&#x27;ll make sure
it appears correctly.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;jira.png&quot; alt=&quot;Remote Issue Links to JIRA with GitLab 8.14&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Related MR: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7413&quot;&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7413&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;a-more-silent-gitlab-in-jira&quot;&gt;A more silent GitLab in JIRA&lt;&#x2F;h3&gt;

&lt;p&gt;When you set up the JIRA service within GitLab, by default, every commit and
merge request in GitLab that referenced a JIRA issue created a comment in this
issue in JIRA. Some people like having the complete details of what&#x27;s going on,
others prefer this to be more silent.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.14, you can now disable the creation of comments when referencing
a JIRA issue in a commit or in a merge request.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-looks&quot;&gt;Improved Looks!&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab also got prettier and easier to use with 8.14, some highlights below:&lt;&#x2F;p&gt;

&lt;p&gt;You can now &lt;em&gt;see&lt;&#x2F;em&gt; who you are mentioning:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;mention.png&quot; alt=&quot;&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Pipelines and the meta information are looking even better than they did:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;pipes.png&quot; alt=&quot;&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We now show you environment information on the build page:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;env_info.png&quot; alt=&quot;&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Pipelines will now show whether specific builds are skipped:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;pipes2.png&quot; alt=&quot;&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;And we made it easier to see what is left in the current pipeline:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_14&#x2F;pipes3.png&quot; alt=&quot;&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-accessibility&quot;&gt;Improved Accessibility&lt;&#x2F;h2&gt;

&lt;p&gt;Our amazing UX and frontend teams have been working hard on improving
the accessibility of GitLab. We&#x27;ve made a few changes worth highlighting this month:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;We&#x27;ve added a &#x27;Skip to Content&#x27; button when tabbing, This allows you
to reach the content faster and skip navigation items.&lt;&#x2F;li&gt;
  &lt;li&gt;All dropdowns, buttons and anchors now have focus states&lt;&#x2F;li&gt;
  &lt;li&gt;We&#x27;ve increased the contrast between background and anchors&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We&#x27;re always interested in hearing how we can improve GitLab&#x27;s accessibility
further.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost-35&quot;&gt;GitLab Mattermost 3.5&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.14 includes &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;mattermost-3-5&#x2F;&quot;&gt;Mattermost 3.5&lt;&#x2F;a&gt;,
an &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&quot;&gt;open source Slack-alternative&lt;&#x2F;a&gt; whose newest
release offers improved performance on mobile and web through reduced loading
times, mobile UI improvements and faster server-side processing, Minio as a
self-hosted S3-alternative to local file storage, Russian language translation,
favorite channels and much more.&lt;&#x2F;p&gt;

&lt;p&gt;This version also includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt;
and upgrade from earlier versions is recommended.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-runner-18&quot;&gt;GitLab Runner 1.8&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.8 today. Most interesting changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Add initial Prometheus metrics server to runner manager &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;358&quot;&gt;!358&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add support for docker registries on non standard ports &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;376&quot;&gt;!376&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Use correct constant for kubernetes resource limits. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;367&quot;&gt;!367&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add PullPolicy config option for kubernetes &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;335&quot;&gt;!335&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix&#x2F;unplug stalled endpoints &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;390&quot;&gt;!390&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix {Bash,Cmd,Ps}Writer.IfCmd to escape its arguments &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;364&quot;&gt;!364&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;support-for-private-container-registries-in-gitlab-ci-builds&quot;&gt;Support for private container registries in GitLab CI builds&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 8.14 and GitLab Runner 1.8 we&#x27;ve improved support for private docker images.&lt;&#x2F;p&gt;

&lt;p&gt;From now on you can use private&#x2F;protected images stored in GitLab&#x27;s Container
Registry automatically, without any changes. GitLab will send registry
credentials with build data, and Runner will use them to authorize docker pull
requests.&lt;&#x2F;p&gt;

&lt;p&gt;You can also use &lt;code&gt;DOCKER_AUTH_CONFIG&lt;&#x2F;code&gt; Secure Variable to add credentials
for other private registries. Thanks to this you can use any image from any registry - public or private - which is accessible from build&#x27;s host, to be a base of your build or a service used by it.&lt;&#x2F;p&gt;

&lt;p&gt;Runner 1.8 fixes also the mechanism that is generating aliases from service
name, when registry is available on non standard port.&lt;&#x2F;p&gt;

&lt;p&gt;You can read more about private container registries support in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;runner&#x2F;configuration&#x2F;advanced-configuration.html#using-a-private-container-registry&quot;&gt;GitLab Runner&#x27;s configuration&lt;&#x2F;a&gt; documentation.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-improvements&quot;&gt;Performance Improvements&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Commits that are pushed are now processed in a separate Sidekiq worker: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6802&quot;&gt;!6802&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The authorised projects for a user are now stored in a dedicated database table. This list is updated whenever you are granted access to a new project, project access has been removed, etc: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6839&quot;&gt;!6839&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Defer saving of project services to reduce database queries: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6958&quot;&gt;!6958&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Getting the merge requests that close an issue now uses a cache: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6996&quot;&gt;!6996&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Queries to get events have been optimised by removing the default ORDER BY where possible: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7130&quot;&gt;!7130&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab can now limit the amount of Sidekiq workers per queue to a certain percentage: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7292&quot;&gt;!7292&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;An index has been added for &lt;code&gt;project_import_data.project_id&lt;&#x2F;code&gt; to improve finding project import data: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7316&quot;&gt;!7316&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Certain database associations are now eager loaded on the merge requests and issues index pages: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7564&quot;&gt;!7564&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Refreshing of caches upon a push has been improved. Previously GitLab would refresh all caches, starting with 8.14 it will only refresh the caches of data that has been changed: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7360&quot;&gt;!7360&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab-package-changes&quot;&gt;Omnibus GitLab package changes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;redis-in-ha-configuration&quot;&gt;Redis in HA configuration&lt;&#x2F;h3&gt;

&lt;p&gt;In GitLab 8.11 &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;#redis-sentinel-support&quot;&gt;we&#x27;ve announced&lt;&#x2F;a&gt;
experimental Redis Sentinel support.
We&#x27;ve improved this further and also introduced ways of configuring Redis HA, all within the package.&lt;&#x2F;p&gt;

&lt;p&gt;With Omnibus GitLab 8.14 Enterprise Edition package, you can fully configure
Redis in Highly Available configuration which also includes configuring
Redis Sentinel. This is a step forward in the direction of having a
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;77&quot;&gt;fully HA ready Enterprise Edition package&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;When using the Community Edition package, Redis Sentinel needs to be
installed and configured manually separately.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;redis&#x2F;index.html&quot;&gt;Read more about Redis HA setup in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;omnibus-gitlab-packages-on-opensuse&quot;&gt;Omnibus GitLab packages on OpenSUSE&lt;&#x2F;h3&gt;

&lt;p&gt;With GitLab 8.14 we are introducing omnibus-gitlab packages for OpenSUSE 13.2 and 42.1.
The packages are served through zypper repositories from our package server.&lt;&#x2F;p&gt;

&lt;p&gt;Go to &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;our download page&lt;&#x2F;a&gt; for installation
details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;package-repositories-for-oracle-linux-and-scientific-linux&quot;&gt;Package repositories for Oracle Linux and Scientific Linux&lt;&#x2F;h3&gt;

&lt;p&gt;Omnibus GitLab packages for Oracle Linux and Scientific Linux have been supported
for a long time however, they required a manual change in the yum repo list.
Starting with GitLab 8.14, this is no longer necessary and you can use the directions
from &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;our download page&lt;&#x2F;a&gt; without any alterations.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;further-omnibus-package-changes&quot;&gt;Further Omnibus Package changes&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Packaged NGINX is upgraded to 1.10.2&lt;&#x2F;li&gt;
  &lt;li&gt;Packaged Redis is upgraded to 3.2.5&lt;&#x2F;li&gt;
  &lt;li&gt;Multiple configuration options got introduced in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;compare&#x2F;8-13-stable...8-14-stable#diff-25&quot;&gt;gitlab.rb&lt;&#x2F;a&gt; file&lt;&#x2F;li&gt;
  &lt;li&gt;See omnibus-gitlab &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;8-14-stable&#x2F;CHANGELOG.md&quot;&gt;Changelog&lt;&#x2F;a&gt; for more details&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;To upgrade to GitLab 8.14, about 15 to 30 minutes downtime is required depending
on the size of your instance. See below for details.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;The column &lt;code&gt;application_settings.repository_storage&lt;&#x2F;code&gt; has been renamed, this requires downtime but takes very little time&lt;&#x2F;li&gt;
  &lt;li&gt;Some indexes with stricter constraints are being added and they require corresponding code changes to be deployed, this requires downtime&lt;&#x2F;li&gt;
  &lt;li&gt;The subscriptions data is being migrated in a way that can&#x27;t be done online, this process may take a few minutes&lt;&#x2F;li&gt;
  &lt;li&gt;Project records with invalid visibility level are fixed, this can take a few minutes and requires downtime&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_14&#x2F;pic.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.13.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/11/17/gitlab-8-dot-13-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/11/17/gitlab-8-dot-13-dot-6-released/</id>
<published>2016-11-17T00:00:00+00:00</published>
<updated>2016-11-17T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.13.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;&quot;&gt;recent 8.13
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Omniauth auto link LDAP user falls back to find by DN when user cannot be found by UID. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7002&quot;&gt;!7002&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Milestone dropdown not stay selected for &lt;code&gt;Upcoming&lt;&#x2F;code&gt; and &lt;code&gt;No Milestone&lt;&#x2F;code&gt; option. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7117&quot;&gt;!7117&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix relative links in Markdown wiki when displayed in &quot;Project&quot; tab. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7218&quot;&gt;!7218&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project &quot;Visibility Level&quot; selector not using default values. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7264&quot;&gt;!7264&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix no &quot;Register&quot; tab if LDAP auth is enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7274&quot;&gt;!7274&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Clicking &quot;force remove source branch&quot; label now toggles the checkbox again. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7356&quot;&gt;!7356&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cache for commit status in commits list to respect branches. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7372&quot;&gt;!7372&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue causing labels not to appear in sidebar on MR page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7416&quot;&gt;!7416&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Limit labels returned for a specific project as an administrator. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7496&quot;&gt;!7496&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow commit note to be visible if repo is visible. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7504&quot;&gt;!7504&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Disable retries for remote mirror update worker. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;848&quot;&gt;!848&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: Fix cache clearing on secondary Geo nodes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;869&quot;&gt;!869&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Geo: Fix a problem that prevented git cloning from secondary node. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;873&quot;&gt;!873&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.13.5, 8.12.9, and 8.11.11 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/11/09/gitlab-8-dot-13-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/11/09/gitlab-8-dot-13-dot-5-released/</id>
<published>2016-11-09T10:30:00+00:00</published>
<updated>2016-11-09T10:30:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.13.5, 8.12.9, and 8.11.11 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain several security fixes, including a fix for a
persistent cross-site scripting vulnerability and fixes for several
information disclosure vulnerabilities. In addition, version 8.13.5 resolves a
number of regressions and bugs. We recommend that all GitLab installations be
upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;re wondering what happened to 8.13.4, good eye! That version introduced
a CI issue that we had to fix in 8.13.5.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;8135-8129-and-81111-security-fixes&quot;&gt;8.13.5, 8.12.9, and 8.11.11 Security Fixes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;persistent-cross-site-scripting-vulnerability-in-autolink-feature&quot;&gt;Persistent Cross-site Scripting Vulnerability in Autolink Feature&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.facebook.com&#x2F;PSX0S404&quot;&gt;Mohamed Ebrahem&lt;&#x2F;a&gt; via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;&quot;&gt;HackerOne&lt;&#x2F;a&gt; reported a Cross-site Scripting (XSS)
vulnerability in the autolinking feature of our description fields. Autolinking
is used to automatically turn words or phrases into their HTML equivalent links.
The autolinking code did not properly filter dangerous URL protocols and was
therefore vulnerable to persistent script injection. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23153&quot;&gt;#23153&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;8135-security-fixes&quot;&gt;8.13.5 Security Fixes&lt;&#x2F;h2&gt;

&lt;p&gt;The following security issues were fixed ONLY in 8.13.5:&lt;&#x2F;p&gt;

&lt;h3 id=&quot;private-issue-disclosure-from-group-page-of-public-repositories&quot;&gt;Private Issue Disclosure from Group Page of Public Repositories&lt;&#x2F;h3&gt;

&lt;p&gt;Gustav Bylund reported an information disclosure vulnerability that allowed
confidential issues inside public repositories to be viewed by anyone viewing
the group page. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22481&quot;&gt;#22481&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;private-merge-request-disclosure-in-related-merge-requests-feature&quot;&gt;Private Merge Request Disclosure in Related Merge Requests Feature&lt;&#x2F;h3&gt;

&lt;p&gt;Patrick Fiedler reported an issue where private merge requests in public
projects could be disclosed by creating related merge requests in the same
project. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23548&quot;&gt;#23548&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;disabled-public-repositories-could-still-be-cloned&quot;&gt;Disabled Public Repositories Could Still Be Cloned&lt;&#x2F;h3&gt;

&lt;p&gt;An internal code review disclosed that when a public repository is disabled or
restricted to team members only it could still be cloned by the public. Please
see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23788&quot;&gt;#23788&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;team-only-merge-requests-and-issues-still-visible-in-public-activity-feed&quot;&gt;Team-Only Merge Requests and Issues Still Visible in Public Activity Feed&lt;&#x2F;h3&gt;

&lt;p&gt;An internal code review disclosed that when a public repository has merge
requests and issues disabled for non-team members these merge requests and
issues were still visible in the public activity feed. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23403&quot;&gt;#23403&lt;&#x2F;a&gt; for
more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;regressions-fixed-in-8135&quot;&gt;Regressions fixed in 8.13.5&lt;&#x2F;h2&gt;

&lt;p&gt;The following regressions were fixed in 8.13.5:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix showing pipeline status for a given commit from correct branch. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7034&quot;&gt;!7034&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only skip group when it&#x27;s actually a group in the &quot;Share with group&quot; select. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7262&quot;&gt;!7262&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Introduce round-robin project creation to spread load over multiple shards. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7266&quot;&gt;!7266&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure merge request&#x27;s &quot;remove branch&quot; accessors return booleans. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7267&quot;&gt;!7267&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix lightweight tags not processed correctly by GitTagPushService. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6532&quot;&gt;!6532&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow owners to fetch source code in CI builds. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6943&quot;&gt;!6943&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Return conflict error in label API when title is taken by group label. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7014&quot;&gt;!7014&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Reduce the overhead to calculate number of open&#x2F;closed issues and merge requests within the group or project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7123&quot;&gt;!7123&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix builds tab visibility. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7178&quot;&gt;!7178&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project features default values. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7181&quot;&gt;!7181&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Weight dropdown in issue filter form does not stay selected. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlabee&#x2F;merge_requests&#x2F;826&quot;&gt;!826&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions &lt;strong&gt;do&lt;&#x2F;strong&gt; include new migrations, and will require brief downtime.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.13.3, 8.12.8, 8.11.10, and 8.10.13 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/11/02/cve-2016-9086-patches/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/11/02/cve-2016-9086-patches/</id>
<published>2016-11-02T23:50:00+00:00</published>
<updated>2016-11-02T23:50:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.13.3, 8.12.8, 8.11.10, and 8.10.13 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain an important security fix for a critical directory
traversal vulnerability, and we &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all GitLab
installations be upgraded to one of these versions &lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;directory-traversal-via-importexport-feature-cve-2016-9086&quot;&gt;Directory traversal via &quot;import&#x2F;export&quot; feature: &lt;code&gt;CVE-2016-9086&lt;&#x2F;code&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; from &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; disclosed a critical security flaw in the &quot;import&#x2F;export
project&quot; feature of GitLab. Added in GitLab 8.9, this feature allows a user to
export and then re-import their projects as tape archive files (tar). All
GitLab versions prior to 8.13.0 restricted this feature to administrators only.
Starting with version 8.13.0 this feature was made available to all users.&lt;&#x2F;p&gt;

&lt;p&gt;This feature did not properly check for symbolic links in user-provided archives
and therefore it was possible for an authenticated user to retrieve the contents
of any file accessible to the GitLab service account. This included sensitive
files such as those that contain secret tokens used by the GitLab service to
authenticate users. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23822&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-9086&quot;&gt;CVE-2016-9086&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;8.13.0 through 8.13.2&lt;&#x2F;li&gt;
  &lt;li&gt;8.12.0 through 8.12.7&lt;&#x2F;li&gt;
  &lt;li&gt;8.11.0 through 8.11.9&lt;&#x2F;li&gt;
  &lt;li&gt;8.10.0 through 8.10.12&lt;&#x2F;li&gt;
  &lt;li&gt;8.9.0 through 8.9.11&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible. Please note that no patch is being
provided for GitLab versions 8.9.x. Those running versions 8.9.0 through
8.9.11 who cannot upgrade to a newer version should use the workaround listed
below.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab installation
against this vulnerability using the workaround outlined below until you have
time to upgrade.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;disable-project-importexport-via-tape-archive&quot;&gt;Disable Project Import&#x2F;Export via Tape Archive&lt;&#x2F;h4&gt;
&lt;p&gt;Login using an administrator account to your GitLab installation and perform the
following:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Choose &quot;Admin Area&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;Settings&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;Under &quot;Import Sources&quot; disable the &quot;GitLab export&quot; option.&lt;&#x2F;li&gt;
  &lt;li&gt;Click Save&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h3 id=&quot;verifying-the-workaround&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;In a Browser Window, login as any user&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;Projects&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;New Project&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;Enter a project name&lt;&#x2F;li&gt;
  &lt;li&gt;Verify that &quot;GitLab export&quot; does not appear as an import option&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.13.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/31/gitlab-8-dot-13-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/31/gitlab-8-dot-13-dot-2-released/</id>
<published>2016-10-31T00:00:00+00:00</published>
<updated>2016-10-31T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.13.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;&quot;&gt;recent 8.13
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix encoding issues on pipeline commits. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6832&quot;&gt;!6832&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use Hash rocket syntax to fix cycle analytics under Ruby 2.1. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6977&quot;&gt;!6977&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Modify GitHub importer to be retryable. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7003&quot;&gt;!7003&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix refs dropdown selection with special characters. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7061&quot;&gt;!7061&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix horizontal padding for highlight blocks. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7062&quot;&gt;!7062&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pass user instance to &lt;code&gt;Labels::FindOrCreateService&lt;&#x2F;code&gt; or &lt;code&gt;skip_authorization: true&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7093&quot;&gt;!7093&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix builds dropdown overlapping bug. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7124&quot;&gt;!7124&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix applying labels for GitHub-imported MRs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7139&quot;&gt;!7139&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix importing MR comments from GitHub. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7139&quot;&gt;!7139&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project member access for group links. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7144&quot;&gt;!7144&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; API: Fix booleans not recognized as such when using the &lt;code&gt;to_boolean&lt;&#x2F;code&gt; helper. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7149&quot;&gt;!7149&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix and improve &lt;code&gt;Sortable.highest_label_priority&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7165&quot;&gt;!7165&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed sticky merge request tabs when sidebar is pinned. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7167&quot;&gt;!7167&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only remove right connector of first build of last stage. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7179&quot;&gt;!7179&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Don&#x27;t pass a current user to &lt;code&gt;Member#add_user&lt;&#x2F;code&gt; in LDAP group sync. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;830&quot;&gt;!830&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Move &lt;code&gt;mail_room&lt;&#x2F;code&gt; queue from &lt;code&gt;incoming_email&lt;&#x2F;code&gt; to &lt;code&gt;email_receiver&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1060&quot;&gt;!1060&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Major Security Update for CVE-2016-9086</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/31/gitlab-major-security-update-for-cve-2016-9086/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/31/gitlab-major-security-update-for-cve-2016-9086/</id>
<published>2016-10-31T00:00:00+00:00</published>
<updated>2016-10-31T00:00:00+00:00</updated>
<author>
<name>Brian Neel</name>
</author>
<content type='html'>&lt;p&gt;On Wednesday November 2, 2016 at 4:59pm PDT (23:59 GMT), we will publish a major
GitLab security update to address CVE-2016-9086. More details will be
forthcoming on [our blog], including which versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to [Security Notices].&lt;&#x2F;p&gt;

&lt;p&gt;&#x2F;
[Security Notices]: &#x2F;company&#x2F;contact&#x2F;#security-notices&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.13.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/25/gitlab-8-dot-13-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/25/gitlab-8-dot-13-dot-1-released/</id>
<published>2016-10-25T00:00:00+00:00</published>
<updated>2016-10-25T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.13.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;10&#x2F;22&#x2F;gitlab-8-13-released&#x2F;&quot;&gt;recent 8.13
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix branch protection API. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6215&quot;&gt;!6215&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix hidden pipeline graph on commit and MR page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6895&quot;&gt;!6895&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Cycle analytics not showing correct data when filtering by date. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6906&quot;&gt;!6906&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure custom provider tab labels don&#x27;t break layout. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6993&quot;&gt;!6993&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue boards user link when in subdirectory. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7018&quot;&gt;!7018&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Refactor and add new environment functionality to CI yaml reference. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7026&quot;&gt;!7026&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix typo in project settings that prevents users from enabling container registry. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7037&quot;&gt;!7037&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix events order in &lt;code&gt;users&#x2F;:id&#x2F;events&lt;&#x2F;code&gt; endpoint. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7039&quot;&gt;!7039&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove extra line for empty issue description. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7045&quot;&gt;!7045&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t append issue&#x2F;MR templates to any existing text. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7050&quot;&gt;!7050&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error in generating labels. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7055&quot;&gt;!7055&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Stop clearing the database cache on &lt;code&gt;rake cache:clear&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7056&quot;&gt;!7056&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only show register tab if signup enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7058&quot;&gt;!7058&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Expire and build repository cache after project import. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7064&quot;&gt;!7064&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug where labels would be assigned to issues that were moved. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7065&quot;&gt;!7065&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix reply-by-email not working due to queue name mismatch. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7068&quot;&gt;!7068&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 404 for group pages when GitLab setup uses relative url. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7071&quot;&gt;!7071&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;User#to_reference&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7088&quot;&gt;!7088&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Reduce overhead of &lt;code&gt;LabelFinder&lt;&#x2F;code&gt; by avoiding &lt;code&gt;#presence&lt;&#x2F;code&gt; call. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7094&quot;&gt;!7094&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix unauthorized users dragging on issue boards. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7096&quot;&gt;!7096&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only schedule &lt;code&gt;ProjectCacheWorker&lt;&#x2F;code&gt; jobs when needed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7099&quot;&gt;!7099&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Hide multiple board actions if user doesnt have permissions. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;816&quot;&gt;!816&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix Elasticsearch::Transport::Transport::Errors::BadRequest when ES is enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;818&quot;&gt;!818&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Update docs for nginx status, fix the default server for status config. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1052&quot;&gt;!1052&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has one migration that requires a few minutes of downtime if mailroom
is used for reply-by-email. You can stop mailroom before installing this update if
you want to avoid downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.13 Released with Multiple Issue Boards and Merge Conflict Editor</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/22/gitlab-8-13-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/22/gitlab-8-13-released/</id>
<published>2016-10-22T00:00:00+00:00</published>
<updated>2016-10-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>
&lt;p class=&quot;alert alert-orange&quot; style=&quot;background-color: rgba(252,163,38,.3);
    border-color: rgba(252,163,38,.3); color: rgb(226,67,41) !important; text-align: center;&quot;&gt;
    &lt;i class=&quot;fab fa-gitlab&quot; style=&quot;color:rgb(226,67,41); font-size:.85em&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
      
    &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;20161027_8.13ReleaseWebcast_LandingPage.html&quot; class=&quot;purple&quot;&gt;Join us for our next release webcast&lt;&#x2F;a&gt; on October 27 to
    learn more about GitLab 8.13!
      &lt;i class=&quot;fab fa-gitlab&quot; style=&quot;color:rgb(107,79,187); font-size:.85em&quot; aria-hidden=&quot;true&quot;&gt;&lt;&#x2F;i&gt;
&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re &lt;a href=&quot;&#x2F;2016&#x2F;09&#x2F;28&#x2F;world-tour-amplify-your-code&#x2F;&quot;&gt;traveling around the world&lt;&#x2F;a&gt; and having the pleasure
of meeting so many of you. This month we&#x27;re proud to present many
changes that have been highly requested both in person and on &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&quot;&gt;our issue tracker&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;You&#x27;re now able to create multiple issue boards and quickly create issues from
them. In addition, no merge conflict is safe anymore from being solved, as
you can now edit the conflict right in GitLab. We&#x27;ve made it
even easier to track what code is running where and get you immediate feedback
with improved Cycle Analytics.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
Marc Siegfriedt for his contribution of the multi-file commit API endpoint.
Marc showed patience and determination getting this complex merge request
merged.
Thanks Marc!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;multiple-issue-boards-ee&quot;&gt;Multiple Issue Boards (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;You can now have multiple Issue boards on a single project in GitLab
Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;m_ib.gif&quot; alt=&quot;Multiple Issue Boards in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This allows you to have multiple workflows, as issues are immediately updated
with the corresponding labels. For instance, create a board for the whole
organisation and one for only the UX team: an issue will be updated across
boards if the UX team moves it from UX to Frontend.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re looking forward to see how you&#x27;ll use multiple issue boards.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-issue-from-the-issue-board&quot;&gt;New Issue from the Issue Board&lt;&#x2F;h2&gt;

&lt;p&gt;While we&#x27;re on the subject, you can now quickly add a new issue to a list:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;new_issue.gif&quot; alt=&quot;Create a new issue from the Issue Board in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Of course, it&#x27;ll immediately be labeled correctly.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-conflict-editor&quot;&gt;Merge Conflict Editor&lt;&#x2F;h2&gt;

&lt;p&gt;In &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;&quot;&gt;GitLab 8.11&lt;&#x2F;a&gt;, we introduced merge conflict resolution,
allowing you to choose between &lt;em&gt;our&lt;&#x2F;em&gt; and &lt;em&gt;their&lt;&#x2F;em&gt; changes when attempting
to solve a conflict.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.13, we&#x27;ve expanded the conflict resolution, allowing you
to edit the conflict right inside GitLab. This means you can now solve almost
any conflict without leaving your browser!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;inlinemergeconflictresolution.gif&quot; alt=&quot;Solve Merge Conflicts through the editor in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We believe this step is another in the direction of making merge conflict
headaches a thing of the past.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-labels&quot;&gt;Group Labels&lt;&#x2F;h2&gt;

&lt;p&gt;With Issue Boards and label prioritization, managing labels across projects
can be a pain.
With GitLab 8.13 you&#x27;re now able to create Group Labels. They work exactly
the same, but they are immediately available to all projects in the group.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;group_labels.png&quot; alt=&quot;Group level labels in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Currently you&#x27;re required to make the group labels from the page of your
Group. We&#x27;ll be adding the ability to change project labels into group labels
in a future release.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ability-to-stop-review-apps&quot;&gt;Ability to stop Review Apps&lt;&#x2F;h2&gt;

&lt;p&gt;Review apps give you the power to preview your changes in a live,
fully functional environment. You can now actually destroy these
dynamic environments straight from GitLab, whenever you don&#x27;t need them anymore. Note this is a manual action, and automatic stopping of review apps when a branch is deleted is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23218&quot;&gt;scheduled for next release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;review_app.png&quot; alt=&quot;Stop dynamic environments (review apps) in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ref-per-deployment&quot;&gt;Ref per Deployment&lt;&#x2F;h2&gt;

&lt;p&gt;To quickly check out the currently deployed commit, GitLab now
stores a ref in the repository. This means that, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;environments&#x2F;index.html#checkout-deployments-locally&quot;&gt;after configuring this locally&lt;&#x2F;a&gt;,
a single &lt;code&gt;git fetch&lt;&#x2F;code&gt; is all you need to check out the code that runs
in production.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipelines-for-commits&quot;&gt;Pipelines for Commits&lt;&#x2F;h2&gt;

&lt;p&gt;We now show related pipelines on the commit page, so you can
quickly see what happened with this particular commit.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;commit_pipeline.png&quot; alt=&quot;Pipelines for commits in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cycle-analytics-improvements&quot;&gt;Cycle Analytics Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;Previously, Cycle Analytics would only measure what&#x27;s been shipped to production
in a given time range. We&#x27;ve changed this behavior and now measure
everything that happened in this time range.&lt;&#x2F;p&gt;

&lt;p&gt;Only the staging and production
stages will show what&#x27;s actually been shipped to production, of course.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;assign-issues-to-mr-author&quot;&gt;Assign issues to MR author&lt;&#x2F;h2&gt;

&lt;p&gt;Did you reference some issues in your commits or merge request,
but didn&#x27;t assign them to yourself, or they aren&#x27;t assigned to the merge request
author? There&#x27;s now a quick link to do this:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;assign_yourself.png&quot; alt=&quot;Quickly assign&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;restrict-the-visibility-of-a-projects-repository&quot;&gt;Restrict the visibility of a project&#x27;s repository&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab now does so much more, the repository doesn&#x27;t have to be the
point of focus anymore. In fact, you might not use it at all! For that reason,
you can now disable or restrict access to the repository of any project.&lt;&#x2F;p&gt;

&lt;p&gt;If you restrict access, only project members can access the repository.
This allows you to run a public issue tracker on an otherwise private project.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;restrict_access.png&quot; alt=&quot;Project repository visibility&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;wip-slash-command&quot;&gt;&#x2F;wip Slash Command&lt;&#x2F;h2&gt;

&lt;p&gt;You can now use the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;quick_actions.html&quot;&gt;amazing slash commands&lt;&#x2F;a&gt; to quickly
change the status of a merge request to&#x2F;from Work-In-Progress (WIP).&lt;&#x2F;p&gt;

&lt;p&gt;Just type &lt;code&gt;&#x2F;wip&lt;&#x2F;code&gt; and submit your comment or merge request description!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;wip.gif&quot; alt=&quot;WIP using slash commands in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;debug-tracing-for-ci&quot;&gt;Debug tracing for CI&lt;&#x2F;h2&gt;

&lt;p&gt;By default, GitLab Runner hides most of the details of what it is doing when
processing a job. This behavior keeps build traces short, and prevents secrets
from being leaked into the trace unless your script writes them to the screen.&lt;&#x2F;p&gt;

&lt;p&gt;If a job isn&#x27;t working as expected, this can make the problem difficult to
investigate; in these cases, you can enable debug tracing in &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;.
Available on GitLab Runner v1.7+, this feature enables the shell&#x27;s execution
trace, resulting in a verbose build trace listing all commands that were run,
variables that were set, etc.&lt;&#x2F;p&gt;

&lt;p&gt;Before enabling this, you should ensure builds are visible to team members
only. You should also erase all generated build traces before making them
visible again.&lt;&#x2F;p&gt;

&lt;p&gt;To enable debug traces, set the CI_DEBUG_TRACE variable to true:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;job1:
  variables:
    CI_DEBUG_TRACE: &quot;true&quot;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;variables&#x2F;#debug-logging&quot;&gt;Read more in our documentation on Debug tracing&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;disable-git-operations-for-ci&quot;&gt;Disable Git operations for CI&lt;&#x2F;h2&gt;

&lt;p&gt;To speed up builds that don&#x27;t require interaction with the repository,
you can disable Git operations now. Just specify the Git strategy in your
&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;variables:
  GIT_STRATEGY: none
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;runners&#x2F;configure_runners.html#git-strategy&quot;&gt;Read more about Git Strategies for CI in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;deployment-date-on-merge-request&quot;&gt;Deployment date on Merge Request&lt;&#x2F;h2&gt;

&lt;p&gt;Small, yet sweet change: We now show you right in the merge request when a deploy happened.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_13&#x2F;deployed_ago.png&quot; alt=&quot;See when a deploy happened in GitLab 8.13&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-runner&quot;&gt;GitLab Runner&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.7 today. Most interesting changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Use Go 1.7 - which makes Runner usable on macOS Sierra &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;323&quot;&gt;!323&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Introduce GIT_STRATEGY=none &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;332&quot;&gt;!332&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add OffPeak support for autoscaling &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;345&quot;&gt;!345&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Introduce a variable to enable shell tracing on bash, cmd.exe and powershell.exe &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;339&quot;&gt;!339&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Try to load the InCluster config first, if that fails load kubectl config &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;327&quot;&gt;!327&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Godep: update github.com&#x2F;Sirupsen&#x2F;logrus to v0.10.0 &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;344&quot;&gt;!344&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Use git clone –no-checkout and git checkout –force &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;341&quot;&gt;!341&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Make runner name lowercase to work with GCE restrictions &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;297&quot;&gt;!297&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Add per job before_script handling for exec command &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;355&quot;&gt;!355&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Prevent caching failures from marking a build as failed &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;359&quot;&gt;!359&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Improve registration behavior &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;356&quot;&gt;!356&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;To see the full list of all changes please read &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;v1.7.0&#x2F;CHANGELOG.md&quot;&gt;the Runner&#x27;s CHANGELOG file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost&quot;&gt;GitLab Mattermost&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.13 includes &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;&quot;&gt;Mattermost&lt;&#x2F;a&gt;, an open source Slack-alternative for web, PC and phone with &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;mattermost-3-4&#x2F;&quot;&gt;over 700 app integrations via Zapier&lt;&#x2F;a&gt;.
New integrations this month &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;new-community-integrations-for-open-source-slack-alternative-as-mattermost-prepares-for-3-5&#x2F;&quot;&gt;now support connecting to Slack, Gitter, XMPP, and IRC&lt;&#x2F;a&gt;.
Mattermost now &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;changing-release-cycle-to-bi-monthly-from-monthly&#x2F;&quot;&gt;releases 6 times a year&lt;&#x2F;a&gt; and new updates ship with GitLab in alternate months.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-additions&quot;&gt;API additions&lt;&#x2F;h2&gt;

&lt;p&gt;This release contains several additions to the API. See below for more details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;multi-file-commit&quot;&gt;Multi-file commit&lt;&#x2F;h3&gt;

&lt;p&gt;Thanks to the MVP of this month, Marc, you can now commit multiple
files at once through the API.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;repository_files.html#update-existing-file-in-repository&quot;&gt;See the API docs on committing multiple files&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;issue-board&quot;&gt;Issue Board&lt;&#x2F;h3&gt;

&lt;p&gt;Andre Guedes contributed a full API for Issue Boards. Thanks Andre!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;user-contribution-events&quot;&gt;User contribution events&lt;&#x2F;h3&gt;

&lt;p&gt;You can now get user contribution events through the api.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;users.html#get-user-contribution-events&quot;&gt;API reference on User contribution events&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;visible-projects&quot;&gt;Visible projects&lt;&#x2F;h3&gt;

&lt;p&gt;Thanks to Ben Boeckel, you can now retrieve all projects that are visible
to you, through the API.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;projects.html#list-projects&quot;&gt;Read the projects API docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;performance-changes&quot;&gt;Performance Changes&lt;&#x2F;h2&gt;

&lt;p&gt;CE changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Performance of the group milestones page has been improved: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6457&quot;&gt;!6457&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries executed when processing Markdown references has been decreased: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6457&quot;&gt;!6457&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6545&quot;&gt;!6545&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Sidekiq now uses a connection pool when using the Rails cache: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6468&quot;&gt;!6468&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6657&quot;&gt;!6657&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;CI runners less frequently update the &lt;code&gt;ci_runners&lt;&#x2F;code&gt; table, leading to less database load: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6537&quot;&gt;!6537&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries executed when pushing commits has been reduced slightly: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6680&quot;&gt;!6680&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Trending projects are now pre-calculated on a daily basis and limited to the top 100 projects. This improves performance of the trending projects page: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6749&quot;&gt;!6749&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;When creating a new merge request the diffs are loaded asynchronously: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5844&quot;&gt;!5844&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Resetting a project&#x27;s last activity timestamp no longer relies on Redis leases, reducing the time it takes to refresh this timestamp: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6678&quot;&gt;!6678&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The secret token used for gitlab-shell and the API is now stored in memory, instead of being read from disk on every API request: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6599&quot;&gt;!6599&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries used for checking project policies has been reduced: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6442&quot;&gt;!6442&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The worker used for expiring build artifacts now schedules jobs more efficiently and uses more efficient SQL queries: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6732&quot;&gt;!6732&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Updating merge requests upon a push is now performed using a dedicated Sidekiq worker: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6767&quot;&gt;!6767&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;CI pipeline hooks are now updated asynchronously: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6824&quot;&gt;!6824&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;CI pipeline metrics are now updated using a Sidekiq worker: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6896&quot;&gt;!6896&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Performance and memory usage of the GitHub importer has been improved: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6552&quot;&gt;!6552&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Render timings of award emoji URLs have been improved: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6848&quot;&gt;!6848&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;When creating a project we immediately create a corresponding &lt;code&gt;project_features&lt;&#x2F;code&gt; row, instead of checking for this (and creating the row if needed) whenever we query a project from the database. This reduces the number of queries to retrieve a project from 2 back to 1: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6908&quot;&gt;!6908&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;CI pipeline commits are only updated once a pipeline is created, instead of doing so upon every update: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6986&quot;&gt;!6986&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;CI pipeline durations are only updated at the end of a pipeline, instead of doing so at every state transition: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6987&quot;&gt;!6987&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Updating of project caches now occurs at most every 15 minutes per project.  This may lead to stale statistics (e.g. commit counts) but can significantly reduce disk load: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7017&quot;&gt;!7017&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Sidekiq now uses separate queues for a wide variety of workers: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7006&quot;&gt;!7006&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;CI pipeline jobs are scheduled in a smarter way, preventing multiple jobs using the same parameters from being performed at the same time: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;7005&quot;&gt;!7005&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Cache markdown fields in the database &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6095&quot;&gt;!6095&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;EE changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;GitLab usage data is now cached: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;779&quot;&gt;!779&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Changes to gitlab-shell:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;gitlab-shell now measures the time it takes to perform certain steps and logs these to the gitlab-shell log file using the DEBUG log level: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell&#x2F;merge_requests&#x2F;98&quot;&gt;!98&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell&#x2F;merge_requests&#x2F;100&quot;&gt;!100&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Tracing of Git performance can now be enabled using an environment variable: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell&#x2F;merge_requests&#x2F;91&quot;&gt;!91&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Moving repositories between shards has been improved: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell&#x2F;merge_requests&#x2F;97&quot;&gt;!97&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell&#x2F;merge_requests&#x2F;96&quot;&gt;!96&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;omnibus-gitlab-package-changes&quot;&gt;Omnibus GitLab package changes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Jemalloc is now used as a default memory allocator which should decrease the
memory footprint.&lt;&#x2F;li&gt;
  &lt;li&gt;Bundled NGINX now has a Status endpoint, enabled by default. Thanks to Luis Sagastume!&lt;&#x2F;li&gt;
  &lt;li&gt;Multiple configuration options got introduced in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;compare&#x2F;8-12-stable...8-13-stable#diff-34&quot;&gt;gitlab.rb file&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release contains a significant amount of migrations that require downtime.
Administrators should prepare for at least 30 minutes of downtime. Small
installations (e.g. those with a few hundred projects) should be able to
complete the migration process in 5-10 minutes.&lt;&#x2F;p&gt;

&lt;p&gt;Keep in mind that these times are estimates,
they may vary between installations.&lt;&#x2F;p&gt;

&lt;p&gt;Among the migrations are migrations that:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;add foreign keys to existing tables&lt;&#x2F;li&gt;
  &lt;li&gt;move Sidekiq jobs from one queue to another&lt;&#x2F;li&gt;
  &lt;li&gt;remove duplicate labels&lt;&#x2F;li&gt;
  &lt;li&gt;fix label priorities&lt;&#x2F;li&gt;
  &lt;li&gt;perform other data cleanups&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;sidekiq-queues&quot;&gt;Sidekiq Queues&lt;&#x2F;h3&gt;

&lt;p&gt;This release includes some changes to Sidekiq. Previously GitLab used a limited amount of queues that were hardcoded in &lt;code&gt;bin&#x2F;background_jobs&lt;&#x2F;code&gt; and in Omnibus GitLab. Starting with 8.13 all queue names that are used can be found in &lt;code&gt;config&#x2F;sidekiq_queues.yml&lt;&#x2F;code&gt;. Users using either &lt;code&gt;bin&#x2F;background_jobs&lt;&#x2F;code&gt; to start Sidekiq or Omnibus GitLab don&#x27;t need to make any manual changes. Users building from source may have to make changes to their setup to ensure Sidekiq uses this configuration file. To do so, make sure that Sidekiq is started as follows:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;sidekiq &lt;span class=&quot;nt&quot;&gt;-C&lt;&#x2F;span&gt; path&#x2F;to&#x2F;gitlab&#x2F;config&#x2F;sidekiq_queues.yml
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you are using a custom Sidekiq configuration file you either have to merge the contents of &lt;code&gt;sidekiq_queues.yml&lt;&#x2F;code&gt; into this file (and keep it up to date), or use &lt;code&gt;sidekiq_queues.yml&lt;&#x2F;code&gt; and specify your custom options using the &lt;code&gt;sidekiq&lt;&#x2F;code&gt; CLI.&lt;&#x2F;p&gt;

&lt;p&gt;This configuration file also specifies a weight for every queue. This means a slight increase in Redis load but allows Sidekiq to more fairly distribute work, instead of processing queues in order. Queue names and priorities can not be customized by the user.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_13&#x2F;header.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12.7 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/17/gitlab-8-dot-12-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/17/gitlab-8-dot-12-dot-7-released/</id>
<published>2016-10-17T00:00:00+00:00</published>
<updated>2016-10-17T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.12.7 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;&quot;&gt;recent 8.12
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent running &lt;code&gt;GfmAutocomplete&lt;&#x2F;code&gt; setup for each diff note. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6569&quot;&gt;!6569&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix long commit messages overflow viewport in file tree. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6573&quot;&gt;!6573&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use &lt;code&gt;gitlab-markup&lt;&#x2F;code&gt; gem instead of &lt;code&gt;github-markup&lt;&#x2F;code&gt; to fix &lt;code&gt;.rst&lt;&#x2F;code&gt; file rendering. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6659&quot;&gt;!6659&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent flash alert text from being obscured when container is fluid. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6694&quot;&gt;!6694&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix due date being displayed as &lt;code&gt;NaN&lt;&#x2F;code&gt; in Safari. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6797&quot;&gt;!6797&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix JS bug with select2 because of missing &lt;code&gt;data-field&lt;&#x2F;code&gt; attribute in select box. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6812&quot;&gt;!6812&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not alter &lt;code&gt;force_remove_source_branch&lt;&#x2F;code&gt; options on MergeRequest unless specified. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6817&quot;&gt;!6817&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GFM autocomplete setup being called several times. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6840&quot;&gt;!6840&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle case where deployment ref no longer exists. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6855&quot;&gt;!6855&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Use forked &lt;code&gt;gitlab-markup&lt;&#x2F;code&gt; gem. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1015&quot;&gt;!1015&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/12/gitlab-8-dot-12-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/12/gitlab-8-dot-12-dot-6-released/</id>
<published>2016-10-12T02:35:00+00:00</published>
<updated>2016-10-12T02:35:00+00:00</updated>
<author>
<name>Stan Hu</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.12.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.12.6 contains a fix for the mail_room package not being included in
the package. This update is only necessary for users who use mail_room for
Reply by email.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update mail_room to 0.8.1 in Gemfile.lock (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6814&quot;&gt;!6814&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12.5, 8.11.9, and 8.10.12 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/11/gitlab-8-dot-12-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/11/gitlab-8-dot-12-dot-5-released/</id>
<published>2016-10-11T18:20:00+00:00</published>
<updated>2016-10-11T18:20:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.12.5, 8.11.9, and 8.10.12 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.12.5 contains two security fixes for GitLab, plus fixes for minor
regressions. Versions 8.11.9 and 8.10.12 only contain the security fixes.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Switch from request to env in ::API::Helpers. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6615&quot;&gt;!6615&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update the mail_room gem to 0.8.1 to fix a race condition with the mailbox watching thread. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6714&quot;&gt;!6714&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve issue load time performance by avoiding ORDER BY in find_by call. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6724&quot;&gt;!6724&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a new gitlab:users:clear_all_authentication_tokens task. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6745&quot;&gt;!6745&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t send Private-Token (API authentication) headers to Sentry&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Share projects via the API only with groups the authenticated user can access&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab&lt;&#x2F;strong&gt; Update the storage directory helper to check permissions for symlink targets. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1028&quot;&gt;!1028&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;private-tokens-sent-to-sentry&quot;&gt;Private tokens sent to Sentry&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;em&gt;This vulnerability only affects GitLab instances that use Sentry exception
tracking. This feature is off by default in GitLab.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;As a GitLab administrator you have the option to integrate your GitLab instance
with Sentry, an external exception tracking system. When this feature is
enabled, you can see details of each error (&#x27;500 page&#x27;) that occurs on your
GitLab server. These details include HTTP headers of the request that
experienced the exception. Prior to GitLab 8.12.5, when an exception occurred in
the GitLab API (a URL starting with &lt;code&gt;&#x2F;api&#x2F;v3&#x2F;&lt;&#x2F;code&gt;), GitLab would inadvertently send
the &lt;code&gt;Private-Token&lt;&#x2F;code&gt; header used to authenticate with the GitLab API in the error
report to Sentry. This meant that when you viewed a Sentry error report for an
exception that occurred during a GitLab API request you could see the Private
token of the user that performed the request. This also meant that if there is a
data breach at your Sentry server, GitLab user private tokens may be exposed.&lt;&#x2F;p&gt;

&lt;p&gt;The holder of the private token for a GitLab user can impersonate that user in
GitLab via the API. That includes writing comments, adding SSH keys, creating
repositories. The holder of the private token of a GitLab administrator is able
to do much more, for instance creating new user accounts. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22537&quot;&gt;#22537&lt;&#x2F;a&gt; for more
information.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mitigation&quot;&gt;Mitigation&lt;&#x2F;h3&gt;

&lt;p&gt;Even though private tokens are not sent to Sentry starting with GitLab 8.12.5,
the tokens are valid forever as long as they are in the GitLab database.&lt;&#x2F;p&gt;

&lt;p&gt;That&#x27;s why we &lt;strong&gt;strongly&lt;&#x2F;strong&gt; advise you to invalidate all your users&#x27; Private
tokens with &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;raketasks&#x2F;user_management.html#clear-authentication-tokens-for-all-users.-important-data-loss&quot;&gt;the following Rake task&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# omnibus-gitlab
sudo gitlab-rake gitlab:users:clear_all_authentication_tokens

# installation from source
bundle exec rake gitlab:users:clear_all_authentication_tokens RAILS_ENV=production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;New tokens will automatically be issued once users sign-in.&lt;&#x2F;p&gt;

&lt;p&gt;As a less secure alternative (or as an additional precaution), you can also
&lt;a href=&quot;https:&#x2F;&#x2F;docs.sentry.io&#x2F;learn&#x2F;sensitive-data&#x2F;#removing-data&quot;&gt;clear the exception history for your GitLab instance in Sentry&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Note: At any time, individual GitLab users can reset their private token on
their &lt;code&gt;Account&lt;&#x2F;code&gt; page (&lt;code&gt;&#x2F;profile&#x2F;account&lt;&#x2F;code&gt;).&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-the-share-project-with-group-api-endpoint&quot;&gt;Information disclosure via the &quot;Share project with group&quot; API endpoint&lt;&#x2F;h2&gt;

&lt;p&gt;The new implementation of the &quot;Share project with group&quot; API endpoint allowed
projects to be shared with groups that the current user wasn&#x27;t allowed to see,
leaking the group name and the name of its owners. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;23004&quot;&gt;#23004&lt;&#x2F;a&gt; for more
information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12 Release Webcast: Cycle Analytics &amp; Global Code Search</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/07/8-dot-12-cycle-analytics-webcast/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/07/8-dot-12-cycle-analytics-webcast/</id>
<published>2016-10-07T00:00:00+00:00</published>
<updated>2016-10-07T00:00:00+00:00</updated>
<author>
<name>Erica Lindberg</name>
</author>
<content type='html'>&lt;p&gt;In the &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;13&#x2F;gitlab-master-plan&#x2F;&quot;&gt;GitLab Master Plan&lt;&#x2F;a&gt;, we promised to ship the entire development lifecycle before the end of the year. &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;&quot;&gt;GitLab 8.12&lt;&#x2F;a&gt; is 
exciting because it brings us one step closer to realizing our &lt;a href=&quot;&#x2F;direction&#x2F;#vision&quot;&gt;vision&lt;&#x2F;a&gt; to be an integrated set of tools for the software development lifecycle.&lt;&#x2F;p&gt;

&lt;p&gt;In this release, we launched the first iteration of &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;21&#x2F;cycle-analytics-feature-highlight&#x2F;&quot;&gt;Cycle Analytics&lt;&#x2F;a&gt;. Cycle Analytics gives you 
feedback on your projects, measuring how long it takes your team to go from idea to production. Cycle Analytics helps you
reduce cycle time, an important competitive advantage in today&#x27;s development landscape. In fact, reducing cycle time to increase effectiveness is the
very first principle of &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;14&#x2F;gitlab-live-event-recap&#x2F;#convdev&quot;&gt;Conversational Development&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We also launched &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;#global-code-search-ee&quot;&gt;Global Code Search&lt;&#x2F;a&gt; for GitLab Enterprise Edition (EE). If you&#x27;re running Elasticsearch on your 
GitLab EE instance, you can now search through all the code on your server.&lt;&#x2F;p&gt;

&lt;p&gt;In this webcast, we walk through our vision, and demo some of the key features from &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;&quot;&gt;GitLab 8.12&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;in-this-webcast&quot;&gt;In this webcast:&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Introduction to GitLab and our vision&lt;&#x2F;li&gt;
  &lt;li&gt;Why Cycle Analytics?&lt;&#x2F;li&gt;
  &lt;li&gt;Introduction to Cycle Analytics&lt;&#x2F;li&gt;
  &lt;li&gt;8.12 Feature Release Demo&lt;&#x2F;li&gt;
  &lt;li&gt;What’s next&lt;&#x2F;li&gt;
  &lt;li&gt;Q&amp;amp;A&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;recording--slides&quot;&gt;Recording &amp;amp; Slides&lt;&#x2F;h2&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;EhiZdlkcNLI&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
&lt;iframe src=&quot;https:&#x2F;&#x2F;docs.google.com&#x2F;presentation&#x2F;d&#x2F;1ghixhx1EyCtDbBgW5ejZkkamNhlKAenGfCRS_9DDKBE&#x2F;embed?start=false&amp;amp;loop=false&amp;amp;delayms=3000&quot; frameborder=&quot;0&quot; width=&quot;960&quot; height=&quot;569&quot; allowfullscreen=&quot;true&quot; mozallowfullscreen=&quot;true&quot; webkitallowfullscreen=&quot;true&quot;&gt;&lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h2 id=&quot;key-takeaways&quot;&gt;Key Takeaways&lt;&#x2F;h2&gt;

&lt;p&gt;In case you don&#x27;t have time to watch the full video, here are the highlights.&lt;&#x2F;p&gt;

&lt;div class=&quot;panel panel-gitlab-orange&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;GitLab Built-in Integrations&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;GitLab has an integrated set of tools that supports the entire lifecycle of software development, including repository management, version control, 
code review, advanced issue tracker, Issue Board, built-in &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;05&#x2F;continuous-integration-delivery-and-deployment-with-gitlab&#x2F;&quot;&gt;Continuous Integration, Continuous Deployment, Continuous Delivery&lt;&#x2F;a&gt;, and wiki, and now, &lt;strong&gt;Cycle Analytics&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;div class=&quot;panel panel-success&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;Faster From Idea to Production&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;Our goal is to help teams go &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;05&#x2F;continuous-integration-delivery-and-deployment-with-gitlab&#x2F;#from-idea-to-production-with-gitlab&quot;&gt;faster from idea to production&lt;&#x2F;a&gt; by building a completely integrated toolset in a single UI.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;div class=&quot;panel panel-gitlab-purple&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;10-Step lifecycle&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;We will ship this complete lifecycle in 2016.&lt;&#x2F;p&gt;

    &lt;ol&gt;
      &lt;li&gt;Chat conversation → &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;08&#x2F;18&#x2F;gitlab-loves-mattermost&#x2F;&quot;&gt;Mattermost ships with GitLab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Issue creation → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;03&#x2F;03&#x2F;start-with-an-issue&#x2F;&quot;&gt;GitLab Issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Planning board → &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;issueboard&#x2F;&quot;&gt;GitLab Issue Board&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;IDE → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;07&#x2F;26&#x2F;koding-and-gitlab-integrated&#x2F;&quot;&gt;Koding + GitLab&lt;&#x2F;a&gt; Integration&lt;&#x2F;li&gt;
      &lt;li&gt;Version control → GitLab Repositories&lt;&#x2F;li&gt;
      &lt;li&gt;Continuous Integration → &lt;a href=&quot;&#x2F;features&#x2F;continuous-integration&#x2F;&quot;&gt;GitLab CI&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;05&#x2F;23&#x2F;gitlab-container-registry&#x2F;&quot;&gt;GitLab Container Registry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Code review → GitLab Merge Requests&lt;&#x2F;li&gt;
      &lt;li&gt;Continuous Delivery → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;05&#x2F;continuous-integration-delivery-and-deployment-with-gitlab&#x2F;&quot;&gt;GitLab Deploy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Chatops → We&#x27;re planning to ship &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1412&quot;&gt;Cog&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Feedback → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;21&#x2F;cycle-analytics-feature-highlight&#x2F;&quot;&gt;Cycle Analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;div class=&quot;panel panel-info&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;New features&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;21&#x2F;cycle-analytics-feature-highlight&#x2F;&quot;&gt;Cycle Analytics&lt;&#x2F;a&gt;, &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;#global-code-search-ee&quot;&gt;Global Code Search&lt;&#x2F;a&gt;, and &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;#merge-request-versions&quot;&gt;Merge Request Versions&lt;&#x2F;a&gt; are awesome features and you should really check them out.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;h2 id=&quot;amplify-your-code-at-gitlab-world-tour&quot;&gt;Amplify Your Code at GitLab World Tour&lt;&#x2F;h2&gt;

&lt;p&gt;Join us for the &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;28&#x2F;world-tour-amplify-your-code&#x2F;&quot;&gt;GitLab World Tour&lt;&#x2F;a&gt; to learn more about our product vision, talk about changes in software development, and meet
other GitLab team-members in your area! We&#x27;ll be in three cities:&lt;&#x2F;p&gt;

&lt;p&gt;Register for an event near you:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlabworldtourlondon.splashthat.com&#x2F;&quot;&gt;London&lt;&#x2F;a&gt; - October 19&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlabworldtournyc.splashthat.com&#x2F;&quot;&gt;NYC&lt;&#x2F;a&gt; - October 26&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlabworldtouramsterdam.splashthat.com&#x2F;&quot;&gt;Amsterdam&lt;&#x2F;a&gt; - November 3&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;!-- identifiers --&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;8-12-highlights.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/10/05/gitlab-8-dot-12-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/10/05/gitlab-8-dot-12-dot-4-released/</id>
<published>2016-10-05T00:00:00+00:00</published>
<updated>2016-10-05T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.12.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version contains two security fixes for GitLab, plus fixes for minor regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;&quot;&gt;recent 8.12
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Indexer works with smaller batches of repositories to not exceed NOFILE limit. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;774&quot;&gt;!774&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix tooltip text when Copy to cliboard is clicked. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6294&quot;&gt;!6294&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix build sidebar build details padding. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6506&quot;&gt;!6506&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Changed compare dropdowns to dropdowns with search input. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6550&quot;&gt;!6550&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix race condition on LFS Token. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6592&quot;&gt;!6592&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug when trying to cache closed issues from external issue trackers. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6619&quot;&gt;!6619&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix lint-doc error. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6623&quot;&gt;!6623&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Skip wiki creation when GitHub project has wiki enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6665&quot;&gt;!6665&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issues importing services via Import&#x2F;Export. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6667&quot;&gt;!6667&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restrict failed login attempts for users with 2FA. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6668&quot;&gt;!6668&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project deletion when feature visibility is set to private. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6688&quot;&gt;!6688&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;further-improvements-for-security-of-importexport-projects&quot;&gt;Further improvements for security of Import&#x2F;Export projects.&lt;&#x2F;h2&gt;

&lt;p&gt;Prevented access to foreign entities using the Import&#x2F;Export functionality. This could be achieved altering the foreign key IDs in the project JSON of an exported GitLab project file. The foreign keys are now always being ignored at the time of importing a project. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;20821&quot;&gt;#20821&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;exported-projects-were-world-readable-in-the-filesystem&quot;&gt;Exported projects were world-readable in the filesystem&lt;&#x2F;h2&gt;

&lt;p&gt;Exported projects are no longer world-readable in the GitLab server filesystem as permissions are set to owner access only. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22757&quot;&gt;#22757&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;prevent-a-2fa-brute-force-attack&quot;&gt;Prevent a 2FA brute force attack&lt;&#x2F;h2&gt;

&lt;p&gt;Incorrect two-factor authentication (2FA) code submissions were not incrementing
the number of failed login attempts as intended, leading to a possible brute
force attack on accounts with 2FA enabled. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;19799&quot;&gt;#19799&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;yaworsk&quot;&gt;Pete Yaworski&lt;&#x2F;a&gt; for responsibly
disclosing this issue via &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gitlab&quot;&gt;HackerOne&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12.3, 8.11.8, 8.10.11 and 8.9.11 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/29/gitlab-8-12-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/29/gitlab-8-12-3-released/</id>
<published>2016-09-29T00:00:00+00:00</published>
<updated>2016-09-29T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.12.3, 8.11.8, 8.10.11 and 8.9.11 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.12.3 contains some security fixes for GitLab, plus fixes for minor
regressions. Version 8.11.8, 8.10.11, and 8.9.11 only contain the security fixes.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;re wondering what happened to 8.12.2, good eye! That version was accidentally packaged without including some fixes for the CE version.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Enforce the &lt;code&gt;fork_project&lt;&#x2F;code&gt; permission in &lt;code&gt;Projects::CreateService&lt;&#x2F;code&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Set a restrictive CORS policy for the API.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; API: Disable Rails session auth for non-GET&#x2F;HEAD requests.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Escape HTML nodes in builds commands in CI linter.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Send ajax request for label update only if they are changed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5071&quot;&gt;!5071&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pass the full project path for resolve buttons. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6129&quot;&gt;!6129&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix list issues not loading with spaces in filtered values. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6258&quot;&gt;!6258&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix LDAP omniauth regression (Closes: #22357). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6462&quot;&gt;!6462&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix awards dropdown search text from repeating. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6498&quot;&gt;!6498&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue with rails reserved keyword type exporting&#x2F;importing services. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6499&quot;&gt;!6499&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix snippets pagination. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6500&quot;&gt;!6500&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Wrap &lt;code&gt;List-Unsubscribe&lt;&#x2F;code&gt; link in angle brackets. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6511&quot;&gt;!6511&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the &quot;Commits&quot; section of the cycle analytics summary. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6513&quot;&gt;!6513&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Import&#x2F;Export milestone and 1to1 models issue. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6521&quot;&gt;!6521&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump Gitlab Shell to support low IO priority for storage moves. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6525&quot;&gt;!6525&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add &lt;code&gt;v-cloak&lt;&#x2F;code&gt; to resolve disc button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6528&quot;&gt;!6528&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Be nice to Docker Clients talking to JWT&#x2F;auth. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6536&quot;&gt;!6536&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;IssuesController#show&lt;&#x2F;code&gt; degradation including project on loaded notes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6540&quot;&gt;!6540&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pipelines table headers. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6542&quot;&gt;!6542&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not regenerate the &lt;code&gt;lfs_token&lt;&#x2F;code&gt; every time &lt;code&gt;git-lfs-authenticate&lt;&#x2F;code&gt; is called. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6551&quot;&gt;!6551&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Change the &lt;code&gt;v-cloak&lt;&#x2F;code&gt; attr to hash rocket and string &#x27;true&#x27;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6553&quot;&gt;!6553&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix duplicate master entries in the merge request versions dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6567&quot;&gt;!6567&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; ES: Fix internal data exposure. (8.12.2 only)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add missing URL param to ajax call. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;760&quot;&gt;!760&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Ignore unknown project ID in RepositoryUpdateMirrorWorker. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;754&quot;&gt;!754&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix prevent_secrets checkbox on admin view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;761&quot;&gt;!761&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab&lt;&#x2F;strong&gt; Update openssl to 1.0.2j to get the latest security fixes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1006&quot;&gt;!1006&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab&lt;&#x2F;strong&gt; Update to latest cacerts file. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1007&quot;&gt;!1007&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;information-disclosure-through-global-code-search&quot;&gt;Information disclosure through Global Code Search&lt;&#x2F;h2&gt;

&lt;p&gt;The new Global Code Search feature introduced in &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;&quot;&gt;GitLab 8.12.0&lt;&#x2F;a&gt; was returning titles of projects,
milestones, issues, and merge requests from internal projects to anonymous. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;1046&quot;&gt;#1046&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;strong&gt;Christian Bönning&lt;&#x2F;strong&gt; for reporting this issue.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-restrictive-cors-policy&quot;&gt;API: Restrictive CORS policy&lt;&#x2F;h2&gt;

&lt;p&gt;Previous versions set &lt;code&gt;Access-Control-Allow-Credentials: true&lt;&#x2F;code&gt; for all origins in their CORS policy.
Combined with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18302&quot;&gt;#18302&lt;&#x2F;a&gt;, this resulted in a JavaScript request spoofing vulnerability. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22450&quot;&gt;#22450&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-csrf-protection&quot;&gt;API: CSRF protection&lt;&#x2F;h2&gt;

&lt;p&gt;Issue &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18302&quot;&gt;#18302&lt;&#x2F;a&gt; also introduced a vulnerability allowing third-party websites to spoof API requests using forms,
which is mitigated in these releases. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;22435&quot;&gt;#22435&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;wrong-permission-enforcement-in-forkservice&quot;&gt;Wrong permission enforcement in ForkService&lt;&#x2F;h2&gt;

&lt;p&gt;A user with the &quot;Guest&quot; role could fork a project, and therefore gain access to the code,
even though this was restricted to the &quot;Reporter&quot; level and above.
See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18028&quot;&gt;#18028&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/23/gitlab-8-dot-12-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/23/gitlab-8-dot-12-dot-1-released/</id>
<published>2016-09-23T00:00:00+00:00</published>
<updated>2016-09-23T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.12.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;09&#x2F;22&#x2F;gitlab-8-12-released&#x2F;&quot;&gt;recent 8.12
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Prevent secrets being pushed into repository. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;731&quot;&gt;!731&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix typo in protected_branches usage data. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;758&quot;&gt;!758&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed search dropdown labels not displaying.(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6277&quot;&gt;!6277&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a memory leak in HTML::Pipeline::SanitizationFilter::WHITELIST. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6456&quot;&gt;!6456&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Makes Cycle analytics mobile friendly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6482&quot;&gt;!6482&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Cycle Analytics landing widget state and improve state management in Vue. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6492&quot;&gt;!6492&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add link to broadcast messages docs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6495&quot;&gt;!6495&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Fix backslash issues in sv&#x2F;gitlab-workhorse&#x2F;run. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;1005&quot;&gt;!1005&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.12 Released with Cycle Analytics and Global Code Search</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/22/gitlab-8-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/22/gitlab-8-12-released/</id>
<published>2016-09-22T00:00:00+00:00</published>
<updated>2016-09-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Whether you&#x27;re working on a small or a large project, your tools should get out of your way and give you actionable feedback. This month, we&#x27;re making sure GitLab does both better than ever.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 8.12 gives you feedback on how efficiently you actually work, helps you find code across the entire instance, makes your workflow much safer with a single click, and much more.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
James Munnelly for contributing the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;30&quot;&gt;Kubernetes executor in the GitLab CI runner&lt;&#x2F;a&gt;.
This feature allows users to run CI tests in a Kubernetes cluster easily.
James created this merge request over a year ago and showed great patience
and persistence in the review process to see it to completion.
Thanks, James!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;cycle-analytics&quot;&gt;Cycle Analytics&lt;&#x2F;h2&gt;

&lt;p&gt;Reducing cycle time, the time it takes you to go from idea all the way to
production, is the &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;14&#x2F;gitlab-live-event-recap&#x2F;#convdev&quot;&gt;first principle of conversational development&lt;&#x2F;a&gt;.
The shorter the cycle time, the higher the efficiency of your team.&lt;&#x2F;p&gt;

&lt;p&gt;In order to make it possible to actually see what your cycle time is, we&#x27;re
introducing &lt;a href=&quot;&#x2F;2016&#x2F;09&#x2F;21&#x2F;cycle-analytics-feature-highlight&#x2F;&quot;&gt;Cycle Analytics&lt;&#x2F;a&gt; with GitLab 8.12.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;cycle_analytics.png&quot; alt=&quot;Cycle Analytics in GitLab 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Cycle Analytics tells you what your cycle time is and breaks it down into
several steps, so you can quickly see where to improve and accurately predict
when you&#x27;re shipping something.&lt;&#x2F;p&gt;

&lt;p&gt;Find Cycle Analytics under Pipelines in all your projects.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;analytics&#x2F;value_stream_analytics.html&quot;&gt;documentation for Cycle Analytics&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;global-code-search-ee&quot;&gt;Global Code Search (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;If you&#x27;re running Elasticsearch on your GitLab Enterprise Edition instance,
you will now be able to search through &lt;em&gt;all&lt;&#x2F;em&gt; code on the server!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;search.gif&quot; alt=&quot;Global code search in GitLab EE 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Just use the search as before and GitLab will show you matching code from each
project you have access to.&lt;&#x2F;p&gt;

&lt;p&gt;Note that this change requires that you rebuild your Elasticsearch index.
See the upgrade barometer below for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-versions&quot;&gt;Merge Request Versions&lt;&#x2F;h2&gt;

&lt;p&gt;When you&#x27;re pushing more than a single commit to a merge request,
it can be hard to view what changed between versions and the target branch.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;mr_versions.png&quot; alt=&quot;Merge Request Versions in GitLab 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With merge request versions you can view previous states of a merge request: compare between a previous commit and the target branch or even between versions, showing you what has changed between certain commits.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;versions.html&quot;&gt;documentation for Merge request revisions&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;preventing-secrets-in-your-repositories-ee&quot;&gt;Preventing Secrets in your repositories (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;It&#x27;s a bad idea to commit secrets (such as keys and certificates) to your repositories: they&#x27;ll be cloned to the machines of anyone that has access to the repository, only one of which has to be insecure for the information to be compromised.&lt;&#x2F;p&gt;

&lt;p&gt;Yet it happens quite easily. You write &lt;code&gt;git commit -am &#x27;quickfix&#x27; &amp;amp;&amp;amp; git push&lt;&#x2F;code&gt; and suddenly you&#x27;ve committed files that were meant to stay local!&lt;&#x2F;p&gt;

&lt;p&gt;GitLab now has a new push rule that will prevent commits with secrets from entering the repository. Just check the checkbox and GitLab will prevent common unsafe files such as &lt;code&gt;.pem&lt;&#x2F;code&gt; and &lt;code&gt;.key&lt;&#x2F;code&gt; from being committed.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;secrets.png&quot; alt=&quot;Prevent secrets in your repo in GitLab EE 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Enterprise Edition already had a feature that allows you to block files based on a regular expression, which you can leverage to block anything that we didn&#x27;t think of. We also welcome suggestions and contributions to make this push rule even better.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;push_rules&#x2F;push_rules.html#prevent-pushing-secrets-to-the-repository&quot;&gt;documentation on Push rules&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;review-apps-experimental&quot;&gt;Review Apps (Experimental)&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve made several additions to CI that, when combined, make some magic.&lt;&#x2F;p&gt;

&lt;p&gt;You can now use predefined CI variables as a name for environments. In addition, you can specify a URL for the environment configuration in your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file. Together, these features bring the first iteration of Review Apps.&lt;&#x2F;p&gt;

&lt;p&gt;Review apps are automatically-created environments that run your code for each branch. That means merge requests can be reviewed in a live-running environment. This was inspired by &lt;a href=&quot;https:&#x2F;&#x2F;devcenter.heroku.com&#x2F;articles&#x2F;github-integration-review-apps&quot;&gt;Heroku&#x27;s Review Apps&lt;&#x2F;a&gt; which itself was inspired by &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;rainforestapp&#x2F;fourchette&quot;&gt;Fourchette&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;These are small changes, but will make a huge impact on your development flow.
Reviewing anything from performance to interface changes becomes much easier
with a live environment.&lt;&#x2F;p&gt;

&lt;p&gt;Right now, Review Apps are labelled experimental, as the environments are not automatically destroyed when no longer necessary.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;blog-posts&#x2F;issues&#x2F;275&quot;&gt;working on a blog post&lt;&#x2F;a&gt; that will have an example.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssh-authentication-for-lfs&quot;&gt;SSH Authentication for LFS&lt;&#x2F;h2&gt;

&lt;p&gt;If you&#x27;re used to using SSH for your Git pushes, it was frustrating to
still have to enter credentials whenever using LFS.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab will now leverage your SSH key when using LFS, meaning that if you&#x27;re
using LFS while connecting through SSH, you no longer have to manually
enter your credentials!&lt;&#x2F;p&gt;

&lt;p&gt;File transfers of LFS still happen over HTTP.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;toggle-lfs&quot;&gt;Toggle LFS&lt;&#x2F;h2&gt;

&lt;p&gt;Git LFS (Large File Storage) is great, but as the name implies, it can have
significant impact on your disk capacity. To make you feel a bit more secure about the LFS usage on your instance, you can now toggle LFS on instance, group, and project levels.&lt;&#x2F;p&gt;

&lt;p&gt;For instance, as a GitLab administrator, you can decide to turn off LFS for the entire instance, yet enable it for only a single group or project.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;limit-project-size-ee&quot;&gt;Limit Project Size (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;As an alternative to restricting LFS, you might just want to prevent projects
from growing too large. You can now limit project size. This will take into account all repository data and LFS objects and stop any commits that will surpass that limit.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;repo_size.png&quot; alt=&quot;Limit project size in GitLab EE 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can set a global project limit and override that on group and project level, as an admin. This way, you can give particular projects extra space if necessary.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read mote in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;account_and_limit_settings.html#repository-size-limit&quot;&gt;documentation about limiting the repository size&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;ldapactive-directory-improvements&quot;&gt;LDAP&#x2F;Active Directory Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;This release contains several improvements to LDAP&#x2F;Active Directory support
for GitLab CE and EE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;CE&#x2F;EE - Request only the LDAP user&#x2F;group attributes that GitLab requires (CE &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6187&quot;&gt;!6187&lt;&#x2F;a&gt; and EE &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;712&quot;&gt;!712&lt;&#x2F;a&gt;), reducing the amount of data across the wire between GitLab and the LDAP&#x2F;Active Directory server. This also decreases the object memory footprint within GitLab.&lt;&#x2F;li&gt;
  &lt;li&gt;EE - Faster Active Directory nested group and ranged member (large group) retrieval (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;719&quot;&gt;!719&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;EE - Add &#x27;Sync now&#x27; option to group membership page when LDAP group links are present (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;704&quot;&gt;!704&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;recover-2fa-tokens-through-ssh&quot;&gt;Recover 2FA tokens through SSH&lt;&#x2F;h2&gt;

&lt;p&gt;You can now recover your 2FA security codes using SSH. This should make it
easier to recover your account, while still maintaining a level of security.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;account&#x2F;two_factor_authentication.html#generate-new-recovery-codes-using-ssh&quot;&gt;documentation about recovering 2FA via SSH&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;filter-tags-by-name&quot;&gt;Filter Tags by Name&lt;&#x2F;h2&gt;

&lt;p&gt;Want to quickly find a tag? That&#x27;s much easier now with a handy little filter on top:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;tag_filter.png&quot; alt=&quot;Filter tags by name in GitLab 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-additions&quot;&gt;API additions&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve expanded our API on several points with GitLab 8.12:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Allow to set &lt;code&gt;request_access_enabled&lt;&#x2F;code&gt; for groups and projects using API&lt;&#x2F;li&gt;
  &lt;li&gt;Add &lt;code&gt;notification_settings&lt;&#x2F;code&gt; API calls&lt;&#x2F;li&gt;
  &lt;li&gt;Add a &lt;code&gt;BroadcastMessage&lt;&#x2F;code&gt; API&lt;&#x2F;li&gt;
  &lt;li&gt;You can now fork to a specific namespace through the API&lt;&#x2F;li&gt;
  &lt;li&gt;Allow to set enable&#x2F;disable access request for groups and projects.&lt;&#x2F;li&gt;
  &lt;li&gt;Add &lt;code&gt;web_url&lt;&#x2F;code&gt; field to issue, merge request, and snippet objects.  (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Expose &lt;code&gt;sha&lt;&#x2F;code&gt; and &lt;code&gt;merge_commit_sha&lt;&#x2F;code&gt; in merge request API.  (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Expose issue confidentiality flag.  (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Added &lt;code&gt;only_allow_merge_if_build_succeeds&lt;&#x2F;code&gt; project setting.  (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Add endpoint to lint your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file.  (community contribution)&lt;&#x2F;li&gt;
  &lt;li&gt;Add an API to list manual actions on Environments and Deployments&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;improved-github-importer&quot;&gt;Improved GitHub Importer&lt;&#x2F;h2&gt;

&lt;p&gt;Our GitHub importer keeps getting better, making it easier to migrate to
GitLab. With GitLab 8.12, the importer will also copy release notes over to
GitLab and now lets you choose the namespace you want your imported projects
to go into.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;gh_namespace.png&quot; alt=&quot;Improved GitHub importer in GitLab 8.12&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This should make it easier to migrate if you already have existing projects
or prefer something different than GitLab&#x27;s way of importing your projects.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;import&#x2F;github.html&quot;&gt;documentation about importing your repositories from GitHub&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;bulk-update-merge-requests&quot;&gt;Bulk update Merge Requests&lt;&#x2F;h2&gt;

&lt;p&gt;You can now bulk update merge requests. This means you can set the status, assignee, milestone, label or subscription to multiple merge requests at once.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;bulk.gif&quot; alt=&quot;Bulk update Merge Requests in GitLab 8.12&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Managing merge-request-heavy project should be a lot easier with this!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6226&quot;&gt;!6226&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;build-grouping&quot;&gt;Build Grouping&lt;&#x2F;h2&gt;

&lt;p&gt;If you have many similar builds, your pipeline graph becomes very long. We&#x27;ve made a small change to improve this: similar builds will now automatically group together.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_12&#x2F;build_grouping.png&quot; alt=&quot;Build grouping in GitLab 8.12&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;expanded-syntax-highlighting&quot;&gt;Expanded syntax highlighting&lt;&#x2F;h2&gt;

&lt;p&gt;By upgrading to &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jneen&#x2F;rouge&quot;&gt;rouge&lt;&#x2F;a&gt; 2.0.6, we&#x27;ve added syntax highlighting for JSX, Prometheus, mxml, 1c, turtle&#x2F;trig, vhdl, and improved highlighting for Swift 3.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sentry-integration-of-workhorse&quot;&gt;Sentry integration of Workhorse&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab-Workhorse can now report application errors to Sentry.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;blob&#x2F;master&#x2F;README.md#error-tracking&quot;&gt;Read more in the GitLab-Workhorse docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;gitlab-runner-16&quot;&gt;GitLab Runner 1.6&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.6 today. Some highlights:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Kubernetes executor (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;30&quot;&gt;!30&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-multi-runner&#x2F;merge_requests&#x2F;277&quot;&gt;!277&lt;&#x2F;a&gt;), this allows Kubernetes to automatically scale the number of CI runners. All your builds will be processed immediately without having idle machines running when it&#x27;s not busy.&lt;&#x2F;li&gt;
  &lt;li&gt;Autocompletion of &lt;em&gt;&#x2F;ci&lt;&#x2F;em&gt; in GitLab URL while registering the Runner (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;289&quot;&gt;!289&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Configuration options for specifying scripts executed before clone&#x2F;fetch is done and before build script is executed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;106&quot;&gt;!106&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Improvements in passing CA certificates to builds (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;299&quot;&gt;!299&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Improvement in disabling recursive submodules fetching&#x2F;cloning (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;314&quot;&gt;!314&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Improve docker machine logging (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;234&quot;&gt;!234&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Add possibility to specify a list of volumes to inherit from another container (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;236&quot;&gt;!236&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Generate a &lt;code&gt;BuildError&lt;&#x2F;code&gt; instead of &lt;code&gt;SystemError&lt;&#x2F;code&gt; when Docker&#x2F;Kubernetes image is missing (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;295&quot;&gt;!295&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;To see the full list of all changes please read &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the Runner&#x27;s CHANGELOG file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost-34&quot;&gt;GitLab Mattermost 3.4&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.12 includes &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;mattermost-3-4&#x2F;&quot;&gt;Mattermost 3.4&lt;&#x2F;a&gt;,
an &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&quot;&gt;open source Slack-alternative&lt;&#x2F;a&gt; whose newest
release offers 700 integrations with full Markdown support via Zapier,
simplified bot and 3rd party authentication via OAuth2, and community
integrations with Gitter, Heroku, Pivotal Tracker, Chef, Ansible and Yunohost.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-improvements&quot;&gt;Performance Improvements&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Sidekiq processes now use a connection pool when using Rails&#x27; caching
mechanism: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6429&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The &lt;code&gt;oj&lt;&#x2F;code&gt; Gem is now used for faster JSON processing: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6395&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The column &lt;code&gt;projects.last_activity_at&lt;&#x2F;code&gt; is only updated once an hour to reduce
database load: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6391&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The column &lt;code&gt;projects.pushes_since_gc&lt;&#x2F;code&gt; has been moved from the database to
Redis to reduce database load: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6326&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Protected branch checks are not performed when no branch name is known,
reducing time spent in this process: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6317&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Checking if one can resolve a note is only done when notes can be resolved in
the first place: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6298&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The &lt;code&gt;ci_runners&lt;&#x2F;code&gt; table is now updated less frequently to reduce database load:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6126&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The number of database queries used for the &quot;Builds&quot; tab for
commits&#x2F;merge requests has been reduced: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5957&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The payload size for the contributions calendar has been reduced:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5784&quot;&gt;merge request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;build-permissions-changes&quot;&gt;Build permissions changes&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.12 brings very important changes to build permissions.&lt;&#x2F;p&gt;

&lt;p&gt;We decided that build permissions should be tightly integrated with the
permissions of the user triggering a build for the following reasons:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;We already have a permission system in place: group and project membership of
users.&lt;&#x2F;li&gt;
  &lt;li&gt;We already know who is triggering a build (using git push, using web,
executing triggers).&lt;&#x2F;li&gt;
  &lt;li&gt;We already know what that user is allowed to do.&lt;&#x2F;li&gt;
  &lt;li&gt;We use the user&#x27;s permissions for builds that are triggered by pusher.&lt;&#x2F;li&gt;
  &lt;li&gt;It is simple and convenient that your build can access everything that you
have access to.&lt;&#x2F;li&gt;
  &lt;li&gt;We can issue a short-lived unique tokens, granting access for the duration of
the build.&lt;&#x2F;li&gt;
  &lt;li&gt;It fits very well into our philosophy of having everything integrated.&lt;&#x2F;li&gt;
  &lt;li&gt;This provides a lot of possibilities to further enforce user permissions, such
as allowing only specific users to access runners, secure variables and
environments.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Now, any build that was triggered by the user is also signed with his
permissions. When a user does &lt;code&gt;git push&lt;&#x2F;code&gt; or modifies files through the UI (&lt;strong&gt;the
pusher&lt;&#x2F;strong&gt;), we will create a new Pipeline. The Pipeline will be owned by the
pusher. So builds created in this pipeline will have the permissions of &lt;strong&gt;the
pusher&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This allows us to make it easy to evaluate access for all dependent projects and
container images that the pusher would have access too. The permission is
granted only for the duration of the build. The access is revoked after the
build is finished.&lt;&#x2F;p&gt;

&lt;p&gt;For detailed information about the build permissions and the changes it brings
please see &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;permissions.html#build-permissions&quot;&gt;our documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For the history and reasoning behind this change, you can read the full
discussion in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18994&quot;&gt;the issue&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;submodules-in-ci&quot;&gt;Submodules in CI&lt;&#x2F;h2&gt;

&lt;p&gt;Submodules were one of the reasons we redesigned the build permissions.
Now using Submodules in your CI builds is easy.&lt;&#x2F;p&gt;

&lt;p&gt;To use submodules you have to use a &lt;code&gt;.gitmodules&lt;&#x2F;code&gt; file, which looks something
like this:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ini&quot;&gt;&lt;code&gt;&lt;span class=&quot;nn&quot;&gt;[submodule &quot;tools&quot;]&lt;&#x2F;span&gt;
    &lt;span class=&quot;py&quot;&gt;path&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;tools&lt;&#x2F;span&gt;
    &lt;span class=&quot;py&quot;&gt;url&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;git@gitlab.com&#x2F;group&#x2F;tools.git&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;To use the new build permissions for your submodules you have to convert your
URLs to be relative:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ini&quot;&gt;&lt;code&gt;&lt;span class=&quot;nn&quot;&gt;[submodule &quot;tools&quot;]&lt;&#x2F;span&gt;
    &lt;span class=&quot;py&quot;&gt;path&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;tools&lt;&#x2F;span&gt;
    &lt;span class=&quot;py&quot;&gt;url&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;..&#x2F;..&#x2F;group&#x2F;tools.git&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;This will instruct Git to use the same credentials as it would for checking out
your project sources.&lt;&#x2F;p&gt;

&lt;p&gt;The last step is to tell GitLab CI to fetch submodules:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight yaml&quot;&gt;&lt;code&gt;&lt;span class=&quot;na&quot;&gt;before_script&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt;
  &lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;git submodule update --init --recursive&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You can read more about support for submodules in our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;new_ci_build_permissions_model.html#git-submodules&quot;&gt;documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the Changelog&lt;&#x2F;a&gt;
to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release requires downtime due to foreign keys being added, column types
being changed, and various columns being removed from some tables. The whole
migration process could take up to 30 minutes for large instances. Smaller instances should expect a downtime of about 10-15 minutes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ee-only-elasticsearch-re-indexing&quot;&gt;(EE Only) Elasticsearch re-indexing&lt;&#x2F;h3&gt;

&lt;p&gt;We changed the structure of Elasticsearch index for repositories, making use of Parent Child relationships. This requires a total rebuild of the ES index. Also
Elasticsearch 2.3.x contains a bug that causes to fail all queries that use highlight feature and Parent Child relationship at once, so we recommend to use the version 2.4 and newer. After upgrading to GitLab 8.12, you will need to remove the old index and rebuild new index:&lt;&#x2F;p&gt;

&lt;p&gt;To remove the old index, call to Elasticsearch:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;curl -XDELETE &#x27;http:&#x2F;&#x2F;localhost:9200&#x2F;gitlab-production&#x2F;&#x27;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Then rebuild new indexes as described in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#add-gitlabs-data-to-the-elasticsearch-index&quot;&gt;Elasticsearch integration&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ruby-update&quot;&gt;Ruby Update&lt;&#x2F;h3&gt;

&lt;p&gt;In our last release blog post we mentioned we&#x27;d be dropping Ruby 2.1.x support in GitLab 8.13, we no longer plan to stop supporting Ruby 2.1.x in
the near future.&lt;&#x2F;p&gt;

&lt;p&gt;We still recommend you upgrade to Ruby 2.3 if you&#x27;re running a source
installation, as this is the same version that ships with our Omnibus package
now.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;expanded-usage-data-ping-ee&quot;&gt;Expanded usage data ping (EE)&lt;&#x2F;h3&gt;

&lt;p&gt;In order to better understand the usage of GitLab by our customers,
GitLab 8.12 EE now sends additional data along with its usage ping.&lt;&#x2F;p&gt;

&lt;p&gt;No information about the nature of the data, such as project names, comments or
other content is transmitted. You can view the exact data that is sent in
the admin settings, where this feature can also be disabled entirely.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;735&quot;&gt;See also the implementation in the merge request&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;gitlab-workhorse-secret-key&quot;&gt;GitLab-Workhorse Secret Key&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab-Workhorse now uses a secret key to sign certain messages sent
to the GitLab Rails application. For now this is mostly a
configuration sanity check; in future releases we want to add features
to GitLab-Workhorse that require this secret key to establish trust.&lt;&#x2F;p&gt;

&lt;p&gt;If you use our Omnibus packages, or if you installed GitLab from
source with our official init.d script, then this secret key will be
generated and picked up automatically for you. If you use a custom
init.d script or if you use packages not created by GitLab Inc. then
you may have to set the &lt;code&gt;-secretPath&lt;&#x2F;code&gt; option on GitLab-Workhorse.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;note&quot;&gt;Note&lt;&#x2F;h3&gt;

&lt;p&gt;We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_12&#x2F;header.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11.7, 8.10.10 and 8.9.10 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/21/gitlab-8-11-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/21/gitlab-8-11-7-released/</id>
<published>2016-09-21T09:30:00+00:00</published>
<updated>2016-09-21T09:30:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.11.7, 8.10.10 and 8.9.10 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.11.7 contains a security fix for GitLab, plus fixes for minor
regressions. Version 8.10.10 and 8.9.10 only contain the security fix.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Avoid conflict with admin labels when importing GitHub labels. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6158&quot;&gt;!6158&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restores &lt;code&gt;fieldName&lt;&#x2F;code&gt; to allow only string values in &lt;code&gt;gl_dropdown.js&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6234&quot;&gt;!6234&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow the Rails cookie to be used for API authentication. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18302&quot;&gt;#18302&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Refactor Protected Branches dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;687&quot;&gt;!687&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix mirrored projects allowing empty import urls. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;700&quot;&gt;!700&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;information-disclosure-through-gonprivate_token-javascript-variable&quot;&gt;Information disclosure through &lt;code&gt;gon.private_token&lt;&#x2F;code&gt; JavaScript variable&lt;&#x2F;h2&gt;

&lt;p&gt;The private user token was available through the &lt;code&gt;gon.private_token&lt;&#x2F;code&gt; JavaScript
variable, leading to a potential security risk since it could be stolen through
XSS or other attacks.
See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18302&quot;&gt;the issue&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11.6, 8.10.9 and 8.9.9 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/14/gitlab-8-11-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/14/gitlab-8-11-6-released/</id>
<published>2016-09-14T17:00:00+00:00</published>
<updated>2016-09-14T17:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.11.6, 8.10.9 and 8.9.9 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.11.6 contains two security fixes for GitLab, plus fixes for minor
regressions. Version 8.10.9 only contains the two security fixes, while version
8.9.9 contains only one.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix unnecessary horizontal scroll area in pipeline visualizations. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6005&quot;&gt;!6005&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix merge conflict size limit. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6052&quot;&gt;!6052&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an error where we were unable to create a CommitStatus for running state. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6107&quot;&gt;!6107&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Optimize discussion notes resolving and unresolving. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6141&quot;&gt;!6141&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GitLab import button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6167&quot;&gt;!6167&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restore SSH Key title auto-population behavior. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6186&quot;&gt;!6186&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix DB schema to match latest migration. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6256&quot;&gt;!6256&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Exclude some pending or inactivated rows in Member scopes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;21650&quot;&gt;#21650&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Exclude blocked users from potential MR approvers (&lt;code&gt;8.11.6&lt;&#x2F;code&gt; &amp;amp; &lt;code&gt;8.10.9&lt;&#x2F;code&gt; only). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;976&quot;&gt;#976&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix registry build by enabling vendor feature. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;991&quot;&gt;!991&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;information-disclosure-through-access-requested-emails&quot;&gt;Information disclosure through &quot;access requested&quot; emails&lt;&#x2F;h2&gt;

&lt;p&gt;Blocked owners &amp;amp; masters of a group or project would still receive notification
emails for access requests, leaking the requesters&#x27;s name to the blocked user.
See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;21650&quot;&gt;the issue&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11 Release Webcast: GitLab Issue Board Launch</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/09/8-dot-11-issue-board-launch-webcast/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/09/8-dot-11-issue-board-launch-webcast/</id>
<published>2016-09-09T00:00:00+00:00</published>
<updated>2016-09-09T00:00:00+00:00</updated>
<author>
<name>Amara Nwaigwe</name>
</author>
<content type='html'>&lt;p&gt;This was an exciting release for GitLab! We appreciate all of the commments from the community
on &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;&quot;&gt;GitLab 8.11&lt;&#x2F;a&gt; being an &quot;epic release&quot;. We couldn’t agree more.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to the release news, 
we made a point to highlight our vision more prominently. If you’re familiar with GitLab and 
our open culture, you know that our vision has always been listed on &lt;a href=&quot;&#x2F;direction&#x2F;#vision&quot;&gt;our direction page&lt;&#x2F;a&gt;. However, in this 
release, we made our vision a part of our release story as well. GitLab is an integrated set of tools for 
the software development lifecycle.&lt;&#x2F;p&gt;

&lt;p&gt;The &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;22&#x2F;announcing-the-gitlab-issue-board&#x2F;&quot;&gt;launch of the GitLab Issue Board&lt;&#x2F;a&gt; makes it easier for customers to 
plan, organize and visualize their issues. The GitLab Issue Board and the Issue Tracker are a perfectly 
paired project management solution.&lt;&#x2F;p&gt;

&lt;p&gt;In this webcast, we walk through our vision, demo a couple great 
features of GitLab 8.11, and share what&#x27;s next on our product roadmap.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;in-this-webcast&quot;&gt;In this webcast:&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Introduction to GitLab and our vision&lt;&#x2F;li&gt;
  &lt;li&gt;Introduction to the GitLab Issue Board&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab 8.11 Feature Highlights&lt;&#x2F;li&gt;
  &lt;li&gt;Demo&lt;&#x2F;li&gt;
  &lt;li&gt;What’s next&lt;&#x2F;li&gt;
  &lt;li&gt;Q&amp;amp;A&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;recording--slides&quot;&gt;Recording &amp;amp; Slides&lt;&#x2F;h2&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;Ho-9sPthILc&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
&lt;iframe src=&quot;https:&#x2F;&#x2F;docs.google.com&#x2F;presentation&#x2F;d&#x2F;11geSLSj4eEaY9PMK_1OUXy7N3kTh1k_J58WTJL4sjjc&#x2F;embed?start=false&amp;amp;loop=false&amp;amp;delayms=3000&quot; frameborder=&quot;0&quot; width=&quot;960&quot; height=&quot;569&quot; allowfullscreen=&quot;true&quot; mozallowfullscreen=&quot;true&quot; webkitallowfullscreen=&quot;true&quot;&gt;&lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h2 id=&quot;key-takeaways&quot;&gt;Key Takeaways&lt;&#x2F;h2&gt;

&lt;p&gt;In case you don&#x27;t have time to watch the full video, here are the highlights.&lt;&#x2F;p&gt;

&lt;div class=&quot;panel panel-gitlab&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;GitLab built-in integrations&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;GitLab is an integrated set of tools, including repository management, access controls, code review, issue tracker, &lt;strong&gt;Issue Board&lt;&#x2F;strong&gt;, and wiki. GitLab supports the full software development lifecycle through its built-in &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;05&#x2F;continuous-integration-delivery-and-deployment-with-gitlab&#x2F;&quot;&gt;Continuous Integration, Continuous Deployment, Continuous Delivery&lt;&#x2F;a&gt;, and &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;05&#x2F;23&#x2F;gitlab-container-registry&#x2F;&quot;&gt;Container Registry&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;div class=&quot;panel panel-success&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;Faster from idea to production&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;Our goal is to help teams go &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;05&#x2F;continuous-integration-delivery-and-deployment-with-gitlab&#x2F;#from-idea-to-production-with-gitlab&quot;&gt;faster from idea to production&lt;&#x2F;a&gt;. To do that, we&#x27;ve built chat, issues, wikis, code review, CI, and CD into a single UI.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;div class=&quot;panel panel-gitlab-purple&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;10-Step lifecycle&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;We will ship this complete lifecycle in 2016.&lt;&#x2F;p&gt;

    &lt;ol&gt;
      &lt;li&gt;Chat conversation → &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;08&#x2F;18&#x2F;gitlab-loves-mattermost&#x2F;&quot;&gt;Mattermost ships with GitLab&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Issue creation → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;03&#x2F;03&#x2F;start-with-an-issue&#x2F;&quot;&gt;GitLab Issues&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Planning board → &lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;issueboard&#x2F;&quot;&gt;GitLab Issue Board&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;IDE → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;07&#x2F;26&#x2F;koding-and-gitlab-integrated&#x2F;&quot;&gt;Koding + GitLab&lt;&#x2F;a&gt; Integration&lt;&#x2F;li&gt;
      &lt;li&gt;Version control → GitLab Repositories&lt;&#x2F;li&gt;
      &lt;li&gt;Continuous Integration → &lt;a href=&quot;&#x2F;features&#x2F;continuous-integration&#x2F;&quot;&gt;GitLab CI&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;05&#x2F;23&#x2F;gitlab-container-registry&#x2F;&quot;&gt;GitLab Container Registry&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Code review → GitLab Merge Requests&lt;&#x2F;li&gt;
      &lt;li&gt;Continuous Delivery → &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;08&#x2F;05&#x2F;continuous-integration-delivery-and-deployment-with-gitlab&#x2F;&quot;&gt;GitLab Deploy&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Chatops → We&#x27;re planning to ship &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1412&quot;&gt;Cog&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
      &lt;li&gt;Feedback → We plan to ship with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;20975&quot;&gt;Cycle Analytics&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
    &lt;&#x2F;ol&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;div class=&quot;panel panel-info&quot;&gt;
  &lt;p class=&quot;panel-heading&quot;&gt;&lt;strong&gt;New features&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;
  &lt;div class=&quot;panel-body&quot;&gt;
    &lt;p&gt;&lt;a href=&quot;&#x2F;stages-devops-lifecycle&#x2F;issueboard&#x2F;&quot;&gt;GitLab Issue Board&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;09&#x2F;06&#x2F;resolving-merge-conflicts-from-the-gitlab-ui&#x2F;&quot;&gt;Resolving Merge Conflicts in the UI&lt;&#x2F;a&gt; are awesome features and you should really check them out.&lt;&#x2F;p&gt;
  &lt;&#x2F;div&gt;
&lt;&#x2F;div&gt;

&lt;h2 id=&quot;join-us-on-for-a-special-event-on-september-13th&quot;&gt;Join us on for a special event on September 13th&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;Page.gitlab.com&#x2F;20160913_UnveilingMasterPlan_landingpage.html&quot;&gt;Register here&lt;&#x2F;a&gt; for our special live event on Tuesday, September 13th at 1pm ET &#x2F; 5pm GMT.
Our CEO, &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;sytses&quot;&gt;Sid Sijbrandij&lt;&#x2F;a&gt;, will share a special announcement and walk through the
future plan for GitLab and software development.&lt;&#x2F;p&gt;

&lt;p&gt;Stick around after the announcement for a Q&amp;amp;A session with &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;sytses&quot;&gt;Sid&lt;&#x2F;a&gt;, CEO, &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;Jobvo&quot;&gt;Job van der Voort&lt;&#x2F;a&gt;, 
VP of Product, &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;ashl3ysm1th&quot;&gt;Ashley Smith&lt;&#x2F;a&gt;, Chief Marketing Officer, and guest MC Community Extraordinaire &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jonobacon&quot;&gt;Jono Bacon&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;!-- identifiers --&gt;

&lt;style&gt;
.panel-gitlab {
  border-color: rgba(252,163,38,.3);
}
.panel-gitlab &gt; .panel-heading {
  color: rgb(226,67,41);
  background-color: rgba(252,163,38,.3);
  border-color: rgba(252,163,38,.3);
}
.panel-gitlab-purple {
  border-color: rgba(107,79,187,.3);
}
.panel-gitlab-purple &gt; .panel-heading {
  color: rgb(107,79,187);
  background-color: rgba(107,79,187,.3);
  border-color: rgba(107,79,187,.3);
}
&lt;&#x2F;style&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;blogimages&#x2F;Issue_Board_Full_Screen.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/07/gitlab-8-dot-11-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/07/gitlab-8-dot-11-dot-5-released/</id>
<published>2016-09-07T00:00:00+00:00</published>
<updated>2016-09-07T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>
&lt;p&gt;Today we are releasing version 8.11.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;&quot;&gt;recent 8.11
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; API: Restore backward-compatibility for POST &#x2F;projects&#x2F;:id&#x2F;members when membership is locked. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;715&quot;&gt;!715&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Scope webhooks&#x2F;services that will run for confidential issues. (&lt;a href=&quot;https:&#x2F;&#x2F;dev.gitlab.org&#x2F;gitlab&#x2F;gitlabhq&#x2F;merge_requests&#x2F;1986&quot;&gt;!1986&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix confidential issues made public after import. (&lt;a href=&quot;https:&#x2F;&#x2F;dev.gitlab.org&#x2F;gitlab&#x2F;gitlabhq&#x2F;merge_requests&#x2F;1992&quot;&gt;!1992&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add the total number of issues in the JSON response in issue board lists. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5904&quot;&gt;!5904&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Changed &lt;code&gt;.commit-row-title&lt;&#x2F;code&gt; &lt;code&gt;line-height&lt;&#x2F;code&gt; to &lt;code&gt;1.35&lt;&#x2F;code&gt; from &lt;code&gt;1&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5996&quot;&gt;!5996&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Optimize branch lookups and force a repository reload for Repository#find_branch. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6087&quot;&gt;!6087&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added search for all lists on issue boards. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6101&quot;&gt;!6101&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix suggested colors options for new labels in the admin area. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6138&quot;&gt;!6138&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove gitorious from import_sources on ApplicationSetting model. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6180&quot;&gt;!6180&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix expiration date picker after update. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6184&quot;&gt;!6184&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Reduce intermittent spec failures by making VueJS resource interceptor decrement outstanding resource counts when HTTP response is received. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6224&quot;&gt;!6224&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has some migrations, but should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11.4 and 8.10.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/09/01/gitlab-8-11-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/09/01/gitlab-8-11-4-released/</id>
<published>2016-09-01T00:00:00+00:00</published>
<updated>2016-09-01T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.11.4 and 8.10.8 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.11.4 contains two security fixes for GitLab, plus fixes for minor
regressions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix information disclosure in issue boards.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix privilege escalation in project import.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove ugly horizontal scrollbars in windows. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5942&quot;&gt;!5942&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Check for pipelines when setting page_gutter_class. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5952&quot;&gt;!5952&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add body as data-container on pipeline graph tooltip. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5955&quot;&gt;!5955&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove gitorious. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5866&quot;&gt;!5866&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Removes leading space from hover state in graph links. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5980&quot;&gt;!5980&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove max height on pipelines graph. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5988&quot;&gt;!5988&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue where filtering one dropdown will filter another on the page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5985&quot;&gt;!5985&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure we update dropdown label after input has been added. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5999&quot;&gt;!5999&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; GitHub importer use default project visibility for non-private projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6023&quot;&gt;!6023&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix diff comments on legacy MRs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6029&quot;&gt;!6029&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Curved lines at top of pipeline graph. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6033&quot;&gt;!6033&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; docs: make sure to update 8.10-to-8.11 workhorse version too. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6049&quot;&gt;!6049&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &quot;Wiki&quot; link not appearing in navigation for projects with external wiki. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6057&quot;&gt;!6057&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not enforce using a hash with hidden ci key. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6079&quot;&gt;!6079&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix resolving conflicts on forks. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6082&quot;&gt;!6082&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Block concurrent pipeline processings. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6090&quot;&gt;!6090&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix sorting issues by &quot;last updated&quot; after import from GitHub. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6110&quot;&gt;!6110&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix toggler_behavior.js to toggle ajax loaded contents like &lt;code&gt;diffs&lt;&#x2F;code&gt; page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6119&quot;&gt;!6119&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed escaping issue with labels filter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6123&quot;&gt;!6123&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Added shared_preload_libraries to postgresql. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;964&quot;&gt;!964&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Add postgresql option log_line_prefix for log improvements. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;978&quot;&gt;!978&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix the missing passing of the logrotate directory value and add specs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;980&quot;&gt;!980&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;information-disclosure-in-issue-boards&quot;&gt;Information disclosure in issue boards&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for an attacker to create a new Issue Board column based on the
label of any project, including private ones, potentially leaking the label&#x27;s
name and description. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;21167&quot;&gt;the issue&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of
&lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing this issue
to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-in-project-import&quot;&gt;Privilege escalation in project import&lt;&#x2F;h2&gt;

&lt;p&gt;When importing a project from another service, it was possible for a user to
create a GitLab group when they didn&#x27;t have permission to do so. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;21457&quot;&gt;the
issue&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;skylarkelty&quot;&gt;Skylar Kelty&lt;&#x2F;a&gt; for responsibly
disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/29/gitlab-8-dot-11-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/29/gitlab-8-dot-11-dot-3-released/</id>
<published>2016-08-29T00:00:00+00:00</published>
<updated>2016-08-29T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.11.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;&quot;&gt;recent 8.11
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; [ES] Logging for indexer. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;683&quot;&gt;!683&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Set the correct &lt;code&gt;GL_PROTOCOL&lt;&#x2F;code&gt; in the environment when rebasing. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;691&quot;&gt;!691&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix missing EE-specific service parameters for Jenkins CI. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;692&quot;&gt;!692&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; [ES] Elastic workers should check settings each time when they are running. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;693&quot;&gt;!693&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Automatically expand hidden discussions when accessed via a permalink hash. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5585&quot;&gt;!5585&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle non-UTF-8 conflicts gracefully. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5961&quot;&gt;!5961&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix enormous IE11 fork button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5982&quot;&gt;!5982&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle unavailable system info. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5989&quot;&gt;!5989&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Label list shows all issues (opened or closed) with that label. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5991&quot;&gt;!5991&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix external issue tracker &quot;Issues&quot; link leading to 404s. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6006&quot;&gt;!6006&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use new image for Issue Board page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6013&quot;&gt;!6013&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle conflict edge cases after push. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6017&quot;&gt;!6017&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix wrong Koding link. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;6030&quot;&gt;!6030&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Make &lt;code&gt;docutils&lt;&#x2F;code&gt; work with Python3 to restore &lt;code&gt;.RST&lt;&#x2F;code&gt; rendering. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;968&quot;&gt;!968&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/25/gitlab-8-dot-11-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/25/gitlab-8-dot-11-dot-2-released/</id>
<published>2016-08-25T00:00:00+00:00</published>
<updated>2016-08-25T00:00:00+00:00</updated>
<author>
<name>Rubén Dávila</name>
</author>
<content type='html'>
&lt;p&gt;Today we are releasing version 8.11.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;08&#x2F;22&#x2F;gitlab-8-11-released&#x2F;&quot;&gt;recent 8.11
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;re wondering what happened to 8.11.1, good eye! That version was pulled due to a packaging error.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Document protected branches new behavior. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5934&quot;&gt;!5934&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix typo in gitlab-workhorse header. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5891&quot;&gt;!5891&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Documentation for Issue Boards. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5713&quot;&gt;!5713&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix file links on project page Files view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5933&quot;&gt;!5933&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Also check if Akismet is enabled, before showing the &lt;code&gt;Submit as spam&lt;&#x2F;code&gt; button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5948&quot;&gt;!5948&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix incorrect &quot;stopped impersonation&quot; log message. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5949&quot;&gt;!5949&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project namespace links. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5912&quot;&gt;!5912&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed enter key in search input not working. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5888&quot;&gt;!5888&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump SimpleCov merge timeout to 365 days. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5932&quot;&gt;!5932&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove tab stop from issuable form added by description templates. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5929&quot;&gt;!5929&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add Ruby 2.3 upgrade notes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5940&quot;&gt;!5940&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use gitlab-workhorse 0.7.11. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5983&quot;&gt;!5983&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Does not halt the GitHub import process when an error occurs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5763&quot;&gt;!5763&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; last_push_event widget considers fork events on the main project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5978&quot;&gt;!5978&lt;&#x2F;a&gt;)&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix mail_room URL for Redis. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;954&quot;&gt;!954&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fixed a regression where the default container registry and mattermost nginx proxy headers were not being set. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;958&quot;&gt;!958&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has one migration, but should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.11 released with Issue Boards and Merge Conflict Resolution</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/22/gitlab-8-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/22/gitlab-8-11-released/</id>
<published>2016-08-22T10:01:00+00:00</published>
<updated>2016-08-22T10:01:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;There are so many good things in GitLab 8.11,
that I struggle to introduce all this
without turning to superlatives. So, without further ado:&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.11 you get a completely new way to manage your issues,
you can resolve merge conflicts in the interface,
you can restrict pushes to people and groups (in EE),
you get an online IDE,
you can use slash commands to modify issues and
you can create as many issue templates as
you want ..and many other new features.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
Clement Ho for his merge requests and responsiveness on issues.
Thanks Clement Ho!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;issue-board&quot;&gt;Issue Board&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Issues are very flexible. You can crosslink them, prioritize them, and
rank them by popularity. With the Issue Board we&#x27;ve added something new:&lt;&#x2F;p&gt;

&lt;p&gt;You can now create workflows, quickly get an idea of the status of your
issues and all that in a simple, beautiful Board, not unlike a Kanban or Scrum
board.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;issue_boards.gif&quot; alt=&quot;Issue Boards in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You have a board for every project, which starts with a Backlog with all open
issues and a Done list, where issues are automatically closed.&lt;&#x2F;p&gt;

&lt;p&gt;By adding new lists you can create workflows. Lists are based on labels, this
means that adding an issue to a list will add that label to the issue and
removing it from a list, will remove the label.&lt;&#x2F;p&gt;

&lt;p&gt;This means all your current issues will automatically appear in new
lists you create and that you can quickly see whether a certain issue is
in one (or more!) of the lists.&lt;&#x2F;p&gt;

&lt;p&gt;To see an example, have a look at the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;board?author_id=&amp;amp;assignee_id=&amp;amp;milestone_title=8.12&quot;&gt;GitLab CE Issue Board for the next release (8.12)&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;issue_board.html&quot;&gt;Issue Board Documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;UWsJ8tkHAa8&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;h2 id=&quot;merge-conflict-resolution&quot;&gt;Merge Conflict Resolution&lt;&#x2F;h2&gt;

&lt;p&gt;Merge conflicts can be a real pain when you want to get something to merge
in a busy project. We believe you shouldn&#x27;t need any external tools to
fix your conflicts, which is why you can now solve simple conflicts straight
from GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;resolve_mc.gif&quot; alt=&quot;Merge Conflict Resolution in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;When you encounter a conflict, you simply click &quot;Resolve these conflicts&quot; to be able to select
how you want the conflicts to be resolved. You confirm at the end to make a
commit with your fix.&lt;&#x2F;p&gt;

&lt;p&gt;We realize that this won&#x27;t work for all conflicts, but hope that this will make
the majority of your conflicts minor bumps in the road to getting your work
to production.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;resolve_conflicts.html&quot;&gt;Resolve conflicts Documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;branch-permissions-for-users-ee-only&quot;&gt;Branch Permissions for Users (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;It&#x27;s now possible to restrict pushing and merging to specific branches to
specific users, using Branch Permissions in GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This works hand-in-hand with the existing functionality and can easily be
combined with our restrictions. This means that you can restrict direct
pushes to only &lt;code&gt;Jane&lt;&#x2F;code&gt; and &lt;code&gt;John&lt;&#x2F;code&gt;, but allow all &lt;code&gt;masters&lt;&#x2F;code&gt; or even &lt;code&gt;developers&lt;&#x2F;code&gt;
to merge through a merge request to the branch.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;branch_permissions.png&quot; alt=&quot;Branch permissions for users in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For each action (push and merge) you can allow any amount of users and
permissions, making this a very powerful addition to GitLab EE for organizations.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;branches&#x2F;protected.html#restricting-push-and-merge-access-to-certain-users&quot;&gt;Branch permissions for users Documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;resolve-discussions-in-mrs&quot;&gt;Resolve Discussions in MRs&lt;&#x2F;h2&gt;

&lt;p&gt;Discussions on diffs in merge requests can be hard to keep track of, yet
it&#x27;s important that you actually give each comment attention.&lt;&#x2F;p&gt;

&lt;p&gt;To make it easier to find, fix, and resolve those comments and discussions,
we&#x27;ve added the ability to do just that: Each comment and discussion on merge
request diffs can be resolved. Longer threads can be resolved all at once
or just comment-by-comment.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;resolve_discussion.png&quot; alt=&quot;Resolve Discussions in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We keep track of how many discussions you still need to resolve and added
a convenient button to jump to the next unresolved discussion.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;jump.png&quot; alt=&quot;Jump to the next unresolved discussion in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;merge_request_discussion_resolution.html&quot;&gt;Merge request discussion resolution Documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;pipelines-graph&quot;&gt;Pipelines Graph&lt;&#x2F;h2&gt;

&lt;p&gt;Pipelines in GitLab can be complex structures with many sequential and parallel
builds. To make it a little easier to see what is going on, you can now view
a graph of a single pipeline and its status:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;pipeline_graph2.png&quot; alt=&quot;Pipeline Graphs in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Simply click on a pipeline in your merge request or pipelines view to view
the graph for the current pipeline.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-and-mr-templates&quot;&gt;Issue and MR Templates&lt;&#x2F;h2&gt;

&lt;p&gt;To standardize on a certain format for issues and merge requests,
you could already create templates in GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.11, we&#x27;re bringing the ability to create multiple templates
(for instance, one for feature proposals, another for bugs) to GitLab.com, GitLab CE, and EE.&lt;&#x2F;p&gt;

&lt;p&gt;Templates are Markdown files (&lt;code&gt;.md&lt;&#x2F;code&gt;) that live in the repository in a &lt;code&gt;.gitlab&lt;&#x2F;code&gt;
directory and either the &lt;code&gt;.gitlab&#x2F;issue_templates&lt;&#x2F;code&gt; or
&lt;code&gt;.gitlab&#x2F;merge_request_templates&lt;&#x2F;code&gt; subdirectory. They will appear in a dropdown when creating
a new issue or merge request:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;templates.png&quot; alt=&quot;Issue and Merge Request templates in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This should make it easier for everyone to submit good-looking
feature requests, bug reports, and merge requests.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;description_templates.html&quot;&gt;See the documentation on templates&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;slash-commands&quot;&gt;Slash Commands&lt;&#x2F;h2&gt;

&lt;p&gt;Inspired by chat tools, such as IRC, HipChat, Mattermost, and Slack, we&#x27;ve added
our own version of slash commands to GitLab. This means you can quickly
change labels, milestones, assignees and more by just writing a comment
or by having a command when writing your merge request or issue.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;slash-commands.gif&quot; alt=&quot;Slash commands in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Use them in comments or even when creating a new issue or merge request:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;slash-commands2.gif&quot; alt=&quot;Slash commands in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can have multiple commands in a single comment and do things like changing
the title of an issue, adding or removing labels and changing assignees.&lt;&#x2F;p&gt;

&lt;p&gt;Here are some ideas on using the new slash commands:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;In your email while replying to an issue TODO doc link&lt;&#x2F;li&gt;
  &lt;li&gt;Try having some in a template&lt;&#x2F;li&gt;
  &lt;li&gt;Through the notes API&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We can&#x27;t wait to see how you&#x27;ll use them.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;slash_commands.html&quot;&gt;Slash commands Documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;koding-integration&quot;&gt;Koding Integration&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;koding&#x2F;koding&quot;&gt;Koding&lt;&#x2F;a&gt; allows you to run your entire development environment
in the cloud, share it with your team, and even use your local editor. This
means that you don&#x27;t have to spend hours setting up your stack on every new
machine and every change.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.11, we&#x27;re introducing the Koding integration with GitLab.  This
means that you can check out a project or just a merge request in a full-fledged
IDE with the press of a button. The Koding integration is not on GitLab.com at
present.&lt;&#x2F;p&gt;

&lt;p&gt;Enable Koding in Admin &amp;gt; Application settings:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;koding1.png&quot; alt=&quot;Koding, an integrated IDE in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Set it up for your project:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;koding2.png&quot; alt=&quot;Koding, an integrated IDE in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;koding4.png&quot; alt=&quot;Koding, an integrated IDE in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;And now you&#x27;re able to quickly check out any merge request, branch,
and commit in a complete IDE, that even allows you to use your
local editor.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;koding3.png&quot; alt=&quot;Koding, an integrated IDE in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve put together a quick screencast showing this off:&lt;&#x2F;p&gt;

&lt;figure class=&quot;video_container&quot;&gt;
  &lt;iframe src=&quot;https:&#x2F;&#x2F;www.youtube.com&#x2F;embed&#x2F;3wei5yv_Ye8&quot; frameborder=&quot;0&quot; allowfullscreen=&quot;true&quot;&gt; &lt;&#x2F;iframe&gt;
&lt;&#x2F;figure&gt;

&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can read more about setting up Koding in GitLab in our &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;koding.html&quot;&gt;documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipelines-in-mrs&quot;&gt;Pipelines in MRs&lt;&#x2F;h2&gt;

&lt;p&gt;You will now see your &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;05&#x2F;22&#x2F;gitlab-8-8-released&#x2F;#pipelines&quot;&gt;Pipelines&lt;&#x2F;a&gt; in merge requests!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;pipelines_mr.png&quot; alt=&quot;Pipelines in merge requests in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Click on a pipeline to see its graph and related builds.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deployment-status-in-merge-requests&quot;&gt;Deployment status in Merge Requests&lt;&#x2F;h2&gt;

&lt;p&gt;You can now easily set the URL of your environments:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;url_environment.png&quot; alt=&quot;Set the URL of any environment in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Which helps if you deploy automatically after a merge request is merged,
as now GitLab will show the state of the deploy in your merge requests:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;mr_deployed.png&quot; alt=&quot;See deploy status in merge request in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With the URL configured, GitLab will link to the environment, so you can see
the result of a merge request with a single click.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;pipelines-web-hooks&quot;&gt;Pipelines Web Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;To make it easier to integrate the power of GitLab&#x27;s pipelines, we&#x27;ve
added a webhook for pipelines. It&#x27;ll fire whenever a pipeline is created,
is running or is finished.&lt;&#x2F;p&gt;

&lt;p&gt;Enable any webhooks by going to the settings dropdown in your project and
selecting &lt;code&gt;Webhooks&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;code-highlighting-and-collapsing&quot;&gt;Code Highlighting and Collapsing&lt;&#x2F;h2&gt;

&lt;p&gt;The editor in GitLab now properly highlights code and allows you to
collapse blocks of code.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;highlighting.gif&quot; alt=&quot;Code highlighting in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mr-links-when-pushing&quot;&gt;MR links when pushing&lt;&#x2F;h2&gt;

&lt;p&gt;You&#x27;ll now see a link to quickly create a new merge request and
any related merge requests when you push to GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;mr_link.png&quot; alt=&quot;Merge request links when pushing in GitLab 8.11&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;coverage-badge&quot;&gt;Coverage badge&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab can now generate a nice looking coverage badge, so you can easily
show off the test coverage of your projects anywhere:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;coverage_badge.png&quot; alt=&quot;Coverage Badge in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you didn&#x27;t know GitLab could report coverage yet, set it up in your
pipelines settings: &lt;code&gt;pipelines&#x2F;settings&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipelines.html#sts=Test%20coverage%20report%20badge&quot;&gt;Read the docs on test coverage badges&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;expiration-date-on-memberships&quot;&gt;Expiration date on Memberships&lt;&#x2F;h2&gt;

&lt;p&gt;When giving a user access to a project or when sharing a project with a group,
you can now limit that access to a certain date, setting an expiration date.
After the date, the user or group will no longer have access to the
project.&lt;&#x2F;p&gt;

&lt;p&gt;This should make it easier to manage sharing projects with temporary team
members.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;move-projects-between-shards-ee-only&quot;&gt;Move projects between shards (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab 8.10 we &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;#multiple-repository-mount-points&quot;&gt;introduced&lt;&#x2F;a&gt; multiple mount points in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.11 you can move projects between shards with a rake command.
This is not something for everyday use, but it is convenient if you want to test
a new shard or want to move that super-heavily used project over to faster
storage.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-updates&quot;&gt;Performance Updates&lt;&#x2F;h2&gt;

&lt;p&gt;In this release we&#x27;ve added another batch of significant performance improvements.&lt;&#x2F;p&gt;

&lt;p&gt;Merge requests and their diffs are faster! Below
some graphs that show the difference for when we deployed GitLab 8.11 RC2
to GitLab.com (the drop is the deploy).&lt;&#x2F;p&gt;

&lt;p&gt;Loading times of merge request diffs:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;perf1.jpg&quot; alt=&quot;Performance improvements in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The number of SQL queries executed when displaying merge request diffs:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;perf2.jpg&quot; alt=&quot;Performance improvements in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The time spent in SQL queries when displaying merge request diffs:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;perf3.jpg&quot; alt=&quot;Performance improvements in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Pipelines performance also improved significantly:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_11&#x2F;perf4.jpg&quot; alt=&quot;Performance improvements in GitLab 8.11&quot; class=&quot;shadow&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;See below for detailed improvements and the merge requests of the implementations.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;improvements&quot;&gt;Improvements&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Checking if a user can read multiple issues has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5370&quot;&gt;!5370&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Looking up a user&#x27;s maximum access level has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5412&quot;&gt;!5412&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Displaying CI charts now uses fewer SQL queries:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5502&quot;&gt;!5502&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Various improvements have been made to GitLab&#x27;s Git handling to use fewer Git
operations and use faster sorting of version numbers:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5536&quot;&gt;!5536&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5375&quot;&gt;!5375&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Commit authors are cached per Sidekiq transaction to avoid extra lookups:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5537&quot;&gt;!5537&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries used for displaying merge request diffs has been
reduced: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5551&quot;&gt;!5551&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Iterating over diff collections has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5564&quot;&gt;!5564&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The performance of various methods that only depend on diff statistics has
been improved: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5568&quot;&gt;!5568&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Diff rendering performance has been improved by removing redundant checks for
text blobs: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5575&quot;&gt;!5575&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Certain method calls that are not needed when rendering diffs have been
removed: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5591&quot;&gt;!5591&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Checking if a diff note is active has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5597&quot;&gt;!5597&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Improve rendering of issue tracker links:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5608&quot;&gt;!5608&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of parsing URLs in Markdown documents has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5629&quot;&gt;!5629&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of syntax highlighting code blocks in Markdown documents has been
improved: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5643&quot;&gt;!5643&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Generating of cache keys for Markdown documents has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5715&quot;&gt;!5715&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Sorting of Git tags has been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5723&quot;&gt;!5723&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Trigram indexes (PostgreSQL only) for the &lt;code&gt;ci_runners&lt;&#x2F;code&gt; table have been removed:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5755&quot;&gt;!5755&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Commit lookups in &lt;code&gt;DiffHelper&lt;&#x2F;code&gt; have been removed:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5756&quot;&gt;!5756&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;45 redundant database indexes have been removed:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5759&quot;&gt;!5759&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Caching of todo counters has been re-enabled:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5789&quot;&gt;!5789&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Queries to get a list of todos have been improved by limiting the number of
projects used in these queries:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5791&quot;&gt;!5791&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;SVG images larger than 2MB are no longer displayed, reducing loading times and
memory usage: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5794&quot;&gt;!5794&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;A memory leak in the Markdown sanitization filter has been solved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5808&quot;&gt;!5808&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The dropdown used for displaying a list of projects an issue can be moved to
uses pagination instead of loading all data at once:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5828&quot;&gt;!5828&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5686&quot;&gt;!5686&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Methods calls for finding Git blobs that were not needed have been removed:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5848&quot;&gt;!5848&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The branches dropdown in the cherry pick and revert dialogues is now loaded
asynchronously: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5607&quot;&gt;!5607&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The queries used to mark todos as done have been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5832&quot;&gt;!5832&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;gitlab_git has been updated to 10.4.7 to take advantage of various
improvements made to this library:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5851&quot;&gt;!5851&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Git access checks in Enterprise Edition have been improved:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;647&quot;&gt;!647&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;An unnecessary index on the &lt;code&gt;geo_nodes&lt;&#x2F;code&gt; table has been removed:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;639&quot;&gt;!639&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Ace Editor is no longer loaded unless it&#x27;s used on a given page, decreasing
our default JavaScript payload by just under 100KB.
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4914&quot;&gt;!4914&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;features&quot;&gt;Features&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Sidekiq now caches certain objects per transaction. This is enabled by default
but can be disabled using an environment variable:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5054&quot;&gt;!5054&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab can now process a request using ruby-prof, storing the profiling data
on disk so it can be viewed later on. This requires a token to be specified in
a header to work:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5281&quot;&gt;!5281&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab Performance Monitoring can now track custom events such as the number
of Git pushes, projects being forked, etc
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5830&quot;&gt;!5830&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;instrumentation&quot;&gt;Instrumentation&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Nokogiri has been instrumented:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5470&quot;&gt;!5470&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The overhead of method call instrumentation has been reduced:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5550&quot;&gt;!5550&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The &lt;code&gt;Repository&lt;&#x2F;code&gt; class has been instrumented:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5621&quot;&gt;!5621&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;code&gt;Gitlab::Highlight&lt;&#x2F;code&gt; has been instrumented:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5644&quot;&gt;!5644&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;code&gt;Project.visible_to_user&lt;&#x2F;code&gt; has been instrumented again:
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5793&quot;&gt;!5793&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-runner&quot;&gt;GitLab Runner&lt;&#x2F;h2&gt;

&lt;p&gt;We are also releasing GitLab Runner 1.5 today. A few highlights:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Mount &#x2F;builds folder to all services when used with Docker Executor: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;272&quot;&gt;!272&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Use .xz for pre-built docker images to reduce binary size and provisioning speed of Docker Engines: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;249&quot;&gt;!249&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Suppress all but the first warning of a given type when extracting a ZIP file: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;261&quot;&gt;!261&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Retry executor preparation to reduce system failures: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;244&quot;&gt;!244&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Release armel instead arm for Debian packages: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;264&quot;&gt;!264&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Improve concurrency of docker+machine executor: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;254&quot;&gt;!254&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Update gitlab-runner-service to return 1 when no Host or PORT is defined: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;253&quot;&gt;!253&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fix missing entrypoint script in alpine Dockerfile: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;248&quot;&gt;!248&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Cache docker client instances to avoid a file descriptor leak: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;260&quot;&gt;!260&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Support bind mount of &#x2F;builds folder: &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;193&quot;&gt;!193&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-mattermost-33&quot;&gt;GitLab Mattermost 3.3&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.11 includes &lt;a href=&quot;https:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-3-3-chinese-korean-dutch-message-flags-here-golang-bot-sample-and-much-more&#x2F;&quot;&gt;Mattermost 3.3&lt;&#x2F;a&gt;,
an &lt;a href=&quot;https:&#x2F;&#x2F;www.mattermost.org&#x2F;&quot;&gt;open source Slack-alternative&lt;&#x2F;a&gt; whose newest release includes
Chinese, Korean and Dutch translation, a &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;mattermost&#x2F;mattermost-bot-sample-golang&quot;&gt;Golang bot&lt;&#x2F;a&gt;,
flagged posts, @here mentions, plus many more new benefits.&lt;&#x2F;p&gt;

&lt;p&gt;This version also includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt; and upgrade from earlier versions is recommended.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redis-sentinel-support&quot;&gt;Redis Sentinel Support&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab now has experimental support for Redis Sentinel.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;redis&#x2F;index.html&quot;&gt;See the docs for details&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;To upgrade to GitLab 8.11, downtime is required due to migrations.&lt;&#x2F;p&gt;

&lt;p&gt;The downtime for GitLab.com (the largest GitLab instance) was about
15 to 30 minutes. It may take less time depending on the amount of data on
your instance.&lt;&#x2F;p&gt;

&lt;p&gt;Some columns are removed by one migration which may affect users running a
version of GitLab that was still using said column.
Two other migrations populate newly created tables based on existing data,
as such they require downtime to ensure this data isn&#x27;t modified while
the migration is running (and until 8.11 is deployed to the user&#x27;s cluster).
Finally another migration adds two foreign keys,
which requires downtime as this is not done in a concurrent manner.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ruby-21-deprecation&quot;&gt;Ruby 2.1 deprecation&lt;&#x2F;h3&gt;

&lt;p&gt;With this release of GitLab, we&#x27;re upgrading to Ruby 2.3.
For manual installations, we strongly suggest you update Ruby to 2.3
with this release. Omnibus installations will be automatically on Ruby 2.3.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;note-for-early-updaters&quot;&gt;Note for early updaters&lt;&#x2F;h3&gt;

&lt;p&gt;If you were very fast in updating GitLab to 8.11 and
during reconfigure received &lt;code&gt;undefined method merge! for nil:NilClass&lt;&#x2F;code&gt; error,
make sure that you fetch the newer package marked with .1:  &lt;code&gt;8.11.0-ce.1&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Simply run &lt;code&gt;apt-get update&lt;&#x2F;code&gt; and &lt;code&gt;apt-get install gitlab-ce&lt;&#x2F;code&gt; &#x2F;
&lt;code&gt;apt-get install gitlab-ee&lt;&#x2F;code&gt; again to solve this issue.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;2fa-enforced-through-api-and-git-over-http&quot;&gt;2FA enforced through API and Git over HTTP&lt;&#x2F;h3&gt;

&lt;p&gt;Users with 2FA enabled trying to retrieve an API token via the &#x2F;sessions endpoint
or the Resource Owner Password Credentials flow provided by OAuth2,
will not be able to login. They will be required to use a Personal Access Token from now on.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;#personalprojectgroup-access-tokens&quot;&gt;Read our documentation on personal access tokens&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;ee-only-elasticsearch-reindexing&quot;&gt;(EE Only) Elasticsearch reindexing&lt;&#x2F;h3&gt;

&lt;p&gt;We changed the structure of Elasticsearch indexes, making use of parent&#x2F;child
relationships. This has performance advantages, but requires a total rebuild
of the ES index. After upgrading to GitLab 8.11, you will need to remove the
old indexes and rebuild new indexes:&lt;&#x2F;p&gt;

&lt;p&gt;To remove the old indexes, call to Elasticsearch:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;curl -XDELETE &#x27;http:&#x2F;&#x2F;localhost:9200&#x2F;_all&#x2F;&#x27;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Then rebuild new indexes as described in &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#add-gitlabs-data-to-the-elasticsearch-index&quot;&gt;Elasticsearch integration&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_11&#x2F;pic2.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.7, 8.9.8, and 8.8.9 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/19/gitlab-8-10-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/19/gitlab-8-10-7-released/</id>
<published>2016-08-19T00:00:00+00:00</published>
<updated>2016-08-19T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.10.7, 8.9.8, and 8.8.9 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions include a security fix in two GitLab dependencies and are a
recommended upgrade for all installations.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Upgrade Doorkeeper to 4.2.0. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5881&quot;&gt;!5881&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Upgrade Hamlit to 2.6.1. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5873&quot;&gt;!5873&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-doorkeeper-to-420&quot;&gt;Upgrade Doorkeeper to 4.2.0&lt;&#x2F;h2&gt;

&lt;p&gt;Doorkeeper 4.2.0 was recently released to address
&lt;a href=&quot;http:&#x2F;&#x2F;seclists.org&#x2F;oss-sec&#x2F;2016&#x2F;q3&#x2F;332&quot;&gt;CVE-2016-6582&lt;&#x2F;a&gt; and we&#x27;ve updated the
gem accordingly.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-hamlit-to-261&quot;&gt;Upgrade Hamlit to 2.6.1&lt;&#x2F;h2&gt;

&lt;p&gt;The Hamlit library was vulnerable to the same &lt;a href=&quot;https:&#x2F;&#x2F;groups.google.com&#x2F;d&#x2F;msg&#x2F;ruby-security-ann&#x2F;8B2iV2tPRSE&#x2F;JkjCJkSoCgAJ&quot;&gt;CVE-2016-6316&lt;&#x2F;a&gt; issue that
recently prompted an update for Rails. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;21017&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab versions prior to 8.10 are not using Hamlit and do not require this
fix.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;d like to thank &lt;a href=&quot;https:&#x2F;&#x2F;dylankatz.com&#x2F;&quot;&gt;Dylan Katz&lt;&#x2F;a&gt; for responsibly
disclosing this issue to us, and to Hamlit author &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;k0kubun&quot;&gt;Takashi Kokubun&lt;&#x2F;a&gt; for
quickly releasing a fix after we traced the cause back to the gem.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.6, 8.9.7, and 8.8.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/16/gitlab-8-10-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/16/gitlab-8-10-6-released/</id>
<published>2016-08-16T00:00:00+00:00</published>
<updated>2016-08-16T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.10.6, 8.9.7, and 8.8.8 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Version 8.10.6 contains a security fix for GitLab, plus fixes for minor
regressions. All versions include a security update for Rails. We recommend that
all GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Upgrade Rails to 4.2.7.1. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5781&quot;&gt;!5781&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix privilege escalation via project export.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restore &quot;Largest repository&quot; sort option on Admin &amp;gt; Projects page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5797&quot;&gt;!5797&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Require administrator privileges to perform a project import.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix race condition with UpdateMirrorWorker Lease. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;641&quot;&gt;!641&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;privilege-escalation-via-project-export&quot;&gt;Privilege escalation via project export&lt;&#x2F;h2&gt;

&lt;p&gt;Due to incorrect attribute whitelisting, it was possible for a project export to
contain the full User attributes of project members, including their API tokens.
See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;20974&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Update (2016-08-17 22:00 UTC):&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; We have temporarily made importing a GitLab
project export require administrator access while we further audit the security
of the import&#x2F;export feature as a whole.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of
&lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for responsibly disclosing this issue
to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;rails-security-update&quot;&gt;Rails security update&lt;&#x2F;h2&gt;

&lt;p&gt;Rails &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2016&#x2F;8&#x2F;11&#x2F;Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released&#x2F;&quot;&gt;recently released version 4.2.7.1&lt;&#x2F;a&gt; to address two security
vulnerabilities, so we&#x27;ve updated the version included in GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/10/gitlab-8-dot-10-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/10/gitlab-8-dot-10-dot-5-released/</id>
<published>2016-08-10T00:00:00+00:00</published>
<updated>2016-08-10T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.10.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Used cached value of project count in &lt;code&gt;Elastic::RepositoriesSearch&lt;&#x2F;code&gt; to reduce DB load. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;637&quot;&gt;!637&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a data migration to fix some missing timestamps in the members table. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5670&quot;&gt;!5670&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Revert the &quot;Defend against &#x27;Host&#x27; header injection&quot; change in the source NGINX templates. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5706&quot;&gt;!5706&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Cache project count for 5 minutes to reduce DB load. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5746&quot;&gt;!5746&lt;&#x2F;a&gt;) &amp;amp; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5754&quot;&gt;!5754&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Pin mixlib-log to version 1.6.0 in order to keep the log open for writes during reconfigure. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;914&quot;&gt;!914&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has one migration, but should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/05/gitlab-8-dot-10-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/05/gitlab-8-dot-10-dot-4-released/</id>
<published>2016-08-05T09:00:00+00:00</published>
<updated>2016-08-05T09:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.10.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;&quot;&gt;recent 8.10
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix available users in userselect dropdown when there is more than one userselect on the page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;604&quot;&gt;!604&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix updating skipped approvers in search list on removal. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;604&quot;&gt;!604&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t close referenced upstream issues from a forked project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;20527&quot;&gt;#20527&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue with dropdowns &lt;code&gt;enter&lt;&#x2F;code&gt; key not working correctly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5544&quot;&gt;!5544&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Import&#x2F;Export project import not working in HA mode. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5618&quot;&gt;!5618&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Import&#x2F;Export error checking versions. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5638&quot;&gt;!5638&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Revert Host and X-Forwarded-Host headers in NGINX. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;902&quot;&gt;!902&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Better handle the SSL certs whitelisted files when the directory has been symlinked. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;907&quot;&gt;!907&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix issue where Mattermost log file is created by the root user. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;908&quot;&gt;!908&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/08/01/gitlab-8-dot-10-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/08/01/gitlab-8-dot-10-dot-3-released/</id>
<published>2016-08-01T00:00:00+00:00</published>
<updated>2016-08-01T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.10.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;&quot;&gt;recent 8.10
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix regression in Git Annex permission check. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;599&quot;&gt;!599&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; [Elastic] Fix commit search for some URLs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;605&quot;&gt;!605&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Import&#x2F;Export issue importing milestones and labels not associated properly. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5426&quot;&gt;!5426&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix timing problems running imports on production. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5523&quot;&gt;!5523&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a log message when a project is scheduled for destruction for debugging. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5540&quot;&gt;!5540&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix hooks missing on imported GitLab projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5549&quot;&gt;!5549&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Properly abort a merge when merge conflicts occur. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5569&quot;&gt;!5569&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix importer for GitHub Pull Requests when a branch was removed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5573&quot;&gt;!5573&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ignore invalid IPs in &lt;code&gt;X-Forwarded-For&lt;&#x2F;code&gt; when trusted proxies are configured. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5584&quot;&gt;!5584&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Trim extra displayed carriage returns in diffs and files with CRLFs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5588&quot;&gt;!5588&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/07/27/gitlab-8-dot-10-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/07/27/gitlab-8-dot-10-dot-2-released/</id>
<published>2016-07-27T00:00:00+00:00</published>
<updated>2016-07-27T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.10.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;&quot;&gt;recent 8.10
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix pagination on search result page when ES search is enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;592&quot;&gt;!592&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Decouple an ES index update from &lt;code&gt;RepositoryUpdateMirrorWorker&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;593&quot;&gt;!593&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix broken &lt;code&gt;user_allowed?&lt;&#x2F;code&gt; check in Git Annex push. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;597&quot;&gt;!597&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; User can now search branches by name. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5144&quot;&gt;!5144&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Page is now properly rendered after committing the first file and creating the first branch. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5399&quot;&gt;!5399&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add branch or tag icon to ref in builds page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5434&quot;&gt;!5434&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix backup restore. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5459&quot;&gt;!5459&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use project ID in repository cache to prevent stale data from persisting across projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5460&quot;&gt;!5460&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue with autocomplete search not working with enter key. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5466&quot;&gt;!5466&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add iid to MR API response. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5468&quot;&gt;!5468&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable MySQL foreign key checks before dropping all tables. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5472&quot;&gt;!5472&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure relative paths for video are rewritten as we do for images. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5474&quot;&gt;!5474&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure current user can retry a build before showing the &#x27;Retry&#x27; button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5476&quot;&gt;!5476&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add ENV variable to skip repository storages validations. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5478&quot;&gt;!5478&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added &lt;code&gt;*.js.es6 gitlab-language=javascript&lt;&#x2F;code&gt; to &lt;code&gt;.gitattributes&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5486&quot;&gt;!5486&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t show comment button in gutter of diffs on MR discussion tab. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5493&quot;&gt;!5493&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Rescue Rugged::OSError (lock exists) when creating references. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5497&quot;&gt;!5497&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix expand all diffs button in compare view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5500&quot;&gt;!5500&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show release notes in tags list. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5503&quot;&gt;!5503&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a bug where forking a project from a repository storage to another would fail. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5509&quot;&gt;!5509&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix missing schema update for &lt;code&gt;20160722221922&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5512&quot;&gt;!5512&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt; version to 3.2.1 in the 8.9-&amp;gt;8.10 update guide. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5516&quot;&gt;!5516&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Exclude standard ports from Host header. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;891&quot;&gt;!891&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/07/25/gitlab-8-dot-10-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/07/25/gitlab-8-dot-10-dot-1-released/</id>
<published>2016-07-25T00:00:00+00:00</published>
<updated>2016-07-25T00:00:00+00:00</updated>
<author>
<name>Rémy Coutable</name>
</author>
<content type='html'>
&lt;p&gt;Today we are releasing version 8.10.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;07&#x2F;22&#x2F;gitlab-8-10-released&#x2F;&quot;&gt;recent 8.10
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Refactor repository storages documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5428&quot;&gt;!5428&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Gracefully handle case when keep-around references are corrupted or exist already. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5430&quot;&gt;!5430&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add detailed info on storage path mountpoints. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5437&quot;&gt;!5437&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 when creating Wiki pages with hyphens or spaces. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5444&quot;&gt;!5444&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug where replies to commit notes displayed in the MR discussion tab wouldn&#x27;t show up on the commit page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5446&quot;&gt;!5446&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ignore invalid trusted proxies in &lt;code&gt;X-Forwarded-For&lt;&#x2F;code&gt; header. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5454&quot;&gt;!5454&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add links to the real &lt;code&gt;markdown.md&lt;&#x2F;code&gt; file for all GFM examples. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5458&quot;&gt;!5458&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix custom HTTP&#x2F;HTTPS external ports. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;887&quot;&gt;!887&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has one migration, but should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.10 released with Wildcard Branch Protection and Manual Actions for CI</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/07/22/gitlab-8-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/07/22/gitlab-8-10-released/</id>
<published>2016-07-22T17:00:00+00:00</published>
<updated>2016-07-22T17:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;GitLab enables you to go faster from idea to production.
With every GitLab release we want to improve this and with 8.10,
GitLab is &lt;em&gt;yet again&lt;&#x2F;em&gt; faster than ever.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.10, reviewing code and making sure it gets merged
is easier and snappier than ever with many improvements to diffs and protected
branches. And when it&#x27;s time to deploy, you can now do a manual check before
deploying with a single click, with manual actions.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
Winnie! Winnie has been incredibly helpful &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests?author_id=14714&amp;amp;scope=all&amp;amp;sort=id_desc&amp;amp;state=merged&quot;&gt;fixing bugs&lt;&#x2F;a&gt; in GitLab and even
triaging issues on GitLab.com.
Thanks &lt;strong&gt;&lt;em&gt;Winnie&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt;!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;wildcard-branch-protection&quot;&gt;Wildcard Branch Protection&lt;&#x2F;h2&gt;

&lt;p&gt;To make sure your branches don&#x27;t get deleted or accidentally pushed to,
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;branhces&#x2F;protected.html&quot;&gt;you can protect them&lt;&#x2F;a&gt;. This even allows you to prevent
people with lower permission levels to push or merge to these branches,
which is very convenient for production and release branches.&lt;&#x2F;p&gt;

&lt;p&gt;With Gitlab 8.10 you can now protect any branch automatically, based on a
wildcard. This makes it much easier to protect a large amount of branches.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;wc1.png&quot; alt=&quot;Wildcard Branch Protection in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For example, if you protect &lt;code&gt;release-*&lt;&#x2F;code&gt;, any branch whose name starts
with &lt;code&gt;release-&lt;&#x2F;code&gt; automatically becomes protected. At GitLab we use this feature
to automatically protect all our stable releases by protecting &lt;code&gt;*-stable&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;wc2.png&quot; alt=&quot;Wildcard Branch Protection in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-into-protected-branches&quot;&gt;Merge into Protected Branches&lt;&#x2F;h2&gt;

&lt;p&gt;Using protected branches is a great way to ensure only the right people
can push to important branches. By default, only &lt;code&gt;Master&lt;&#x2F;code&gt; permission and higher
is able to push or merge anything into a protected branch.&lt;&#x2F;p&gt;

&lt;p&gt;Previously, we added the ability to allow &lt;code&gt;Developer&lt;&#x2F;code&gt; users to also push to
these branches. With GitLab 8.10 you can now disallow pushing, yet explicitly
allow merges by &lt;code&gt;Developer&lt;&#x2F;code&gt; users.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;dev_merge.png&quot; alt=&quot;Allow developers to merge to protected branches in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Concretely this means that &lt;code&gt;Developer&lt;&#x2F;code&gt; users can merge a merge request but not
directly push&lt;&#x2F;strong&gt;. So your branches are protected from direct pushes, yet developers
don&#x27;t need elevated permissions or wait for someone with a higher permission to
press merge (this is only possible to the web interface,
not from the command line).&lt;&#x2F;p&gt;

&lt;p&gt;Combine this feature with approvals (EE only) to enforce code review by multiple
people, while still giving developers the power to merge at their discretion.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;repository&#x2F;branches&#x2F;protected.html&quot;&gt;See our documentation on protected branches&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;improved-diffs&quot;&gt;Improved Diffs&lt;&#x2F;h2&gt;

&lt;p&gt;Whether you create or review code and content, you are spending a lot of time
looking at diffs, so they should work really well. With GitLab 8.10 diffs will
render faster and have even learned a few new tricks.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;better-side-by-side-diffs&quot;&gt;Better Side-by-Side Diffs&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve improved side-by-side diffs so that they now accurately show you the
changes side-by-side.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;side1.png&quot; alt=&quot;Better side-by-side diffs in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;inline-diffs&quot;&gt;Inline Diffs&lt;&#x2F;h3&gt;

&lt;p&gt;When you have specific inline changes, we&#x27;ll now show the exact changes that
were made, rather than just the entire line:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;inline1.png&quot; alt=&quot;Inline diffs in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;collapsable-diffs&quot;&gt;Collapsable Diffs&lt;&#x2F;h3&gt;

&lt;p&gt;Diffs can now be collapsed by clicking on the filename, allowing you
to review file-by-file.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;cdiff.png&quot; alt=&quot;Collapsable diffs in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Very large diffs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab_git&#x2F;merge_requests&#x2F;101#note_13100125&quot;&gt;&amp;gt; 10kb&lt;&#x2F;a&gt;) will automatically be collapsed and can be expanded on
demand. This should go a long way into improving working with large diffs with
many files.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;manual-actions-to-trigger-pipeline-jobs&quot;&gt;Manual Actions to Trigger Pipeline Jobs&lt;&#x2F;h2&gt;

&lt;p&gt;You&#x27;ve already got your
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;pipelines.html&quot;&gt;CI&#x2F;CD pipeline&lt;&#x2F;a&gt; configured to
continuously deploy changes, right? Well maybe you&#x27;re not ready to have it
automatically deploy to production. You might automatically deploy to staging,
but you want to do manual QA before deploying to production.&lt;&#x2F;p&gt;

&lt;p&gt;Now you can define
how to deploy to production and using &lt;code&gt;when: manual&lt;&#x2F;code&gt;, a new action will appear
in the web UI so that you or your release manager can trigger that part of the
pipeline manually. You can define any kind of job in your pipeline to be
performed at a later time, when a user chooses.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;ci_manual1.png&quot; alt=&quot;Manual Actions with Pipelines in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The actions also show up in the environments, making it easy to promote from
staging to production:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;ci_manual2.png&quot; alt=&quot;Manual Actions with Pipelines in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;quick_start&#x2F;&quot;&gt;Read our docs on getting started with GitLab CI&lt;&#x2F;a&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;environments.html&quot;&gt;Documentation on Environments and Deployments in GitLab CI&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;blockquote-fence-syntax&quot;&gt;Blockquote Fence Syntax&lt;&#x2F;h2&gt;

&lt;p&gt;If you want to quote multiple lines in markdown, you no longer have to
prepend every sentence with &lt;code&gt;&amp;gt;&lt;&#x2F;code&gt;, rather you can use the new fence syntax
in GitLab:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&amp;gt;&amp;gt;&amp;gt;
This will all become a quote.

Independent of the amount of line breaks.

Yay!
&amp;gt;&amp;gt;&amp;gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;markdown&#x2F;markdown.html#gitlab-flavored-markdown-gfm&quot;&gt;Read how to use GitLab Flavored Markdown&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;multiple-repository-mount-points&quot;&gt;Multiple Repository Mount Points&lt;&#x2F;h2&gt;

&lt;p&gt;You now have the option to distribute storage load over multiple mount points.
Simply define the alternative mount points in your &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt; file:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;git_data_dirs({
  &quot;default&quot; =&amp;gt; &quot;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;git-data&quot;,
  &quot;alternative&quot; =&amp;gt; &quot;&#x2F;mnt&#x2F;nas&#x2F;git-data&quot;
})
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;In the GitLab admin area you are able to configure under which mount point
new repositories will be stored.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;repository_storages.html&quot;&gt;Read the documentation on multiple mount points&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;bulk-subscribe-to-issues&quot;&gt;Bulk Subscribe to Issues&lt;&#x2F;h2&gt;

&lt;p&gt;You can now bulk subscribe and unsubscribe to issues, making it easier to start
following new activity in a project you just joined or to quiet some of the
email noise.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;bulk_sub.gif&quot; alt=&quot;Bulk subscribe to issues in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;custom-notification-level-for-groups&quot;&gt;Custom Notification Level for Groups&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 8.9 &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;06&#x2F;22&#x2F;gitlab-8-9-released&#x2F;#custom-notification-level&quot;&gt;we added a custom notification to projects&lt;&#x2F;a&gt;, allowing
you to only get notified on what&#x27;s important to you.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.10 you can now also set this on a group level, setting this for
all projects except the project that you have overridden with other notification
settings.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ticket-based-kerberos-authentication-enterprise-edition&quot;&gt;Ticket-based Kerberos authentication (Enterprise Edition)&lt;&#x2F;h2&gt;

&lt;p&gt;Before GitLab 8.10 users had to submit their Kerberos username and password on the GitLab sign-in page to authenticate with Kerberos. In GitLab 8.10 Enterprise Edition it is possible for Kerberos users to sign in with one click without ever submitting their password to GitLab, via the new &#x27;Kerberos Spnego&#x27; button on the sign-in page.&lt;&#x2F;p&gt;

&lt;p&gt;We have added an OmniAuth provider for Kerberos SPNEGO authentication which reuses code originally &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;6&quot;&gt;contributed by CERN in GitLab 7.14&lt;&#x2F;a&gt; that enabled ticket-based &#x27;git clone&#x27;. If the web browser of the user &#x27;understands&#x27; Kerberos and the user has a valid Kerberos ticket on their local machine then the browser can negotiate access to GitLab during sign-in without ever asking the user for a password.&lt;&#x2F;p&gt;

&lt;p&gt;Read the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;kerberos.html&quot;&gt;Kerberos documentation&lt;&#x2F;a&gt; to learn how to enable ticket-based Kerberos integration on your GitLab Enterprise Edition server. We will remove support for password-based Kerberos sign-ins in a future release so if you are currently using GitLab with password-based Kerberos sign-ins we recommend that you switch to ticket-based sign-ins.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;syntax-highlighting&quot;&gt;Syntax Highlighting&lt;&#x2F;h2&gt;

&lt;p&gt;Syntax highlighting has been massively improved with GitLab 8.10.
We&#x27;ve updated &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jneen&#x2F;rouge&quot;&gt;rouge&lt;&#x2F;a&gt; from 1.11.1 to 2.0.5 and in doing that have added
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jneen&#x2F;rouge&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;new lexers and bugfixes&lt;&#x2F;a&gt;. That means syntax highlighting
for Docker, F#, IDL, and improved highlighting for praat,
JavaScript, Java, C#, Shell, Liquid, Tulip, Markdown, Ruby, Python and YAML!&lt;&#x2F;p&gt;

&lt;p&gt;You can now also override language guessing with a &lt;code&gt;.gitattributes&lt;&#x2F;code&gt; entry.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;highlighting.html&quot;&gt;See the documentation for details&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;disable-access-request&quot;&gt;Disable Access Request&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;06&#x2F;22&#x2F;gitlab-8-9-released&#x2F;#request-access-to-a-project&quot;&gt;The ability to request access to a project&lt;&#x2F;a&gt; can now be disabled
for a group or project.&lt;&#x2F;p&gt;

&lt;p&gt;By default it&#x27;s turned on.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-slack-integration&quot;&gt;Better Slack integration&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab can notify you on Slack when certain events happen.
For instance, when someone posts a comment, when a merge request is created
or when a build fails.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve improved the Slack service so you can configure per event to which
Slack channel GitLab should report.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;slack.png&quot; alt=&quot;Improved Slack integration with GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;integrations&#x2F;slack.html&quot;&gt;Read how to set up the Slack service in GitLab&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;updated-emoji&quot;&gt;Updated Emoji!&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve updated to the 2016 library of &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jonathanwiesel&#x2F;gemojione&quot;&gt;gemojione&lt;&#x2F;a&gt;,
adding many new and updated emoji!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;new_emoji.png&quot; alt=&quot;New Emoji in GitLab 8.10!&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;domain-blacklist&quot;&gt;Domain Blacklist&lt;&#x2F;h2&gt;

&lt;p&gt;You can now block certain domains from signing up by adding them to the
domain blacklist. Find the settings in the admin area.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;sign_up_restrictions.html#blacklist-email-domains&quot;&gt;Read how to blacklist domains in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;toggle-git-access-protocols&quot;&gt;Toggle Git Access Protocols&lt;&#x2F;h2&gt;

&lt;p&gt;You can now configure Git access controls: enabling or disabling SSH, HTTP or
both.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;settings&#x2F;visibility_and_access_controls.html#enabled-git-access-protocols&quot;&gt;Read how to toggle protocols in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;inline-videos-now-supported&quot;&gt;Inline Videos now supported!&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab will now render inline videos in comments and descriptions of
issues and merge requests.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;markdown&#x2F;markdown.html#gitlab-flavored-markdown-gfm&quot;&gt;How to use GitLab Flavored Markdown&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;build-warnings&quot;&gt;Build Warnings&lt;&#x2F;h2&gt;

&lt;p&gt;When your CI pipeline passes, but there were some warnings since you
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#allow_failure&quot;&gt;allow some jobs to fail&lt;&#x2F;a&gt;,
GitLab will now tell you in the related merge request:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;warnings.png&quot; alt=&quot;Build warnings in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;usage-ping-ee-only&quot;&gt;Usage Ping (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;To help us better engage with our customers, 8.10 EE periodically attempts to
send license usage back to GitLab, Inc. You can
disable this functionality by unchecking a setting in the application settings
page, which will also show you the &lt;em&gt;exact&lt;&#x2F;em&gt; payload that we&#x27;re sending.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;license_report.png&quot; alt=&quot;License Usage Report&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-improvements&quot;&gt;Performance Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab is only getting better every single month, and performance is no
exception. This month we&#x27;ve significantly increased performance for issue
rendering and diff rendering:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;perf1.png&quot; alt=&quot;Faster issues in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_10&#x2F;perf2.png&quot; alt=&quot;Faster diffs in GitLab 8.10&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;And have made a large amount of further changes, some highlights below with
links to their merge requests.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;backend&quot;&gt;Backend&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3666&quot;&gt;HAML has been replaced with Hamlit to reduce memory usage and rendering timings of views&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4984&quot;&gt;Certain Git operations are now cached when finding CI pipelines&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4996&quot;&gt;Various Git operations on project dashboards are now cached, reducing the time spent in Git whenever the caches exist&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4997&quot;&gt;Git operations related to viewing trees of files are only executed when necessary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5020&quot;&gt;The various Markdown reference parsers now re-use SQL queries when used multiple times in the same request, reducing the total number of executed SQL queries&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5083&quot;&gt;The column &lt;code&gt;projects.pushes_since_gc&lt;&#x2F;code&gt; is only updated at most once per minute, reducing the number of writes to the &lt;code&gt;projects&lt;&#x2F;code&gt; table&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5093&quot;&gt;Checking if an avatar is present no longer hits the underlying storage engine, reducing the time it takes to check if an avatar is present&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5102&quot;&gt;Checking if a user has access to a single project has been optimised&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5151&quot;&gt;The queries used to get merge request closing&#x2F;merging events are now cached per request&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5305&quot;&gt;The presence of an external wiki is now cached on database level&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5311&quot;&gt;Performance of automatically generating links in Markdown has been improved&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5070&quot;&gt;Checking whether to show a system note has been optimized&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4982&quot;&gt;The maximum access badge for each author of a comment is now cached to prevent multiple lookups for the same author&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;frontend&quot;&gt;Frontend&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4776&quot;&gt;Rendering of diffs has been improved by only rendering certain UI elements when necessary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4883&quot;&gt;Page specific JS loading has been implemented in a better way, reducing the amount of JS to load per page&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4978&quot;&gt;Cropper.js has been separated from the main JavaScript file and only load Cropper.js when necessary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5113&quot;&gt;The projects dropdown now only sends the data it needs, reducing the time it takes to load the data&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5130&quot;&gt;Discussion notes are not rendered when the diff tab is requested using Ajax&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5140&quot;&gt;The code used to check which issues are closed by a merge request is only called when necessary&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;monitoring&quot;&gt;Monitoring&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4871&quot;&gt;Sidekiq latency is now tracked&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4993&quot;&gt;Redis cache hits and misses are now tracked&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5038&quot;&gt;The Markdown syntax highlighting filter is instrumented&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;runner-v14&quot;&gt;Runner v1.4&lt;&#x2F;h2&gt;

&lt;p&gt;From now on, runner releases will be synchronized with monthly GitLab releases.
Changes in this release (links to merge requests):&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;217&quot;&gt;Use Sentry in GitLab Runner to monitor critical errors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;218&quot;&gt;Improve logging&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;224&quot;&gt;Extend support for caching and artifacts for other executors&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;111&quot;&gt;Add support for cloning VirtualBox VM snapshots&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;233&quot;&gt;Improve support for Docker Machine&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;merge_requests&#x2F;232&quot;&gt;Improve build abort&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-mattermost-32&quot;&gt;GitLab Mattermost 3.2&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-3-2-german-custom-emoji-improved-threaded-messaging-search-windows-and-mac-apps-plus-more&#x2F;&quot;&gt;Mattermost 3.2&lt;&#x2F;a&gt; ships in GitLab 8.10 with German language translation, custom emoji, improved threaded messages, widescreen search, new Exchange and XMPP integrations, plus many more new benefits.&lt;&#x2F;p&gt;

&lt;p&gt;This version also includes &lt;a href=&quot;http:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt; and upgrade from earlier versions is recommended.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;To upgrade to GitLab 8.10, about 15 to 30 minutes downtime is required.
Several database columns are renamed and migrations are done for changes in the
code. To prevent faulty data, GitLab will need to be offline during this time.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-your-nginx-configuration&quot;&gt;Update your NGINX configuration&lt;&#x2F;h3&gt;

&lt;p&gt;The default NGINX configuration now overwrites the &#x27;Host&#x27; and &#x27;X-Forwarded-Host&#x27;
headers. This adds defense in depth against header injection attacks.
For installations from source this means you need to update your NGINX
configuration for GitLab. For Omnibus installations this will happen
automatically, unless you configured your own &#x27;Host&#x27; and &#x27;X-Forwarded-Host&#x27;
values in &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;git-hooks-renamed-to-push-rules-and-deprecated-api&quot;&gt;Git Hooks renamed to Push Rules and Deprecated API&lt;&#x2F;h3&gt;

&lt;p&gt;We renamed Git Hooks to Push Rules and have deprecated the git hooks API,
it will be removed with GitLab 9.0. We recommend you switch to using the
&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;projects.html#sts=Push%20Rules%20(EE%20only)&quot;&gt;new push_rules API&lt;&#x2F;a&gt; as soon as possible.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;push_rules&#x2F;push_rules.html#sts=Push%20Rules&quot;&gt;Read about Push Rules in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;default-behavior&quot;&gt;Default behavior&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Enterprise Edition includes advanced features such as LDAP Group support,
merge request approvals, Geo and File locking.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_10&#x2F;bg.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/07/11/gitlab-8-dot-9-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/07/11/gitlab-8-dot-9-dot-6-released/</id>
<published>2016-07-11T00:00:00+00:00</published>
<updated>2016-07-11T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.9.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Avoid adding index for key fingerprint if it already exists. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;539&quot;&gt;!539&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix importing of events under notes for GitLab projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5154&quot;&gt;!5154&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix log statements in import&#x2F;export. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5129&quot;&gt;!5129&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix commit avatar alignment in compare view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5128&quot;&gt;!5128&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken migration in MySQL. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5005&quot;&gt;!5005&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has no migrations and should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/07/06/gitlab-8-dot-9-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/07/06/gitlab-8-dot-9-dot-5-released/</id>
<published>2016-07-06T00:00:00+00:00</published>
<updated>2016-07-06T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.9.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix of quoted text in lock tooltip. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;518&quot;&gt;!518&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add more debug info to import&#x2F;export and memory killer. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5108&quot;&gt;!5108&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed avatar alignment in new MR view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5095&quot;&gt;!5095&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix diff comments not showing up in activity feed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5069&quot;&gt;!5069&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add index on both Award Emoji user and name. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5061&quot;&gt;!5061&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Downgrade to Redis 3.2.2 due to massive memory leak with Sidekiq. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5056&quot;&gt;!5056&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Re-enable import button when import process fails due to namespace already being taken. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5053&quot;&gt;!5053&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix snippets comments not being displayed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5045&quot;&gt;!5045&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix emoji paths in relative root configurations. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5027&quot;&gt;!5027&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issues importing events in Import&#x2F;Export. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4987&quot;&gt;!4987&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed &#x27;use shortcuts&#x27; button on docs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4979&quot;&gt;!4979&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Admin should be able to turn shared runners into specific ones. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4961&quot;&gt;!4961&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update RedCloth to 4.3.2 for CVE-2012-6684. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4929&quot;&gt;!4929&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve the request &#x2F; withdraw access button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4860&quot;&gt;!4860&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version has one migration, but should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9.4, 8.8.7, and 8.7.9 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/07/04/gitlab-8-dot-9-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/07/04/gitlab-8-dot-9-dot-4-released/</id>
<published>2016-07-04T00:00:00+00:00</published>
<updated>2016-07-04T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.9.4, 8.8.7, and 8.7.9 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;All versions contain two security fixes, and 8.9.4 additionally contains fixes
for another batch of regressions. We recommend that all GitLab installations be
upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix privilege escalation issue with OAuth external users.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure references to private repos aren&#x27;t shown to logged-out users.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Updated breakpoint for sidebar pinning. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5019&quot;&gt;!5019&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Expiry date on pinned nav cookie. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5009&quot;&gt;!5009&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix wrong line in changelog. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;5008&quot;&gt;!5008&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle external issues in IssueReferenceFilter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4988&quot;&gt;!4988&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix restore warning message. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4980&quot;&gt;!4980&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not show build retry link when build is active. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4967&quot;&gt;!4967&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed commit avatar alignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4933&quot;&gt;!4933&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed URL on label button when filtering. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4897&quot;&gt;!4897&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; File Browser navigation fixes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4891&quot;&gt;!4891&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Sub nav isn&#x27;t showing on file view&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4890&quot;&gt;!4890&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed search field blur not removing focus. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4704&quot;&gt;!4704&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Improve how File Lock feature works with nested items. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;497&quot;&gt;!497&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;information-disclosure-via-references&quot;&gt;Information disclosure via references&lt;&#x2F;h2&gt;

&lt;p&gt;Certain GitLab Flavored Markdown references could expose the existence of a
private project to logged-out users. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18033&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Ron Arts for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-for-external-users-via-oauth&quot;&gt;Privilege escalation for external users via OAuth&lt;&#x2F;h2&gt;

&lt;p&gt;If an external user logged in via an OAuth provider that was not in the
&lt;code&gt;external_providers&lt;&#x2F;code&gt; configuration setting, they would erroneously be set to
internal. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;19312&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Niels Keurentjes for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;#security-notices&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>May 2, 2016 Security Release Root Cause Analysis</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/29/may-2-2016-security-release-post-mortem/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/29/may-2-2016-security-release-post-mortem/</id>
<published>2016-06-29T00:00:00+00:00</published>
<updated>2016-06-29T00:00:00+00:00</updated>
<author>
<name>Stan Hu</name>
</author>
<content type='html'>&lt;p&gt;On May 2, 2016, we released a &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;05&#x2F;02&#x2F;cve-2016-4340-patches&#x2F;&quot;&gt;major security
update&lt;&#x2F;a&gt;, primarily
to fix a critical security issue that allowed a user to gain administrative
access via the &quot;impersonate&quot; feature. Now that some time has passed and most
of our users have had sufficient time to upgrade, we&#x27;d like to reflect on what
happened, how it occurred, and what we&#x27;re doing in the future to improve
security in the GitLab code base.&lt;&#x2F;p&gt;



&lt;p&gt;Since May 2, we have released a number of security updates to address certain
vulnerabilities, but none of the updates have addressed a bug as serious as
the one in the &quot;impersonate user&quot; feature, which is now known as
&lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-4340&quot;&gt;CVE-2016-4340&lt;&#x2F;a&gt;.
We released this feature in November of 2015 in GitLab 8.2. It enables admins
to diagnose issues with their GitLab installation by allowing them to see what
their users see. Since the initial implementation, members from the community
helped improve the code, but nobody noticed there was a security hole in one
of the controller methods.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;discovering-the-hole&quot;&gt;Discovering the hole&lt;&#x2F;h2&gt;

&lt;p&gt;All that changed on Friday, April 22, 2016, when Douwe Maan, our Backend Lead,
began reviewing the code for the feature. Having reviewed hundreds of merge
requests and handled an influx of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&quot;&gt;HackerOne&lt;&#x2F;a&gt; security
reports, Douwe immediately spotted something wrong: a critical authorization
flaw in one of the API endpoints. This flaw would allow a user to gain full
GitLab administrative access. Within an hour, Douwe submitted a fix
internally. Over the weekend, we began strategizing about how best to roll out
this fix to the community.&lt;&#x2F;p&gt;

&lt;p&gt;Our first question: How do we protect GitLab.com against this vulnerability
without disclosing details that might harm users who have their own
installations of GitLab? We first considered applying a hotfix to GitLab.com,
but our infrastructure team had no desire to do this. Applying hotfixes to a
live-running, production system is fraught with perils, and we did not want to
risk causing other issues. Instead, our Infrastructure Lead, Pablo Carranza
proposed blocking the vulnerable route via a HAProxy rule. This would only be
a simple configuration change in one place. The following Tuesday, Pablo
applied the HAProxy rule and verified that it successfully blocked the route.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab.com patched with this workaround, we next had to consider: how
much advance notice should we give to our users about a security release?
Since GitLab is open source, releasing an update means the code would be
available for any malicious user to study how to exploit the hole. At first,
we decided on a 3-hour timeline:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Send a security announcement on our security mailing list (T-3 hours)&lt;&#x2F;li&gt;
  &lt;li&gt;Make the GitLab packages online and update GitLab.com (T-1 hour)&lt;&#x2F;li&gt;
  &lt;li&gt;Announce on the blog (T)&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;For most zero-day vulnerabilities, vendors simply announce updated packages and
encourage users to update immediately. However, after further discussion, we
felt releasing GitLab in a 3-hour window would not be responsible due to a
number of reasons:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Most administrators would be caught off-guard without at least 24-hour notice&lt;&#x2F;li&gt;
  &lt;li&gt;The severity and ease-of-exploit of the bug could cause significant problems&lt;&#x2F;li&gt;
  &lt;li&gt;Native package maintainers of GitLab (e.g. Debian, FreeBSD, etc.) would not
have updates in time&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;warning-users&quot;&gt;Warning Users&lt;&#x2F;h2&gt;

&lt;p&gt;These reasons convinced us to take the unusual step of giving a notice of an
impending release for the following Monday. On Wednesday, April 27 around
5:30 pm UTC, we sent out this announcement to our security mailing list:&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;We have discovered a critical security issue in all GitLab CE and EE versions from 8.2 to 8.7.&lt;&#x2F;p&gt;

  &lt;p&gt;On Monday May 2, 2016 at 5:00pm PDT, we will publish new GitLab patch releases
for all affected versions. We strongly recommend that all installations
running a version mentioned above be upgraded as soon as possible after the
release. Please forward this alert to the appropriate person at your
organization and have them subscribe to Security Notices. The following
versions are affected:&lt;&#x2F;p&gt;

  &lt;p&gt;8.7.0&lt;&#x2F;p&gt;

  &lt;p&gt;8.6.0 through 8.6.7&lt;&#x2F;p&gt;

  &lt;p&gt;8.5.0 through 8.5.11&lt;&#x2F;p&gt;

  &lt;p&gt;8.4.0 through 8.4.9&lt;&#x2F;p&gt;

  &lt;p&gt;8.3.0 through 8.3.8&lt;&#x2F;p&gt;

  &lt;p&gt;8.2.0 through 8.2.4&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;In addition, we shared patches privately with GitLab package maintainers, who
all appreciated the advanced warning. They immediately began work on updating
their native packages with the changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;early-release&quot;&gt;Early Release?&lt;&#x2F;h2&gt;

&lt;p&gt;The next day, Thursday, we completed the long task of incorporating the
patches and building a total of 42 Omnibus packages for all six releases to a
private repository. We updated GitLab.com to 8.7.1, which contained the fix,
and removed the HAProxy workaround.&lt;&#x2F;p&gt;

&lt;p&gt;Some recipients of the e-mail &lt;a href=&quot;https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11582634&quot;&gt;expressed confusion on Hacker
News&lt;&#x2F;a&gt; because they did not see
a security announcement on our blog. They suspected the e-mail was spam.&lt;&#x2F;p&gt;

&lt;p&gt;After reading the Hacker News post, CEO Sid Sijbrandij pointed out that
announcing the affected versions dramatically reduced the search scope of the
bug. An attacker could see what changed between 8.1 and 8.2 and discover the
vulnerability. If someone exploited the bug over this weekend, customers would
have no way to patch their installations for several days. A discussion ensued
about whether to move up the release earlier. Instead of Monday, what about
Thursday or Friday? We nixed Thursday because the day was over for our
European team; more time was needed to have the packages ready. We considered
moving the release up to Friday, but a number of people on the team argued that
this was not a good idea. Senior Developer Robert Speicher articulated it well:&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;We chose the date we did to give people time to prepare. A smart, nefarious
person &lt;em&gt;might&lt;&#x2F;em&gt; figure out the exploit over the weekend, but releasing early
&lt;em&gt;will&lt;&#x2F;em&gt; catch people off-guard and put the exploit into the wild.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;We decided to stay with Monday but prepare everything just in case we needed
to release early. In addition, we &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;04&#x2F;28&#x2F;gitlab-major-security-update-for-cve-2016-4340&#x2F;&quot;&gt;belatedly posted a blog entry to match our
security e-mail notice&lt;&#x2F;a&gt;,
but this time we omitted the affected versions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;releasing-to-the-public&quot;&gt;Releasing to the Public&lt;&#x2F;h2&gt;

&lt;p&gt;Monday, May 2, 2016 came without incident, and the day of the rollout went
smoothly. Around 11:59 UTC, we transferred all 42 Omnibus packages from our
private repository to the public one and pushed up new Docker images to Docker
Hub. We published the blog post, code, and disclosed all
previously-confidential issues to the public on GitLab.com. The security
update hit &lt;a href=&quot;https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11617299&quot;&gt;the front page of Hacker
News&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;what-went-right&quot;&gt;What Went Right&lt;&#x2F;h2&gt;

&lt;p&gt;A number of things went right:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;There were no reported incidents of anyone exploiting this bug prior to our disclosure.&lt;&#x2F;li&gt;
  &lt;li&gt;We were able to reproduce, fix, and test the security vulnerabilities quickly.&lt;&#x2F;li&gt;
  &lt;li&gt;Even though we are a remotely-distributed team, we were able to effectively communicate and
pull together to get the many tasks done for the security update.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;what-we-are-doing-to-improve&quot;&gt;What We Are Doing to Improve&lt;&#x2F;h2&gt;

&lt;p&gt;At GitLab, we prioritize security issues and try to address them as soon as
possible. Since this release, we have learned a number of things that have
been put into action:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;We need a better workflow&#x2F;tools to produce confidential merge requests and packages. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;14567&quot;&gt;#14567&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;When we send out security notices via e-mail, we should always have an accompanying blog post.&lt;&#x2F;li&gt;
  &lt;li&gt;In the future, if we send an early security notice, we will omit the version
numbers affected to prevent people zeroing in on the vulnerability.&lt;&#x2F;li&gt;
  &lt;li&gt;We need better abstractions for our permission checking &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15450&quot;&gt;#15450&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;We need to &lt;a href=&quot;&#x2F;job-families&#x2F;security&#x2F;security-engineer&#x2F;&quot;&gt;hire full-time engineers to focus on improving security&lt;&#x2F;a&gt; and to conduct internal audits of our code&lt;&#x2F;li&gt;
  &lt;li&gt;We need to promote our &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;gitlab&quot;&gt;bug bounty program&lt;&#x2F;a&gt; on sites like HackerOne&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;In general, we received positive responses to this May 2016 security
release. Many of our users understood that giving advance notice for a
security update made sense. We thank the GitLab community for their patience
and understanding. We will continue to be vigilant about security issues
within GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;If you have not already, please sign up on for future &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;security
notices&lt;&#x2F;a&gt; on this page.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;join-us-on-july-27th-for-our-joint-webcast-with-yubico&quot;&gt;Join us on July 27th for our joint webcast with Yubico&lt;&#x2F;h2&gt;

&lt;p&gt;We recognize that security is a growing concern for a number of teams. We&#x27;re partnering with
Yubico again. This time to discuss industry trends and best practices for security. Here&#x27;s
a quick look at what we&#x27;ll be talking about.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Key trends that affect the security of your team&lt;&#x2F;li&gt;
  &lt;li&gt;Real-life examples of how both GitLab and Yubico work to improve security&lt;&#x2F;li&gt;
  &lt;li&gt;Advice on industry best practices&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;If you&#x27;re interested in learning more or asking security-related questions, please
join us on July 27th. &lt;a href=&quot;https:&#x2F;&#x2F;page.gitlab.com&#x2F;July27WebcastSecurityWebcastwYubico_LandingPage.html&quot;&gt;Register here.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/29/gitlab-8-dot-9-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/29/gitlab-8-dot-9-dot-3-released/</id>
<published>2016-06-29T00:00:00+00:00</published>
<updated>2016-06-29T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.9.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;06&#x2F;22&#x2F;gitlab-8-9-released&#x2F;&quot;&gt;recent 8.9
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Roll back Grack::Auth to fix Git HTTP SPNEGO. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;504&quot;&gt;!504&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix MR creation on fork of deleted project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;503&quot;&gt;!503&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;attr_encrypted&lt;&#x2F;code&gt; in EE. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;502&quot;&gt;!502&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix encrypted data backwards compatibility after upgrading &lt;code&gt;attr_encrypted&lt;&#x2F;code&gt; gem. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4963&quot;&gt;!4963&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix rendering of commit notes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4953&quot;&gt;!4953&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Resolve &quot;Pin should show up at 1280px min&quot;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4947&quot;&gt;!4947&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Switched mobile button icons to ellipsis and angle. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4944&quot;&gt;!4944&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Correctly returns Todo ID after creating Todo. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4941&quot;&gt;!4941&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Better debugging for memory killer middleware. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4936&quot;&gt;!4936&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove duplicate new page button from edit wiki. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4904&quot;&gt;!4904&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use &lt;code&gt;clock_gettime&lt;&#x2F;code&gt; for all performance timestamps. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4899&quot;&gt;!4899&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use update_columns to bypass all the dirty code on active_record. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4985&quot;&gt;!4985&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Reduce overhead and optimize ProjectTeam#max_member_access performance. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4973&quot;&gt;!4973&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixes missing avatar on system notes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4954&quot;&gt;!4954&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Removed fade when filtering results. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4932&quot;&gt;!4932&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed avatar alignment in new MR view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4901&quot;&gt;!4901&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9.2, 8.8.6, and 8.7.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/28/gitlab-8-dot-9-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/28/gitlab-8-dot-9-dot-2-released/</id>
<published>2016-06-28T00:00:00+00:00</published>
<updated>2016-06-28T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.9.2, 8.8.6, and 8.7.8 for GitLab Community
Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain security fixes, and we recommend that all GitLab
installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;information-disclosure-via-snippet-search&quot;&gt;Information disclosure via Snippet search&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for guests to find snippets set to &quot;Internal&quot; via search. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18997&quot;&gt;the issue&lt;&#x2F;a&gt; for more details. This vulnerability affected both the
default search backend and the Elasticsearch backend in GitLab EE, and both have
been fixed.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Teun Beijers for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-request-access-to-group-feature&quot;&gt;Information disclosure via &quot;Request Access to Group&quot; feature&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for a user to see a list of private projects in a group simply
by requesting access to it. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;19102&quot;&gt;the issue&lt;&#x2F;a&gt; for more details. This
feature was only introduced in GitLab 8.9, so versions 8.8 and 8.7 were not
affected by this vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;colindean&quot;&gt;Colin Dean&lt;&#x2F;a&gt; for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-fix-in-ruby-saml-dependency&quot;&gt;Security fix in &lt;code&gt;ruby-saml&lt;&#x2F;code&gt; dependency&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve upgraded our version of &lt;a href=&quot;https:&#x2F;&#x2F;rubygems.org&#x2F;gems&#x2F;ruby-saml&quot;&gt;&lt;code&gt;ruby-saml&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; to address &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-5697&quot;&gt;CVE-2016-5697&lt;&#x2F;a&gt;. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4951&quot;&gt;the
merge request&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sign-up-for-security-notices&quot;&gt;Sign up for security notices&lt;&#x2F;h2&gt;

&lt;p&gt;Want to be alerted to new security patches as soon as they&#x27;re available? Sign up
for our &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;Security Newsletter&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/26/gitlab-8-dot-9-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/26/gitlab-8-dot-9-dot-1-released/</id>
<published>2016-06-26T00:00:00+00:00</published>
<updated>2016-06-26T00:00:00+00:00</updated>
<author>
<name>Robert Speicher</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.9.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version resolves a number of regressions and bugs in the &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;06&#x2F;22&#x2F;gitlab-8-9-released&#x2F;&quot;&gt;recent 8.9
release&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Improve Geo documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;431&quot;&gt;!431&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix remote mirror stuck on started issue. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;491&quot;&gt;!491&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix MR creation from forks where target project has approvals enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;496&quot;&gt;!496&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix MR edit where target project has approvals enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;496&quot;&gt;!496&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix vertical alignment of git-hooks page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;499&quot;&gt;!499&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Refactor labels documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3347&quot;&gt;!3347&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Eager load award emoji on notes. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4628&quot;&gt;!4628&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix some CI wording in documentation. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4660&quot;&gt;!4660&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Document &lt;code&gt;GIT_STRATEGY&lt;&#x2F;code&gt; and &lt;code&gt;GIT_DEPTH&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4720&quot;&gt;!4720&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add documentation for the export &amp;amp; import features. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4732&quot;&gt;!4732&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add some docs for Docker Registry configuration. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4738&quot;&gt;!4738&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure we don&#x27;t send the &quot;access request declined&quot; email to access requesters on project deletion. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4744&quot;&gt;!4744&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Display group&#x2F;project access requesters separately in the admin area. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4798&quot;&gt;!4798&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add documentation and examples for configuring cloud storage for registry images. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4812&quot;&gt;!4812&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Clarifies documentation about artifact expiry. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4831&quot;&gt;!4831&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the Network graph links. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4832&quot;&gt;!4832&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix MR-auto-close text added to description. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4836&quot;&gt;!4836&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add documentation for award emoji now that comments can be awarded with emojis. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4839&quot;&gt;!4839&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix typo in export failure email. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4847&quot;&gt;!4847&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix header vertical centering. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4170&quot;&gt;!4170&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix subsequent SAML sign ins. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4718&quot;&gt;!4718&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Set button label when picking an option from status dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4771&quot;&gt;!4771&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent invalid URLs from raising exceptions in WikiLink Filter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4775&quot;&gt;!4775&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Handle external issues in IssueReferenceFilter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4789&quot;&gt;!4789&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Support for rendering&#x2F;redacting multiple documents. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4828&quot;&gt;!4828&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update Todos documentation and screenshots to include new functionality. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4840&quot;&gt;!4840&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Hide nav arrows by default. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4843&quot;&gt;!4843&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added bottom padding to label color suggestion link. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4845&quot;&gt;!4845&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use jQuery objects in ref dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4850&quot;&gt;!4850&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix GitLab project import issues related to notes and builds. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4855&quot;&gt;!4855&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restrict header logo to 36px so it doesn&#x27;t overflow. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4861&quot;&gt;!4861&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix unwanted label unassignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4863&quot;&gt;!4863&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix mobile Safari bug where horizontal nav arrows would flicker on scroll. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4869&quot;&gt;!4869&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restore old behavior around diff notes to outdated discussions. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4870&quot;&gt;!4870&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix merge requests project settings help link anchor. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4873&quot;&gt;!4873&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 404 when accessing pipelines as guest user on public projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4881&quot;&gt;!4881&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove width restriction for logo on sign-in page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4888&quot;&gt;!4888&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump gitlab_git to 10.2.3 to fix false truncated warnings with ISO-8559 files. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4884&quot;&gt;!4884&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Apply selected value as label. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4886&quot;&gt;!4886&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix temp file being deleted after the request while importing a GitLab project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4894&quot;&gt;!4894&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix user creation with stronger minimum password requirements. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4054&quot;&gt;!4054&lt;&#x2F;a&gt;) (nathan-pmt)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a wrong MR status when merge_when_build_succeeds &amp;amp; project.only_allow_merge_if_build_succeeds are true. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4912&quot;&gt;!4912&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add SMTP as default delivery method to match gitlab-org&#x2F;omnibus-gitlab!826. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4915&quot;&gt;!4915&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.9 released with File Locking, Environments, Priority Labels and more!</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/22/gitlab-8-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/22/gitlab-8-9-released/</id>
<published>2016-06-22T00:00:00+00:00</published>
<updated>2016-06-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Whether you work on code or media,
work thousands of miles away from your organization&#x27;s HQ,
or work on a project with ten thousand issues,
GitLab 8.9 will help you get stuff done faster.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.9 you will be able to work better on complex projects together
with file locking, priority labels and new workflow tools, like
a custom notification level and the ability to
restrict merging until the build passes.
We&#x27;re also continuing to improve GitLab&#x27;s built-in continuous integration.
You can now specify environments, have artifacts expire and quickly get started
with templates.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
Rui Santos, for building the new feature that restricts merging until your build
passes. It&#x27;s a great feature that we&#x27;re sure many people are going to use.
Thanks Rui!&lt;&#x2F;p&gt;

&lt;p&gt;Since GitLab 8.8.0 we&#x27;ve had 1761 commits with 1947 files changed,
see what has changed exactly, below.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;file-locking-new-product&quot;&gt;File Locking (new Product)&lt;&#x2F;h2&gt;

&lt;p&gt;When you&#x27;re working on files that Git can&#x27;t merge for you,
working with multiple people on the same file can be a risk.
Conflicts when merging the non-text file
(which inevitably happens when two people work on the same file at the same
time), are hard to overcome and will require a lot of manual work to resolve.&lt;&#x2F;p&gt;

&lt;p&gt;To work around this, we&#x27;ve added the ability to lock files in GitLab.
File Locking prevents everyone, except you, from modifying a specific file or
entire directory.
It&#x27;s also a good way of communicating to your collaborators that you
are working on this file.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;example-game-assets&quot;&gt;Example: Game assets&lt;&#x2F;h3&gt;

&lt;p&gt;For example, you&#x27;re working on a game. Many people are involved with building
the complex levels. With file locking, you can lock the level you want to work
on by clicking lock in the interface:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;lock_file.png&quot; alt=&quot;Lock a file in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Your colleagues will see that you are working on this file.
Except for you, no one else is able to push changes that modify this file.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;locked_file.png&quot; alt=&quot;A locked file in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Once you&#x27;re done making changes and you&#x27;ve merged them, you can remove your lock
in the same way as you&#x27;ve placed it.&lt;&#x2F;p&gt;

&lt;p&gt;Find a list of all locked files under repository:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;locked_files.png&quot; alt=&quot;Locked files in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;availability&quot;&gt;Availability&lt;&#x2F;h3&gt;

&lt;p&gt;File locking is available as a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;paid option&lt;&#x2F;a&gt; for Enterprise Edition
and for free on GitLab.com.
We welcome further suggestions to expanding this feature.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;file_lock.html&quot;&gt;File lock documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;environments-and-deployments-in-ci&quot;&gt;Environments and Deployments in CI&lt;&#x2F;h2&gt;

&lt;p&gt;You can already deploy from GitLab to your various environments,
whether it is test, staging or production.
With GitLab CI you can set up pipelines with one or more jobs that
deploy for you.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.9 you can now define environments in your project&#x27;s
CI configuration file (&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;).
This allows you to track deployments to these environments and quickly
understand things like &quot;what&#x27;s running in staging?&quot;&lt;&#x2F;p&gt;

&lt;p&gt;Defining an environment is as simple as adding the &lt;code&gt;environment&lt;&#x2F;code&gt; variable
to your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;deploy to production:
  stage: deploy
  script: git push production HEAD:master
  environment: production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You can then see exactly what is live on which environment:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;environments.png&quot; alt=&quot;Environments in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the documentation on &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#environment&quot;&gt;environments in GitLab CI&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;priority-labels&quot;&gt;Priority Labels&lt;&#x2F;h2&gt;

&lt;p&gt;It can be hard to prioritize issues and merge requests, especially larger
projects can have a hard time sorting through hundreds, thousands of issues.&lt;&#x2F;p&gt;

&lt;p&gt;Adding priorities to issues could help with that, but we felt that there had
to be a better way that involved less manual work. Our solution is prioritized
labels.&lt;&#x2F;p&gt;

&lt;p&gt;Prioritized labels are like any other label, but sorted by priority.
This allows you to sort issues and merge requests by priority. Those with
the highest priority label, will appear on top.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;plabels2.png&quot; alt=&quot;Priority Labels in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For instance, the highest priority label for GitLab is &lt;code&gt;P1&lt;&#x2F;code&gt;. If I sort by
priority, I will see that issues with &lt;code&gt;P1&lt;&#x2F;code&gt; appear on top, followed by &lt;code&gt;P2&lt;&#x2F;code&gt;, etc.
In most cases, &lt;code&gt;security&lt;&#x2F;code&gt; issues are very important. By making the &lt;code&gt;security&lt;&#x2F;code&gt;
label highly prioritized, I can rest assure that my colleagues will start
working on those issues before any other issue in this milestone.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;plabels3.png&quot; alt=&quot;Priority Labels in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you prefer a more traditional priority system, you&#x27;re free to add labels
such as &lt;code&gt;priority: 1&lt;&#x2F;code&gt;, &lt;code&gt;priority: 2&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Right now, priority sorting is based the highest priority label only.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the documentation about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;labels.html&quot;&gt;Labels&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;custom-notification-level&quot;&gt;Custom Notification Level&lt;&#x2F;h2&gt;

&lt;p&gt;It&#x27;s amazing to see how people use GitLab. Some people only review code,
others closely monitor everything that happens on the issue tracker,
yet other people only want to see what&#x27;s new.&lt;&#x2F;p&gt;

&lt;p&gt;To make it easier to only get notified on what&#x27;s important to you,
we&#x27;ve added a new notification level: custom.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;custom_not_1.png&quot; alt=&quot;Custom notification level in GitLab 8.9&quot; style=&quot;max-height: 350px;&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The custom notification level works just like a participating level.
This means anywhere you participate or get mentioned, you receive a
notification. On top of that, you now have the ability to also receive
select notifications for things that are important to you.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;custom_not2.png&quot; alt=&quot;Custom notification level in GitLab 8.9&quot; style=&quot;max-height: 350px;&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;So if you just want notifications for new merge requests, you can now easily
set that up.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the documentation about &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;profile&#x2F;notifications.html&quot;&gt;Notifications&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;request-access-to-a-project&quot;&gt;Request Access to a Project&lt;&#x2F;h2&gt;

&lt;p&gt;Rather than having to contact the owners through some other means,
you can now request access to a project straight from GitLab.
Find the button on the project home page:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;req_access.png&quot; alt=&quot;Request access to a project in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You&#x27;ll get a notification when someone requests access and see the request
appear in the members sections of your project.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;access_request.png&quot; alt=&quot;Request access to a project in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the documentation on &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;members&#x2F;index.html#project-membership-and-requesting-access&quot;&gt;requesting access to a project&lt;&#x2F;a&gt; or
a &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;group&#x2F;index.html#request-access-to-a-group&quot;&gt;group&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;gitlab-ciyml-templates&quot;&gt;.gitlab-ci.yml Templates&lt;&#x2F;h2&gt;

&lt;p&gt;Continuous integration, built into GitLab, works by a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file,
where you define your tests, builds and deployments. Getting started with
creating this file can be hard, so we&#x27;ve created several templates to make
this easier.&lt;&#x2F;p&gt;

&lt;p&gt;To start with a template &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;, simply create a new file and
call it &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;. You&#x27;ll see a dropdown appear where you can choose
from several templates.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;ci_template.png&quot; alt=&quot;.gitlab-ci.yml templates in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you want to contribute your own templates, you can do so in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-yml&quot;&gt;&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Want to give GitLab CI a roll? You can use it completely for free on GitLab.com
or on your own server.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-navigation&quot;&gt;New Navigation&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve revamped the navigation of GitLab. &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;06&#x2F;06&#x2F;navigation-redesign&#x2F;&quot;&gt;We wrote before about this&lt;&#x2F;a&gt;,
but have made further changes.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;look3.png&quot; alt=&quot;Updated navigation in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The main navigation within projects is now on the top bar. Global navigation,
to pages specific to you, such as your issues and groups is in the new sidebar,
hiding automatically.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;look4.gif&quot; alt=&quot;Updated navigation in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;universal-2nd-factor-support&quot;&gt;Universal 2nd Factor Support&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab now fully supports the Universal 2nd Factor (U2F)
authentication standard. This means you can use a device like the U2F security
keys by Yubico, known as YubiKeys as your 2nd factor when signing into GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Read more about our support for U2F in our &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;06&#x2F;22&#x2F;gitlab-adds-support-for-u2f&#x2F;&quot;&gt;our blog post about it&lt;&#x2F;a&gt;
and the documentation on &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;profile&#x2F;two_factor_authentication.html&quot;&gt;Two-factor Authentication&lt;&#x2F;a&gt; in GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;import--export-projects&quot;&gt;Import &#x2F; Export Projects&lt;&#x2F;h2&gt;

&lt;p&gt;If you&#x27;re moving between GitLab instances or just want a backup of your
most important data, you can now Import and Export entire projects.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;export1.png&quot; alt=&quot;Export entire projects with GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Visit the project settings page to export your project. Importing a project
can be done from the new project page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;import.png&quot; alt=&quot;Import entire projects with GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;settings&#x2F;import_export.html&quot;&gt;documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;restrict-merging-until-build-passes&quot;&gt;Restrict Merging until Build Passes&lt;&#x2F;h2&gt;

&lt;p&gt;You can already merge a merge request automatically after the CI builds have
passed successfully. Thanks to Rui Santos, you can now
even prevent people from merging a merge request unless the build is &#x27;green&#x27;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;merge_if_build_passes.png&quot; alt=&quot;Only merge if the build passes in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This prevents people from circumventing your tests, guards your code from
sloppy contributions and encourages everyone to maintain a solid test suite.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-geo-new-product&quot;&gt;GitLab Geo (new Product)&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Geo allows you to have one or multiple mirrored instance of GitLab
running in another location. That allows your remote team to have quick
cloning and pulling of repositories, while still having everyone, globally
in sync.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;02&#x2F;22&#x2F;gitlab-8-5-released&#x2F;&quot;&gt;We released Geo in Alpha&lt;&#x2F;a&gt; with GitLab 8.5 and have been
testing it intensely internally and with customers since. One customer
reported that git clone times dropped from 10 minutes to 30 seconds
on average for their teams.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;availability-1&quot;&gt;Availability&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Geo is available for purchase from &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;our pricing page&lt;&#x2F;a&gt; or through &lt;a href=&quot;&#x2F;sales&#x2F;&quot;&gt;our sales team&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;limitations&quot;&gt;Limitations&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Geo isn&#x27;t supported for disaster recovery purposes yet.
We&#x27;ve released a guide with manual steps in the unfortunate case that you&#x27;d
have to use it for this purpose, but we recommend against using it for that.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Geo only supports PostgreSQL at the moment. MySQL is not supported.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;getting-started&quot;&gt;Getting Started&lt;&#x2F;h3&gt;

&lt;p&gt;To get started with GitLab Geo, &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;administration&#x2F;geo&#x2F;%20Geo&quot;&gt;read our documentation on it&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the Changelog&lt;&#x2F;a&gt;
to see all the named changes. See below for some further highlights of changes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;better-highlighting&quot;&gt;Better Highlighting&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab 8.9 incorporates the first &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jneen&#x2F;rouge&quot;&gt;Rouge&lt;&#x2F;a&gt; release since September (!) with over
20 new languages supported, plus support for newer features of Swift, Ruby,
Python, and C&#x2F;C++, as well as some critical bug fixes for Apache, JavaScript,
Objective-C, and Groovy.
R and Apache users will also see a marked improvement in lexing quality.
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jneen&#x2F;rouge&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md#version-1110-2016-06-06&quot;&gt;See the full changelog here&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;award-emoji-in-comments&quot;&gt;Award Emoji in Comments&lt;&#x2F;h3&gt;

&lt;p&gt;Besides issues and merge requests, you can now also vote on individual comments.
Whether you want to react to someone without distorting the flow of the
conversation or want to conduct a quick poll, you can now do it quickly,
everywhere.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;award_emojis.html&quot;&gt;award emoji documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;manually-add-todos&quot;&gt;Manually add Todos&lt;&#x2F;h3&gt;

&lt;p&gt;Every issue and merge request can now be marked as &#x27;Todo&#x27; or &#x27;Done&#x27;. This means
you don&#x27;t have to go back to the lists of Todos to mark one off and can even add
items quickly to your Todos. Super useful!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;add_todo.png&quot; alt=&quot;Manually add Todos in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;mark_done.png&quot; alt=&quot;Mark as done in GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;todos.html&quot;&gt;Todos documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;bulk-assign-labels&quot;&gt;Bulk-assign labels&lt;&#x2F;h3&gt;

&lt;p&gt;With label priorities and future features (such as &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;2306168&quot;&gt;issue boards&lt;&#x2F;a&gt;), labels are
becoming more and more important in GitLab.
To make working with issues a bit easier,
we&#x27;ve added the ability to bulk-assign labels.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;expire-artifacts&quot;&gt;Expire Artifacts&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re using artifacts in GitLab&#x27;s built-in CI, you might be building up
quite a catalogue of old data. You can now have artifacts expire by adding
a &lt;code&gt;expire_in&lt;&#x2F;code&gt; line to your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file. The artifacts will expire
after the duration that you specify.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;job:
  artifacts:
    expire_in: 1 week
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You can use natural language to set the expiry time:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;3 mins 4 sec&lt;&#x2F;li&gt;
  &lt;li&gt;2 hrs 20 min&lt;&#x2F;li&gt;
  &lt;li&gt;2h20min&lt;&#x2F;li&gt;
  &lt;li&gt;6 mos 1 day&lt;&#x2F;li&gt;
  &lt;li&gt;47 yrs 6 mos and 4d&lt;&#x2F;li&gt;
  &lt;li&gt;3 weeks and 2 days&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; this feature requires Runner 1.3, released at the same time as
GitLab 8.9&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#artifactsexpire_in&quot;&gt;artifacts documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;when-keyword-for-artifacts&quot;&gt;When keyword for Artifacts&lt;&#x2F;h3&gt;

&lt;p&gt;You can now only have artifacts be made available on failure, success or always.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;job:
  artifacts:
    when: on_failure
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The default behavior is the same as before, only creating artifacts on success.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note:&lt;&#x2F;strong&gt; this feature requires Runner 1.3, released at the same time as
GitLab 8.9&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#artifactswhen&quot;&gt;artifacts documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;support-for-docker-registry-manifest-v1&quot;&gt;Support for Docker Registry Manifest V1&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab 8.9 adds support for Manifest V1 generated by older versions
of Docker (before 1.10).&lt;&#x2F;p&gt;

&lt;h3 id=&quot;smarter-allocation-for-shared-runners&quot;&gt;Smarter allocation for Shared Runners&lt;&#x2F;h3&gt;

&lt;p&gt;Shared Runners now prioritize projects without any other shared Runners
assigned to them, before allocating more shared Runners to a single demanding
project.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;gitlab-mattermost-31&quot;&gt;GitLab Mattermost 3.1&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-3-1-apple-watch-notification-upgrades-shortcuts-compact-view-openshift-and-more&#x2F;&quot;&gt;Mattermost 3.1&lt;&#x2F;a&gt; ships in GitLab 8.9 with multi-team accounts, Japanese language translation, Apple Watch &amp;amp; upgraded notifications, keyboard shortcuts &amp;amp; channel switcher, new full width and compact view display options, new emoji, plus &lt;a href=&quot;https:&#x2F;&#x2F;about.mattermost.com&#x2F;security-updates&#x2F;&quot;&gt;security updates&lt;&#x2F;a&gt; and &lt;a href=&quot;http:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html&quot;&gt;many more improvements.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;The upgrade requires manual steps!&lt;&#x2F;strong&gt;
Before upgrading, make sure to read &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;gitlab-mattermost&#x2F;#upgrading-gitlab-mattermost-from-versions-prior-to-8.9&quot;&gt;documentation for upgrades from versions prior to 8.9&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;managing-custom-certificate-authorities-with-omnibus-gitlab-package&quot;&gt;Managing custom certificate authorities with omnibus-gitlab package&lt;&#x2F;h3&gt;

&lt;p&gt;If you run your own CA or you have self-signed certificates, you need to tell omnibus-gitlab explicitly to trust them.
This is required for web-hooks, system-hooks and anything that requires a trusted connection.
Accomplishing this task was possible with older versions of the package, however it was difficult and error prone.
Now it is possible to add all your custom certificates into a single place and after reconfiguring the package,
GitLab will be able to verify the certificate authenticity.
For more information, see the &lt;a href=&quot;http:&#x2F;&#x2F;docs.gitlab.com&#x2F;omnibus&#x2F;common_installation_problems&#x2F;README.html#using-self-signed-certificate-or-custom-certificate-authorities&quot;&gt;custom certificate authority documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-improvements&quot;&gt;Performance Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;Performance is a great priority for us. We&#x27;re working hard on making sure
GitLab can handle the loads of very large instances (like GitLab.com with hundreds
of thousands of active users) easily.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.9 we&#x27;ve made many improvements, below are some of the highlights.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;increased-memory-limits&quot;&gt;Increased Memory Limits&lt;&#x2F;h3&gt;

&lt;p&gt;We increased the default memory limits from 300-350MB to 450-600MB per worker.
Previously, our workers were being killed every 6 seconds. This was increasing
the load of the whole system, as every 6 seconds a new worker was spawned that
had to create new connections to the database and cache the data that is used
often. As a result of this change we saw a drop in HTTP queuing time from ~2
seconds down to ~100ms on average. As a side effect we also noticed that the
system load of our worker and database nodes went down to half. Memory usage on
the workers does not change too much, but worker processes now live for 20
minutes on average.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;http-queue-timings.png&quot; alt=&quot;Increased memory limits in GitLab 8.9 brought down HTTP queue timings&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;See how this affected the worker load (for GitLab.com):&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;worker-load.png&quot; alt=&quot;Decreased worker load for GitLab 8.9&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;better-handling-of-mirroring&quot;&gt;Better Handling of Mirroring&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve changed how we schedule mirroring in Sidekiq.
See the difference in queries being pushed into the database:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_9&#x2F;pg-from-sidekiq.png&quot; alt=&quot;Lower amount of queries&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;api-endpoint-for-sidekiq-metrics&quot;&gt;API Endpoint for Sidekiq Metrics&lt;&#x2F;h3&gt;

&lt;p&gt;This API endpoint allows you to retrieve some information about the current state of Sidekiq, its jobs, queues, and processes.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;api&#x2F;sidekiq_metrics.html&quot;&gt;Read more in our docs&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;other-performance-improvements&quot;&gt;Other performance improvements&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Lower PG auto-vacuum&#x2F;analyze thresholds 10x: On large GitLab servers this should amortize the costs of autovacuuming and auto-analyzing better&lt;&#x2F;li&gt;
  &lt;li&gt;Only use JS libraries where needed&lt;&#x2F;li&gt;
  &lt;li&gt;Upgrade to &lt;a href=&quot;https:&#x2F;&#x2F;blog.jquery.com&#x2F;2013&#x2F;04&#x2F;18&#x2F;jquery-2-0-released&#x2F;&quot;&gt;jQuery 2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Large amount of changes to performance monitoring, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;www-gitlab-com&#x2F;merge_requests&#x2F;2187#note_12598695&quot;&gt;see here&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The column &lt;code&gt;users.state&lt;&#x2F;code&gt; is now indexed&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries needed to render username references in Markdown has been reduced&lt;&#x2F;li&gt;
  &lt;li&gt;The builds counter for projects is now cached&lt;&#x2F;li&gt;
  &lt;li&gt;The assigned issues and merge requests counters are now cached&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries needed to render issue references in Markdown has been reduced&lt;&#x2F;li&gt;
  &lt;li&gt;Rendering labels in the issue&#x2F;merge requests sidebar now only needs 1 query instead of 2&lt;&#x2F;li&gt;
  &lt;li&gt;The number of pending&#x2F;done TODOs is now cached&lt;&#x2F;li&gt;
  &lt;li&gt;The presence of an external issue tracker is now cached per project, reducing the number of queries needed to figure out if a project uses an external issue tracker&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries needed by the issues API has been reduced&lt;&#x2F;li&gt;
  &lt;li&gt;The number of queries needed to extract issue references has been reduced&lt;&#x2F;li&gt;
  &lt;li&gt;Rendering external links now uses a more efficient way of querying elements to process&lt;&#x2F;li&gt;
  &lt;li&gt;Project dashboards now use the appropriate methods for getting branch&#x2F;tag counts, these methods cache their output to reduce load on the Git repository&#x2F;storage system&lt;&#x2F;li&gt;
  &lt;li&gt;The &lt;code&gt;keys.fingerprint&lt;&#x2F;code&gt; column is now indexed and any duplicate keys are removed automatically. This speeds up looking up keys using a fingerprint&lt;&#x2F;li&gt;
  &lt;li&gt;Project dashboards now run fewer Git operations&lt;&#x2F;li&gt;
  &lt;li&gt;The list of issue&#x2F;merge requests participants is now memoized so repeated calls in the same request don&#x27;t end up doing the same work over and over&lt;&#x2F;li&gt;
  &lt;li&gt;Rendering relative links has been optimised so it uses fewer (and more efficient) Git operations&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Downtime notice: while technically this release allows one
to upgrade without downtime, one may get errors if new comments or award emoji
are created&#x2F;assigned during the upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note&lt;&#x2F;strong&gt;: We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 and you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_9&#x2F;windmills.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.8.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/15/gitlab-8-dot-8-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/15/gitlab-8-dot-8-dot-5-released/</id>
<published>2016-06-15T00:00:00+00:00</published>
<updated>2016-06-15T00:00:00+00:00</updated>
<author>
<name>Stan Hu</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing the versions 8.8.5, 8.7.7, 8.6.9, 8.5.13, 8.4.11,
8.3.10 and 8.2.6 for GitLab Community Edition (CE) and Enterprise Edition
(EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of security fixes, and we recommend that all
GitLab installations be upgraded to one of these versions.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;p&gt;8.8.5 includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Import GitHub repositories respecting the API rate limit (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4166&quot;&gt;!4166&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix todos page throwing errors when you have a project pending deletion (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4300&quot;&gt;!4300&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable Webhooks before proceeding with the GitHub import (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4470&quot;&gt;!4470&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix importer for GitHub comments on diff (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4488&quot;&gt;!4488&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Adjust the SAML control flow to allow LDAP identities to be added to an existing SAML user (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4498&quot;&gt;!4498&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix incremental trace upload API when using multi-byte UTF-8 chars in trace (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4541&quot;&gt;!4541&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;In addition, 8.8.5, 8.7.7, 8.6.9, 8.5.13, 8.4.11, 8.3.10 and 8.2.6 include the following
security fixes:&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-access-to-project-build-traces&quot;&gt;Unauthorized access to project build traces&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for users to view build traces, possibly exposing sensitive
information to other users. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18188&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Madhu Akula for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-site-scripting-xss-vulnerability-in-wiki-pages&quot;&gt;Cross-site scripting (XSS) vulnerability in Wiki pages&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for an attacker to inject malicious JavaScript code in a
Wiki page. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;17298&quot;&gt;the issue&lt;&#x2F;a&gt; for more details&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unauthorized-access-to-notes-in-confidential-issues&quot;&gt;Unauthorized access to notes in confidential issues&lt;&#x2F;h2&gt;

&lt;p&gt;Notes in confidential issues could be viewed in JSON form by unauthorized users.
See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;18535&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.8.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/09/gitlab-8-dot-8-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/09/gitlab-8-dot-8-dot-4-released/</id>
<published>2016-06-09T00:00:00+00:00</published>
<updated>2016-06-09T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.8.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix LDAP-based login for users with 2FA enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4493&quot;&gt;!4493&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Remove license over-usage message (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;447&quot;&gt;!447&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.8.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/06/02/gitlab-8-dot-8-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/06/02/gitlab-8-dot-8-dot-3-released/</id>
<published>2016-06-02T00:00:00+00:00</published>
<updated>2016-06-02T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.8.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Add standard web hook headers to Jenkins CI post. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;374&quot;&gt;!374&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Gracefully handle malformed DNs in LDAP group sync. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;392&quot;&gt;!392&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Reduce load on DB for license upgrade check. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;421&quot;&gt;!421&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Make it clear the license overusage message is visible only to admins. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;423&quot;&gt;!423&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix Git hook validations for fast-forward merges. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;427&quot;&gt;!427&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; [Elastic] In search results, only show notes on confidential issues that the user has access to.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix 404 page when viewing TODOs that contain milestones or labels in different projects. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4312&quot;&gt;!4312&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed JS error when trying to remove discussion form. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4303&quot;&gt;!4303&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue with button color when no CI enabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4287&quot;&gt;!4287&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed potential issue with 2 CI status polling events happening. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3869&quot;&gt;!3869&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve design of Pipeline view. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4230&quot;&gt;!4230&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix gitlab importer failing to import new projects due to missing credentials. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4301&quot;&gt;!4301&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix import URL migration not rescuing with the correct Error. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4321&quot;&gt;!4321&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix health check access token changing due to old application settings being used. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4332&quot;&gt;!4332&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make authentication service for Container Registry to be compatible with Docker versions before 1.11. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4363&quot;&gt;!4363&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add Application Setting to configure Container Registry token expire delay (default 5 min). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4364&quot;&gt;!4364&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Pass the &quot;Remember me&quot; value to the 2FA token form. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4369&quot;&gt;!4369&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix incorrect links on pipeline page when merge request created from fork.  (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4376&quot;&gt;!4376&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use downcased path to container repository as this is expected path by Docker. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4420&quot;&gt;!4420&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix wiki project clone address error (chujinjin). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4429&quot;&gt;!4429&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix serious performance bug with rendering Markdown with InlineDiffFilter.  (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4392&quot;&gt;!4392&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix missing number on generated ordered list element. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4437&quot;&gt;!4437&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent disclosure of notes on confidential issues in search results.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version includes one new migration, but should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;for-elasticsearch-users&quot;&gt;For elasticsearch users&lt;&#x2F;h4&gt;
&lt;p&gt;If you use Elasticsearch please run following command after upgrade:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# Omnibus installations
sudo gitlab-rake gitlab:elastic:reindex_model MODEL=Note

# Installations from source
bundle exec rake gitlab:elastic:reindex_model MODEL=Note RAILS_ENV=production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.8.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/25/gitlab-8-dot-8-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/25/gitlab-8-dot-8-dot-2-released/</id>
<published>2016-05-25T00:00:00+00:00</published>
<updated>2016-05-25T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.8.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; [Elastic] Search through the filenames. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;409&quot;&gt;!409&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix repository mirror updates for new imports stuck in &quot;started&quot; state. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;416&quot;&gt;!416&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Added remove due date button. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4209&quot;&gt;!4209&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 when accessing application settings due to nil disabled OAuth sign-in sources. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4242&quot;&gt;!4242&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 in CI charts by gracefully handling commits with no durations. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4245&quot;&gt;!4245&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix table UI on CI builds page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4249&quot;&gt;!4249&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix backups if Docker Registry is disabled. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4263&quot;&gt;!4263&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue with &quot;Merge Immediately&quot; button color. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4211&quot;&gt;!4211&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue with Enter key selecting wrong option in dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4210&quot;&gt;!4210&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; When creating a .gitignore file a dropdown with templates will be provided. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4075&quot;&gt;!4075&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix concurrent request when updating build log in browser. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4183&quot;&gt;!4183&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.8.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/23/gitlab-8-dot-8-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/23/gitlab-8-dot-8-dot-1-released/</id>
<published>2016-05-23T00:00:00+00:00</published>
<updated>2016-05-23T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.8.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow anonymous user to access pipelines (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4233&quot;&gt;!4233&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix MySQL compatibility in zero downtime migration helpers (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4239&quot;&gt;!4239&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.8 released with Pipelines and .gitignore templates</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/22/gitlab-8-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/22/gitlab-8-8-released/</id>
<published>2016-05-22T00:00:00+00:00</published>
<updated>2016-05-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Fresh off our third GitLab Summit, this time in Austin, Texas, we are releasing
our 54th consecutive release on the 22nd of the month. Sunday or not, we are not
slowing our release schedule and are excited to show you what we&#x27;re launching
today.
GitLab 8.8 is ready to go with GitLab CI improvements, performance enhancements,
convenient templates, and more!&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
Matt Oakes for contributing the support for suppressing text file diffs on the
default branch with &lt;code&gt;.gitattributes&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Matt!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;pipelines&quot;&gt;Pipelines&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab has powerful continuous integration built-in.
No need to switch to another application, no need to juggle permissions and access, just use GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Before, you could already define complex pipelines. With GitLab 8.8, GitLab CI
will visualize these pipelines, so you can &lt;em&gt;see&lt;&#x2F;em&gt; how things are going.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_8&#x2F;pipelines.png&quot; alt=&quot;GitLab CI Pipelines in GitLab 8.8&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In the new pipeline view, you see all related builds for a single commit
and the net result of each stage of your pipeline. This allows you to quickly
see what failed and fix it.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_8&#x2F;single_pipeline.png&quot; alt=&quot;A single Pipeline in GitLab 8.8&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;By default, GitLab will set up the build, test, and deploy stages (as before),
but you&#x27;re free to &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;#stages&quot;&gt;define any other stage&lt;&#x2F;a&gt; in your
&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;yaml&#x2F;&quot;&gt;Read how to define your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;quick_start&#x2F;&quot;&gt;Unfamiliar with GitLab CI? Start here!&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;gitlab-container-registry&quot;&gt;GitLab Container Registry&lt;&#x2F;h2&gt;

&lt;p&gt;In this release, we are supercharging GitLab CI. First with Pipelines and now with GitLab Container Registry.
GitLab Container Registry is a secure and private registry for Docker images. It isn&#x27;t just a
standalone registry; it&#x27;s completely integrated with GitLab. In fact, our container registry is
actually the first Docker registry that is fully-integrated with git repository
management and comes out of the box with GitLab 8.8. So if you&#x27;ve upgraded, you already have it!
Our integrated Container Registry requires no additional installation. It allows for easy
upload and download of images from GitLab CI. And it&#x27;s free. We were so excited about this feature
that we wrote a whole blog post about it. &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;05&#x2F;23&#x2F;gitlab-container-registry&#x2F;&quot;&gt;Read the full post&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitignore-templates&quot;&gt;.gitignore templates&lt;&#x2F;h2&gt;

&lt;p&gt;You should version everything. Well, &lt;em&gt;almost&lt;&#x2F;em&gt; everything.
Occasionally you have to use some private information,
secrets or just junk in the directories that are being watched by Git.
For those situations, you can add the files and directories that
you want to ignore to your &lt;code&gt;.gitignore&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.8, creating a &lt;code&gt;.gitignore&lt;&#x2F;code&gt; file is much simpler.
When creating the file in the web interface, GitLab will now automatically
show you a dropdown where you can choose from many different templates
to use for your &lt;code&gt;.gitignore&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;p&gt;You can still edit it to your liking of course.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-importer-improvements&quot;&gt;GitHub Importer Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;We further improved our GitHub importer in GitLab 8.8.
The existing GitHub importer could already import things like repository
data, issues, wiki pages, milestones, and labels. With GitLab 8.8
the importer is more robust now and will also import pull requests with
a missing source or target branch.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;import&#x2F;github.html&quot;&gt;Want to import from GitHub? Read how, here.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;new-shortcuts&quot;&gt;New shortcuts&lt;&#x2F;h2&gt;

&lt;p&gt;Shortcuts are a great way to get things done, quickly.
With 8.8 we&#x27;ve added two shortcuts and improved the shortcut help:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;On a project: &lt;code&gt;i&lt;&#x2F;code&gt; To navigate to New Issue page.&lt;&#x2F;li&gt;
  &lt;li&gt;On a issuable: &lt;code&gt;l&lt;&#x2F;code&gt; To open Label dropdown on a issuable.&lt;&#x2F;li&gt;
  &lt;li&gt;Global: Typing &lt;code&gt;?&lt;&#x2F;code&gt; multiple times now toggles the modal.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;toggle-whitespace-changes&quot;&gt;Toggle whitespace changes&lt;&#x2F;h2&gt;

&lt;p&gt;Sometimes when people push their commits there are a number of insignificant
whitespace changes along with their important changes. We&#x27;ve added a button in our
UI that allows you to hide these insignificant changes in the commit&#x27;s diff.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_8&#x2F;whitespace.png&quot; alt=&quot;Hide whitespace changes in GitLab 8.8&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;health-check&quot;&gt;Health Check&lt;&#x2F;h2&gt;

&lt;p&gt;Software can be a lot easier than people. To see whether
GitLab is healthy, no doctor required. Just point your monitoring
to &lt;code&gt;&#x2F;health_check&lt;&#x2F;code&gt; and look for status &lt;code&gt;200&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This endpoint can be provided to uptime monitoring services like Pingdom,
Nagios, and NewRelic.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Read more in the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;monitoring&#x2F;health_check.html&quot;&gt;health check documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;ui-improvements&quot;&gt;UI Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve improved many things big and small again this release.&lt;&#x2F;p&gt;

&lt;p&gt;Most notably, you will find that the group page and the profile
page are using a new navigation paradigm. The left sidebar will stay
static, where the top bar will provide you with navigation a level deeper.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_8&#x2F;group_page.png&quot; alt=&quot;Group Page UI improvements&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We believe this change will make getting around in GitLab easier.
We&#x27;re trying it first in these places and love to hear what you think!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;suppress-text-file-diffs-through-gitattributes&quot;&gt;Suppress Text File diffs through .gitattributes&lt;&#x2F;h3&gt;

&lt;p&gt;When you mark a file as non-diffable in your &lt;code&gt;.gitattributes&lt;&#x2F;code&gt; file,
GitLab will now respect that and not show the diff.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Matt Oakes for contributing this!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;milestone-references-in-markdown&quot;&gt;Milestone references in Markdown&lt;&#x2F;h3&gt;

&lt;p&gt;You can now reference milestones in Markdown!&lt;&#x2F;p&gt;

&lt;p&gt;To reference a milestone that&#x27;s a single word, use &lt;code&gt;%&lt;&#x2F;code&gt; with the name. For instance: &lt;code&gt;%8.8&lt;&#x2F;code&gt;. More words? Wrap it in &lt;code&gt;&quot;&lt;&#x2F;code&gt;: &lt;code&gt;%&quot;Cool milestone&quot;&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Of course, this also works cross-projects and in links:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;gitlab-org&#x2F;gitlab-ce%8.8
[milestone 8.8](%8.8)
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Do you have any more ideas for extensions of our Markdown? Let us know!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;performance-changes&quot;&gt;Performance Changes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3983&quot;&gt;Use tag_exists? in GitAccess#protected_tag?&lt;&#x2F;a&gt;: improves SSH&#x2F;HTTPS pushing performance by only checking a single Git tag upon push instead of all existing Git tags (mostly noticeable on projects with lots of tags)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3985&quot;&gt;Cleaned up&#x2F;tweaked Project#open_branches&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4091&quot;&gt;Improve multiple branch push performance by memoizing permission checking&lt;&#x2F;a&gt;: improves SSH&#x2F;HTTPS pushing performance by cutting down the time spent in checking if branches are protected or not&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4124&quot;&gt;Removed tracking of total method execution times&lt;&#x2F;a&gt;: total method execution timings are no longer tracked by GitLab Performance Monitoring&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4169&quot;&gt;Instrument all Grape API helpers&lt;&#x2F;a&gt;: GitLab Performance Monitoring now instruments all Grape API helpers&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Uptime changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3860&quot;&gt;Added helper methods for database migrations&lt;&#x2F;a&gt;
and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4217&quot;&gt;Move generator templates to generator_templates&#x2F;&lt;&#x2F;a&gt;:
upgrading from GitLab 8.7.x to GitLab 8.8.0 does not require any downtime as
all migrations can now be performed without stopping your GitLab instance. The
goal for future releases is to also allow online upgrades unless downtime is an
absolute requirement.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;other-changes-1&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading from 8.7.x to 8.8.0 requires &lt;strong&gt;no downtime&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;deprecation-of-fog-gem&quot;&gt;Deprecation of Fog gem&lt;&#x2F;h3&gt;

&lt;p&gt;The Fog gem will be removed in 8.9 (next month). It&#x27;s
currently used to connect GitLab&#x27;s Backup service to various storage providers,
but only a few of fogs &quot;micro-gems&quot; are actually used. We intend to only
include fog-core and support for uploading backups to AWS, Google Compute and
Microsoft Azure in 8.9. If you backup GitLab with a service other
than those, please open an issue so we can consider including your specific
use-case. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15352&quot;&gt;this issue&lt;&#x2F;a&gt;
for more information.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changes-in-binweb-and-binbackground_jobs&quot;&gt;Changes in bin&#x2F;web and bin&#x2F;background_jobs&lt;&#x2F;h3&gt;

&lt;p&gt;If you installed GitLab from source using a custom SystemD &#x2F; Upstart service definition, or if you are a package maintainer for GitLab then you should know that bin&#x2F;web and bin&#x2F;background_jobs both perform one fewer fork(2) call now when starting Unicorn and Sidekiq respectively. This only matters if you configured your service supervision system to count the number of forks during startup. The official GitLab init script and our Omnibus packages are not affected by this change.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost-30-not-included-in-the-88-release&quot;&gt;GitLab Mattermost 3.0 not included in the 8.8 release&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-3-0-multi-team-accounts-mobile-desktop-upgrades-japanese-integrations-for-outlook-ruby-rust&#x2F;&quot;&gt;Mattermost 3.0&lt;&#x2F;a&gt; is a major release requiring &lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;upgrade-to-3.0&#x2F;&quot;&gt;manual upgrade steps&lt;&#x2F;a&gt; and therefore not included in 8.8 omnibus-gitlab package.
Existing GitLab Mattermost users will have to wait until GitLab 8.9 where upgrade to Mattermost 3.1 should be automated.
If you&#x27;re interested in reading more about how this decision was made, check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1286&quot;&gt;the issue on GitLab.com&lt;&#x2F;a&gt;.
Also the upgrade design for the next release will be discussed in the same issue so please share your feedback there.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_8&#x2F;team.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.7.6 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/20/gitlab-8-dot-7-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/20/gitlab-8-dot-7-dot-6-released/</id>
<published>2016-05-20T00:00:00+00:00</published>
<updated>2016-05-20T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.7.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Bump GitLab Pages to 0.2.4 to fix Content-Type for predefined 404
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;394&quot;&gt;!394&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix links on wiki pages for relative url setups (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4131&quot;&gt;!4131&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix import from GitLab.com to a private instance failure (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4181&quot;&gt;!4181&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix external imports not finding the import data (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4106&quot;&gt;!4106&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.7.5 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/12/gitlab-8-dot-7-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/12/gitlab-8-dot-7-dot-5-released/</id>
<published>2016-05-12T00:00:00+00:00</published>
<updated>2016-05-12T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.7.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix relative links in wiki pages. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4050&quot;&gt;!4050&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix always showing build notification message when switching
between merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4086&quot;&gt;!4086&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue when filtering merge requests with more than one
label. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3886&quot;&gt;!3886&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;This release does not include any EE-specific changes.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.7.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/11/gitlab-8-dot-7-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/11/gitlab-8-dot-7-dot-4-released/</id>
<published>2016-05-11T12:00:00+00:00</published>
<updated>2016-05-11T12:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.7.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE). This release includes two security fixes and as such we
&lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all affected users upgrade their GitLab
installations as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Delete &lt;code&gt;ProjectImportData&lt;&#x2F;code&gt; record only if Project is not a mirror
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;370&quot;&gt;!370&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fixed typo in GitLab Geo license check alert (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;379&quot;&gt;!379&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Links for Redmine issue references are generated correctly again
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4048&quot;&gt;!4048&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix setting trusted proxies (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3970&quot;&gt;!3970&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Bitbucket importer bug when throwing exceptions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3941&quot;&gt;!3941&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use sign out path only if not empty (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3989&quot;&gt;!3989&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Running &lt;code&gt;rake gitlab:db:drop_tables&lt;&#x2F;code&gt; now drops tables with cascade
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4020&quot;&gt;!4020&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Running &lt;code&gt;rake gitlab:db:drop_tables&lt;&#x2F;code&gt; uses &lt;code&gt;IF EXISTS&lt;&#x2F;code&gt; as a
precaution (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4100&quot;&gt;!4100&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;It also includes the following security fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use a case-insensitive comparison in sanitizing URI schemes
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;17299&quot;&gt;#17299&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix LDAP access level spillover bug (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;552&quot;&gt;#552&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;xss-vulnerability-via-faulty-uri-scheme-sanitization&quot;&gt;XSS vulnerability via faulty URI scheme sanitization&lt;&#x2F;h2&gt;

&lt;p&gt;The URI scheme of user-supplied links was not being properly sanitized. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;17299&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a0xnirudh&quot;&gt;Anirudh Anand&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;0daylabs.com&quot;&gt;0daylabs&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-enterprise-ldap-group-sync&quot;&gt;GitLab Enterprise LDAP Group Sync&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Enterprise Edition versions 8.7.0 through 8.7.3 contain an LDAP
group sync bug that can lead to GitLab users being added to GitLab groups they
do not belong to. We do not know if it is possible for a malicious GitLab user
to reliably exploit this bug. Regardless of exploitability, when this bug
strikes it makes unwanted changes to your project access controls.&lt;&#x2F;p&gt;

&lt;p&gt;Versions of GitLab EE prior to 8.7.0 are not affected by this bug. All versions
of GitLab CE are not affected by this bug. If you are not using LDAP group
synchronization in GitLab EE, you are not affected by this bug.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend all users of GitLab EE 8.7.0 through 8.7.3 upgrade to 8.7.4 as soon
as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.7.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/06/gitlab-8-dot-7-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/06/gitlab-8-dot-7-dot-3-released/</id>
<published>2016-05-06T17:00:00+00:00</published>
<updated>2016-05-06T17:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.7.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; OpenSSL upgraded to 1.0.2h to fix &lt;a href=&quot;https:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-2107&quot;&gt;CVE-2016-2107&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Emails, Gitlab::Email::Message, Gitlab::Diff, and
Premailer::Adapter::Nokogiri are now instrumented (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4038&quot;&gt;!4038&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Merge request widget displays TeamCity build state and code
coverage correctly again (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3998&quot;&gt;!3998&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the line code when importing PR review comments from GitHub.
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;4010&quot;&gt;!4010&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Wikis are now initialized on legacy projects when checking
repositories (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3931&quot;&gt;!3931&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.7.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/03/gitlab-8-dot-7-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/03/gitlab-8-dot-7-dot-2-released/</id>
<published>2016-05-03T00:00:00+00:00</published>
<updated>2016-05-03T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.7.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix MR notifications for Slack and Hipchat when approvals are fulfilled
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;325&quot;&gt;!325&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Merge requests on a secondary node no longer check if a merge request
can be merged (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;366&quot;&gt;!366&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; The &quot;New Branch&quot; button displayed on issue pages is now loaded
asynchronously (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3855&quot;&gt;!3855&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Creating wiki pages no longer results in an HTTP 500 error
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3924&quot;&gt;!3924&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; The spacing between notification labels and buttons has been
updated (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3965&quot;&gt;!3965&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Critical Security Release for GitLab 8.2 through 8.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/05/02/cve-2016-4340-patches/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/05/02/cve-2016-4340-patches/</id>
<published>2016-05-02T23:50:00+00:00</published>
<updated>2016-05-02T23:50:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.7.1, 8.6.8, 8.5.12, 8.4.10, 8.3.9, and 8.2.5
for GitLab Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions contain a number of important security fixes, including one for a
critical privilege escalation, and we &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all GitLab
installations be upgraded to one of these versions &lt;strong&gt;immediately&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;privilege-escalation-via-impersonate-feature&quot;&gt;Privilege escalation via &quot;impersonate&quot; feature&lt;&#x2F;h2&gt;

&lt;p&gt;During an internal code review, we discovered a critical security flaw in the
&quot;impersonate&quot; feature of GitLab. Added in GitLab 8.2, this feature was intended
to allow an administrator to simulate being logged in as any other user.&lt;&#x2F;p&gt;

&lt;p&gt;A part of this feature was not properly secured and it was possible for &lt;em&gt;any&lt;&#x2F;em&gt;
authenticated user, administrator or not, to &quot;log in&quot; as any other user,
including administrators. Please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15548&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;This issue has been assigned &lt;a href=&quot;http:&#x2F;&#x2F;cve.mitre.org&#x2F;cgi-bin&#x2F;cvename.cgi?name=CVE-2016-4340&quot;&gt;CVE-2016-4340&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;8.7.0&lt;&#x2F;li&gt;
  &lt;li&gt;8.6.0 through 8.6.7&lt;&#x2F;li&gt;
  &lt;li&gt;8.5.0 through 8.5.11&lt;&#x2F;li&gt;
  &lt;li&gt;8.4.0 through 8.4.9&lt;&#x2F;li&gt;
  &lt;li&gt;8.3.0 through 8.3.8&lt;&#x2F;li&gt;
  &lt;li&gt;8.2.0 through 8.2.4&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We &lt;strong&gt;strongly recommend&lt;&#x2F;strong&gt; that all installations running a version mentioned
above be upgraded as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;If you&#x27;re unable to upgrade right away, you can secure your GitLab installation
against this vulnerability using one of the workarounds outlined below until you
have time to upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;You only need to apply &lt;em&gt;one&lt;&#x2F;em&gt; of these workarounds. Each assumes you aren&#x27;t using
relative URLs; if you are, adjust the path accordingly.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;securing-via-omnibus-configuration&quot;&gt;Securing via Omnibus configuration&lt;&#x2F;h4&gt;

&lt;p&gt;For Omnibus installations using the bundled Nginx web server, edit
&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; and add the following line:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;nginx&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;custom_gitlab_server_config&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;location ^~ &#x2F;admin&#x2F;users&#x2F;stop_impersonation { deny all; }&lt;&#x2F;span&gt;&lt;span class=&quot;se&quot;&gt;\n&lt;&#x2F;span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Then run &lt;code&gt;sudo gitlab-ctl reconfigure&lt;&#x2F;code&gt; for the changes to take effect.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;securing-via-web-server-configuration&quot;&gt;Securing via web server configuration&lt;&#x2F;h4&gt;

&lt;p&gt;If you are using an external web server with Omnibus or have installed GitLab
from source, add the following lines to your web server&#x27;s configuration file.&lt;&#x2F;p&gt;

&lt;p&gt;For Nginx:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight nginx&quot;&gt;&lt;code&gt;&lt;span class=&quot;k&quot;&gt;location&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;^~&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;&#x2F;admin&#x2F;users&#x2F;stop_impersonation&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;{&lt;&#x2F;span&gt; &lt;span class=&quot;kn&quot;&gt;deny&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;all&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;;&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;}&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;For Apache:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight apache&quot;&gt;&lt;code&gt;&lt;span class=&quot;p&quot;&gt;&amp;lt;&lt;&#x2F;span&gt;&lt;span class=&quot;nl&quot;&gt;LocationMatch&lt;&#x2F;span&gt;&lt;span class=&quot;sr&quot;&gt; &quot;^&#x2F;admin&#x2F;users&#x2F;stop_impersonation&quot;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;&amp;gt;
&lt;&#x2F;span&gt;  &lt;span class=&quot;nc&quot;&gt;Order&lt;&#x2F;span&gt; Deny,Allow
  &lt;span class=&quot;nc&quot;&gt;Deny&lt;&#x2F;span&gt; &lt;span class=&quot;ss&quot;&gt;from&lt;&#x2F;span&gt; all
&lt;span class=&quot;p&quot;&gt;&amp;lt;&#x2F;&lt;&#x2F;span&gt;&lt;span class=&quot;nl&quot;&gt;LocationMatch&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;&amp;gt;
&lt;&#x2F;span&gt;&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Then reload the server for changes to take effect.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;securing-via-haproxy-configuration&quot;&gt;Securing via HAProxy configuration&lt;&#x2F;h4&gt;

&lt;p&gt;Add the following lines to your configuration and restart the service:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;acl is_stop_impersonation  path_beg         &#x2F;admin&#x2F;users&#x2F;stop_impersonation
acl is_delete method DELETE
http-request deny if is_delete is_stop_impersonation
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h4 id=&quot;securing-via-patch&quot;&gt;Securing via patch&lt;&#x2F;h4&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight diff&quot;&gt;&lt;code&gt;&lt;span class=&quot;gh&quot;&gt;diff --git a&#x2F;app&#x2F;controllers&#x2F;admin&#x2F;impersonation_controller.rb b&#x2F;app&#x2F;controllers&#x2F;admin&#x2F;impersonation_controller.rb
index bf98af7..8790018 100644
&lt;&#x2F;span&gt;&lt;span class=&quot;gd&quot;&gt;--- a&#x2F;app&#x2F;controllers&#x2F;admin&#x2F;impersonation_controller.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gi&quot;&gt;+++ b&#x2F;app&#x2F;controllers&#x2F;admin&#x2F;impersonation_controller.rb
&lt;&#x2F;span&gt;&lt;span class=&quot;gu&quot;&gt;@@ -1,4 +1,5 @@
&lt;&#x2F;span&gt; class Admin::ImpersonationController &amp;lt; Admin::ApplicationController
&lt;span class=&quot;gi&quot;&gt;+  before_action :render_403, only: :destroy
&lt;&#x2F;span&gt;   skip_before_action :authenticate_admin!, only: :destroy

   before_action :user
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h3 id=&quot;verifying-the-workaround&quot;&gt;Verifying the workaround&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;In an Incognito Window, login as an administrator&lt;&#x2F;li&gt;
  &lt;li&gt;Go to the Admin section&lt;&#x2F;li&gt;
  &lt;li&gt;Click on &quot;Users&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;Select any user&lt;&#x2F;li&gt;
  &lt;li&gt;Click &quot;Impersonate&quot;&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Click on the &quot;Stop Impersonation&quot; icon in the upper right:&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;blogimages&#x2F;stop-impersonation.png&quot; alt=&quot;Stop impersonation&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;Verify you receive a &lt;code&gt;403 Forbidden&lt;&#x2F;code&gt; error&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;privilege-escalation-via-notes-api&quot;&gt;Privilege escalation via notes API&lt;&#x2F;h2&gt;

&lt;p&gt;By sending a specially-crafted request to the GitLab API, it was possible to
post notes on merge requests, snippets, and issues that the user did not have
access to. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15577&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;privilege-escalation-via-project-webhook-api&quot;&gt;Privilege escalation via project webhook API&lt;&#x2F;h2&gt;

&lt;p&gt;The project webhook API was not sufficiently secured, and made it possible for
an authenticated user to read and delete webhooks from a private project. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15576&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-vulnerability-via-branch-and-tag-names&quot;&gt;XSS vulnerability via branch and tag names&lt;&#x2F;h2&gt;

&lt;p&gt;Git branch and tag names were not being properly escaped before being displayed
on certain pages. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15434&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Teun Beijers for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-vulnerability-via-custom-issue-tracker-url&quot;&gt;XSS vulnerability via custom issue tracker URL&lt;&#x2F;h2&gt;

&lt;p&gt;Custom issue tracker service URLs were not being properly validated, making it
possible to craft a specific URL that could be used in an XSS attack. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15437&quot;&gt;the
issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-vulnerability-via-windowopener&quot;&gt;XSS vulnerability via &lt;code&gt;window.opener&lt;&#x2F;code&gt;&lt;&#x2F;h2&gt;

&lt;p&gt;External links were not properly voiding the &lt;code&gt;window.opener&lt;&#x2F;code&gt; attribute, which
could allow the external page to control the window object that opened it. See
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15331&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;a0xnirudh&quot;&gt;Anirudh Anand&lt;&#x2F;a&gt; of
&lt;a href=&quot;https:&#x2F;&#x2F;www.0daylabs.com&quot;&gt;0daylabs&lt;&#x2F;a&gt; for responsibly disclosing this issue to
us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;xss-vulnerability-via-label-drop-down&quot;&gt;XSS vulnerability via label drop-down&lt;&#x2F;h2&gt;

&lt;p&gt;Label names were not being properly escaped before being displayed in certain
drop-downs. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15522&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Only the following versions are affected: 8.6.0 through 8.6.7, and 8.7.0.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Gearlles Ferreira for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-milestone-api&quot;&gt;Information disclosure via milestone API&lt;&#x2F;h2&gt;

&lt;p&gt;Confidential issues attached to a milestone were being leaked via the milestone
API. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15579&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Only the following versions are affected: 8.6.0 through 8.6.7, and 8.7.0.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-snippet-api&quot;&gt;Information disclosure via snippet API&lt;&#x2F;h2&gt;

&lt;p&gt;Private snippets were being exposed via the GitLab API. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15580&quot;&gt;the issue&lt;&#x2F;a&gt;
for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-project-labels&quot;&gt;Information disclosure via project labels&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for an attacker to add labels from a private project to their
own, possibly exposing sensitive information contained in a label&#x27;s name or
description. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15439&quot;&gt;the issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;information-disclosure-via-new-merge-request-page&quot;&gt;Information disclosure via new merge request page&lt;&#x2F;h2&gt;

&lt;p&gt;It was possible for an attacker to discover the namespace and name of a private
project via the &quot;new merge request&quot; page. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15591&quot;&gt;the issue&lt;&#x2F;a&gt; for more
details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt; for
responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade GitLab
yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Major Security Update for CVE-2016-4340</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/28/gitlab-major-security-update-for-cve-2016-4340/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/28/gitlab-major-security-update-for-cve-2016-4340/</id>
<published>2016-04-28T00:00:00+00:00</published>
<updated>2016-04-28T00:00:00+00:00</updated>
<author>
<name>Stan Hu</name>
</author>
<content type='html'>&lt;p&gt;On Monday May 2, 2016 at 4:59pm PDT (23:59 GMT), we will publish a major
GitLab security update to address CVE-2016-4340. More details will be
forthcoming on &lt;a href=&quot;&#x2F;blog&#x2F;&quot;&gt;our blog&lt;&#x2F;a&gt;, including which versions of GitLab are affected.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend installations running affected versions to upgrade
immediately. Please forward this alert to the appropriate people at your
organization and have them subscribe to &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;Security Notices&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;


&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.7 released with Due Date for Issues and Remote Mirrors</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/22/gitlab-8-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/22/gitlab-8-7-released/</id>
<published>2016-04-22T00:00:00+00:00</published>
<updated>2016-04-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We want GitLab to be the place where your projects go from idea all the way to
production. You shouldn&#x27;t have to rely on other tools to build something
great together.
We believe GitLab is able to power any step in this process and with
GitLab 8.7, we&#x27;ve made every step better.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 8.7 improves Issues, makes diffs better to work with, brings better
commenting, has 100% more cherries and can now even push to remote repositories
by its own volition&lt;sup id=&quot;fnref:1&quot; role=&quot;doc-noteref&quot;&gt;&lt;a href=&quot;#fn:1&quot; class=&quot;footnote&quot; rel=&quot;footnote&quot;&gt;1&lt;&#x2F;a&gt;&lt;&#x2F;sup&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s &lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot; title=&quot;GitLab Hall of Fame&quot;&gt;MVP&lt;&#x2F;a&gt; is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;connorshea&quot;&gt;Connor Shea&lt;&#x2F;a&gt;. Connor has been an incredibly
responsive and productive member of the community, working on anything from new
features to performance issues up to this very release post.&lt;&#x2F;p&gt;

&lt;p&gt;We also want to thank &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;ershad&quot;&gt;Ershad Ahmad&lt;&#x2F;a&gt; for his enthusiastic support in the
community, both in the forums and on Twitter. Thanks Ershad and Connor!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;remote-mirrors-ee-only&quot;&gt;Remote Mirrors (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;You could already automatically mirror an external repository to your GitLab
instance. With GitLab 8.7 you can now do the inverse and have GitLab push
updates to a remote repository: a mirror on a remote repository (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;249&quot;&gt;!249&lt;&#x2F;a&gt;). It&#x27;s
like you can have your cake and eat it too.&lt;&#x2F;p&gt;

&lt;p&gt;This means you can use GitLab to build your projects, while still maintaining
an active mirror in another place. You could even run a GitLab instance locally
and mirror it to GitLab.com or any other git hosting service.&lt;&#x2F;p&gt;

&lt;p&gt;To start mirroring to a remote repository, find the Mirror Repository settings
in your project and fill out the required URL and GitLab with automatically sync
the remote every hour.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;remote_mirror.png&quot; alt=&quot;Remote Mirror in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;multiple-label-filter&quot;&gt;Multiple Label Filter&lt;&#x2F;h2&gt;

&lt;p&gt;You might already be labelling your issues and merge requests. You might even
&lt;a href=&quot;&#x2F;2016&#x2F;04&#x2F;13&#x2F;feature-highlight-subscribe-to-label&quot;&gt;be subscribed&lt;&#x2F;a&gt; to a label. If that&#x27;s the case, you were probably sad to
discover GitLab couldn&#x27;t filter by multiple labels at once. Well, now you can!&lt;&#x2F;p&gt;

&lt;p&gt;Select any number of labels to filter only for issues or merge requests that
contain all selected labels. Meaning, if I search for &lt;code&gt;feature proposal&lt;&#x2F;code&gt; and
&lt;code&gt;customer&lt;&#x2F;code&gt;, I&#x27;m now able to find only feature proposals by customers (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3438&quot;&gt;!3438&lt;&#x2F;a&gt;).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;label.png&quot; alt=&quot;Multiple label filter in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;license-templates&quot;&gt;LICENSE templates&lt;&#x2F;h2&gt;

&lt;p&gt;If you have an open source project, you should have a license in place for it.
Typically, projects include a text file named &lt;code&gt;LICENSE&lt;&#x2F;code&gt; in the root of their
repository. GitLab now provides license templates, so you can quickly move on
with building the rest of the project (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3660&quot;&gt;!3660&lt;&#x2F;a&gt;).&lt;&#x2F;p&gt;

&lt;p&gt;To add a license, add a new file named &lt;code&gt;LICENSE&lt;&#x2F;code&gt; to an existing project. GitLab
will show a dropdown with licenses to choose from. With certain licenses, your
name will even be pre-filled.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;license.png&quot; alt=&quot;LICENSE templates&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Open source licenses benefit everyone. For authors, they specify any conditions
of reuse or modification of their code. For people who use the code, they
clarify what people can and cannot do with it. It may sound restrictive but
there are several variations of licenses, so it really depends on the author&#x27;s
preference. That&#x27;s why we provide several of the most popular licenses. We
welcome merge requests for additional templates. These licenses allow the open
source community to carry on with the free use and sharing of software.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;due-date-for-issues&quot;&gt;Due Date for Issues&lt;&#x2F;h2&gt;

&lt;p&gt;It&#x27;s easy for things to get lost in the shuffle of multiple priorities and
several stakeholders. This challenge compounds in collaborative projects since
people often depend on each other.  To help keep things on track, we&#x27;ve added
the ability to set a due date for individual issues (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3614&quot;&gt;!3614&lt;&#x2F;a&gt;).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;due_date.png&quot; alt=&quot;Due date for issues in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With the addition of due dates for issues, there are now two ways to keep your
projects on track. However, due dates and milestones have a couple important
distinctions. Due dates are only for individual issues. They are most useful
when you want to drive your team to a target completion date.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;due_date2.png&quot; alt=&quot;Due date for issues in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Milestones, on the other hand, apply to your entire project. Milestones are
great for organizing issues and merge requests into a cohesive group and to
track progress on a collection of issues, using the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;milestones&#x2F;23&quot;&gt;milestone view&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cherry-pick&quot;&gt;Cherry Pick&lt;&#x2F;h2&gt;

&lt;p&gt;You can now cherry-pick any commit into any branch, right within GitLab.
Cherry picking allows you to take a single commit and bring it to any other
branch. It&#x27;s especially useful if you work with multiple, concurrent branches,
like the release branches of GitLab (&lt;code&gt;8-6-stable&lt;&#x2F;code&gt;, &lt;code&gt;8-7-stable&lt;&#x2F;code&gt;) and you want
to bring a certain change set over from one to the other.&lt;&#x2F;p&gt;

&lt;p&gt;To cherry pick a commit, simply click on the &lt;code&gt;Cherry Pick&lt;&#x2F;code&gt; button, whenever
it presents itself. You can find it in Merge Requests and Commits:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;cherry_pick_button.png&quot; alt=&quot;Cherry-pick any commit into any branch in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Choose a branch to pick the commit into and optionally create a merge request
for it.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;cherry_pick_modal.png&quot; alt=&quot;Cherry-pick any commit into any branch in GitLab 8.7 and create a merge request straight away&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Cherry Pick was contributed by &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;pmq20&quot;&gt;P.S.V.R&lt;&#x2F;a&gt;. Thanks!&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;workflow&#x2F;cherry_pick_changes.html&quot;&gt;Documentation link&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;better-diffs&quot;&gt;Better Diffs&lt;&#x2F;h2&gt;

&lt;p&gt;Diffs never looked better than in GitLab 8.7 and now are much more
copy friendly, no longer copying line numbers or the &lt;code&gt;+&lt;&#x2F;code&gt; and &lt;code&gt;-&lt;&#x2F;code&gt; symbols!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;diffs.png&quot; alt=&quot;Better diffs in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;tooltip-in-your-timezone&quot;&gt;Tooltip in your timezone&lt;&#x2F;h2&gt;

&lt;p&gt;Although some of you may correctly be using the one true timezone (UTC), it was
confusing to many others that times in GitLab were reported in a different
timezone than their own.&lt;&#x2F;p&gt;

&lt;p&gt;That&#x27;s a thing of the past! All times are now reported in your own timezone.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;timezone.png&quot; alt=&quot;GitLab 8.7 uses your local timezone&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-github-importer&quot;&gt;Improved GitHub Importer&lt;&#x2F;h2&gt;

&lt;p&gt;The GitHub importer now also imports milestones and labels, and preserves
references to pull requests and issues!&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;workflow&#x2F;importing&#x2F;import_projects_from_github.html&quot;&gt;Documentation link&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;location-aware-search&quot;&gt;Location-aware Search&lt;&#x2F;h3&gt;

&lt;p&gt;Search is getting better and better with GitLab. With GitLab 8.7 we&#x27;ve added
location-aware search. Meaning you can either search within the project:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;search1.png&quot; alt=&quot;Location Aware Search in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Or remove the scope of the project and quickly search through the server:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;search2.png&quot; alt=&quot;Location Aware Search in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In either case you always have the quick navigation options available when
searching:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_7&#x2F;search3.png&quot; alt=&quot;Location Aware Search in GitLab 8.7&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;smarter-better-commenting&quot;&gt;Smarter, Better Commenting&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve revised the input for comments! It doesn&#x27;t just look much better,
it&#x27;s also smarter. If you start to mention someone, autocomplete
will prioritize names based on the context of the issue, diff or merge request
(several other dropdown boxes have that same ability now).&lt;&#x2F;p&gt;

&lt;h3 id=&quot;shortcuts&quot;&gt;Shortcuts!&lt;&#x2F;h3&gt;

&lt;p&gt;Press &lt;code&gt;e&lt;&#x2F;code&gt; to edit the issue or merge request you&#x27;re viewing, and press the up
arrow key to quickly edit your last comment. In any case, make sure you&#x27;re not
focusing in the comments area when pressing those keys.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;more-default-dashboards&quot;&gt;More Default Dashboards&lt;&#x2F;h3&gt;

&lt;p&gt;Did you know you can change the page you see when you sign in to GitLab?
We&#x27;ve now made it possible to also make that page Groups or even Todos (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3379&quot;&gt;!3379&lt;&#x2F;a&gt;),
thanks to the contribution of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;eliasw&quot;&gt;Elias W.&lt;&#x2F;a&gt;! That means you can set the
Dashboard to be:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Projects (default)&lt;&#x2F;li&gt;
  &lt;li&gt;Starred Projects&lt;&#x2F;li&gt;
  &lt;li&gt;Activity of Projects&lt;&#x2F;li&gt;
  &lt;li&gt;Activity of Starred Projects&lt;&#x2F;li&gt;
  &lt;li&gt;Groups (new)&lt;&#x2F;li&gt;
  &lt;li&gt;Todos (new)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;build-status-notifications&quot;&gt;Build status notifications&lt;&#x2F;h3&gt;

&lt;p&gt;You&#x27;ll now get browser notifications from running builds in the current project.
No more staring at the builds view!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;raw-build-trace-output&quot;&gt;Raw build trace output&lt;&#x2F;h3&gt;

&lt;p&gt;You can now get the raw build trace of your builds.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ci-job-level-environment-variables&quot;&gt;CI: job-level environment variables&lt;&#x2F;h3&gt;

&lt;p&gt;You can now define environment variables on a job level in &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Job-level variables take precedence over global YAML variables, so it is now
possible to override global YAML variables in the definition of a CI job.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#job-variables&quot;&gt;Documentation link&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;improvements-to-logging-when-behind-a-reverse-proxy&quot;&gt;Improvements to logging when behind a reverse proxy&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;You can now add your proxy server to the list of trusted servers, so its IP is
not logged as the client IP. The default trusted servers were also updated so
that IPs on the private network are not trusted by default. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3524&quot;&gt;!3524&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;The NGINX included in the Omnibus package is now compiled with the &lt;code&gt;real_ip&lt;&#x2F;code&gt;
module, and can be configured to use a  list of  trusted proxies for
determining client IP in its logs. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;709&quot;&gt;!709&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;authentication-related-changes&quot;&gt;Authentication-related changes&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;SAML can identify external groups based on configuration and set members of
these groups as external users. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3530&quot;&gt;!3530&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Omniauth providers can be marked as external, allowing all users of these
providers, even existing ones, to be marked as external users.
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3657&quot;&gt;!3657&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;performance-related-changes&quot;&gt;Performance-related changes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Timestamps for metrics have been made more accurate to prevent InfluxDB from
overwriting points. Depending on the amount of traffic this may lead to
significantly more data being stored.&lt;&#x2F;li&gt;
  &lt;li&gt;Extra instrumentation was added for various bits of code.&lt;&#x2F;li&gt;
  &lt;li&gt;Rails cache timings are now tracked.&lt;&#x2F;li&gt;
  &lt;li&gt;Markdown rendering performance has been improved, leading to a 3x performance
boost in the most ideal cases, though this highly depends on the type of data
being rendered.&lt;&#x2F;li&gt;
  &lt;li&gt;Emoji autocomplete performance has been improved.&lt;&#x2F;li&gt;
  &lt;li&gt;The referenced merge requests and related branches of an issue are now loaded
asynchronously. This reduces the loading time of issue pages.&lt;&#x2F;li&gt;
  &lt;li&gt;Re-enable GZIP compression of assets in production.&lt;&#x2F;li&gt;
  &lt;li&gt;Load the emoji spritesheet only when necessary.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-mattermost-22&quot;&gt;GitLab Mattermost 2.2&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-2-2-threaded-messages-and-more&#x2F;&quot;&gt;Mattermost 2.2&lt;&#x2F;a&gt;
ships in GitLab 8.7 with threaded messages, French translation, new themes, new
Trello and IRC support, plus many more new benefits.&lt;&#x2F;p&gt;

&lt;p&gt;This version also includes a &lt;a href=&quot;http:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html#security-update&quot;&gt;security update&lt;&#x2F;a&gt; and &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;gitlab-mattermost&quot;&gt;upgrade from earlier versions&lt;&#x2F;a&gt; is recommended.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes-1&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;04&#x2F;20&#x2F;gitlab-8-6-7-released&#x2F;&quot;&gt;security fixes from previous
patches&lt;&#x2F;a&gt;. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the
changelog&lt;&#x2F;a&gt; to see
all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release requires up to 30 minutes downtime.&lt;&#x2F;p&gt;

&lt;p&gt;A migration affecting projects with import data requires downtime as it
manipulates and encrypts user data stored for projects that were previously
imported from other Git repositories. Unless you have a large number of
imported projects, this migration should last only a few seconds.&lt;&#x2F;p&gt;

&lt;p&gt;This release contains other migrations that might make the total upgrade time
longer. For GitLab.com (&amp;gt;800k projects) the complete upgrade was completed within
30 minutes.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; This assumes you are upgrading from the latest version. If not,
please also consult the upgrade barometers of any intermediate versions you are
skipping. If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have
CI enabled, you have to &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;upgrade to GitLab 8.0 first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt; file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;div class=&quot;footnotes&quot; role=&quot;doc-endnotes&quot;&gt;
  &lt;ol&gt;
    &lt;li id=&quot;fn:1&quot; role=&quot;doc-endnote&quot;&gt;
      &lt;p&gt;&lt;em&gt;GitLab 8.7 doesn&#x27;t actually have a mind of its own.&lt;&#x2F;em&gt; &lt;a href=&quot;#fnref:1&quot; class=&quot;reversefootnote&quot; role=&quot;doc-backlink&quot;&gt;&amp;#8617;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
    &lt;&#x2F;li&gt;
  &lt;&#x2F;ol&gt;
&lt;&#x2F;div&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_7&#x2F;ny.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.7, 8.5.11, 8.4.9, and 8.3.8 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/20/gitlab-8-6-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/20/gitlab-8-6-7-released/</id>
<published>2016-04-20T16:00:00+00:00</published>
<updated>2016-04-20T16:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.6.7, 8.5.11, 8.4.9, and 8.3.8 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Versions 8.3.8, 8.4.9, and 8.5.11 contain fixes for one persistent XSS
vulnerability and an information leak for private groups. Version 8.6.7 contains
both of those fixes as well as a fix for one additional persistent XSS
vulnerability that was only present in the 8.6 release.&lt;&#x2F;p&gt;

&lt;p&gt;Please read on for more details.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;persistent-xss-vulnerability-in-commit-author-emails&quot;&gt;Persistent XSS vulnerability in commit author emails&lt;&#x2F;h2&gt;

&lt;p&gt;The contents of a user-supplied Git commit author or committer email were being
inserted into the page without proper escaping. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15126&quot;&gt;See the
issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Teun Beijers for responsibly disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;persistent-xss-vulnerability-in-label-and-milestone-dropdowns&quot;&gt;Persistent XSS vulnerability in label and milestone dropdowns&lt;&#x2F;h2&gt;

&lt;p&gt;The contents of milestone and label titles were being inserted into the
Milestone and Label dropdowns without proper escaping. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15389&quot;&gt;See the
issue&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was only present in versions 8.6.0 through 8.6.6.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;ronmurz&quot;&gt;RonMurz&lt;&#x2F;a&gt; on HackerOne for responsibly
disclosing this issue to us.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enumeration-of-private-projects-belonging-to-a-group&quot;&gt;Enumeration of private projects belonging to a group&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt;
alerted us to a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;15330&quot;&gt;security vulnerability&lt;&#x2F;a&gt; related to the &quot;share project with
group&quot; feature.&lt;&#x2F;p&gt;

&lt;p&gt;An unprivileged user was able to share a project with a group he didn&#x27;t have
access to, and therefore gain partial access to that group, which opened
possibilities for further actions like listing private projects in that group.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.6 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/15/gitlab-8-dot-6-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/15/gitlab-8-dot-6-dot-6-released/</id>
<published>2016-04-15T17:00:00+00:00</published>
<updated>2016-04-15T17:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.6.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes a few bug fixes for both editions.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Concat AD group recursive member results with regular member results. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;333&quot;&gt;!333&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix LDAP group sync regression for groups with member value &lt;code&gt;uid=&amp;lt;username&amp;gt;&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;335&quot;&gt;!335&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Don&#x27;t attempt to include too large diffs in e-mail-on-push messages. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;338&quot;&gt;!338&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Expire the exists cache before deletion to ensure project dir actually exists. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3413&quot;&gt;!3413&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error on language detection when repository has no HEAD (e.g., master branch). (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3654&quot;&gt;!3654&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix revoking of authorized OAuth applications. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3690&quot;&gt;!3690&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.10, 8.4.8, and 8.3.7 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/11/gitlab-8-dot-5-dot-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/11/gitlab-8-dot-5-dot-10-released/</id>
<published>2016-04-11T17:05:00+00:00</published>
<updated>2016-04-11T17:05:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Earlier today we &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;04&#x2F;11&#x2F;gitlab-8-dot-6-dot-5-released&#x2F;&quot;&gt;released version 8.6.5&lt;&#x2F;a&gt; for GitLab Community Edition
(CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve backported the Two-factor Authentication security fix mentioned in that
release post to previous months&#x27; releases, and are releasing versions 8.5.10,
8.4.8, and 8.3.7.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent Two-factor Authentication spoofing&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;two-factor-authentication-spoofing&quot;&gt;Two-factor Authentication spoofing&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt;
alerted us to a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;14900&quot;&gt;security vulnerability&lt;&#x2F;a&gt; related to the two-factor authentication
(2FA) method used in GitLab CE and EE.&lt;&#x2F;p&gt;

&lt;p&gt;It was possible for an attacker to bypass password authentication of users that
have 2FA enabled, and consequently sign in as a different user without knowing
their password, if he could guess the user&#x27;s current six-digit 2FA validation
code.&lt;&#x2F;p&gt;

&lt;p&gt;It was also possible to enumerate users and check if they have 2FA enabled,
because GitLab responded with a different error for each case.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.5 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/11/gitlab-8-dot-6-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/11/gitlab-8-dot-6-dot-5-released/</id>
<published>2016-04-11T17:00:00+00:00</published>
<updated>2016-04-11T17:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.6.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes an important security fix for Two-factor Authentication,
fixes for project importing, and a performance improvement in Git post-receive
handling.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Allow OAuth SSL verification to be disabled when importing from GitHub
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;323&quot;&gt;!323&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent Two-factor Authentication spoofing&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix for importing projects from GitHub Enterprise (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3529&quot;&gt;!3529&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update project language after doing all other operations (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3533&quot;&gt;!3533&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Check permissions when importing project members (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3535&quot;&gt;!3535&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Unblocks user when active_directory is disabled and it can be found
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3550&quot;&gt;!3550&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Only update main language if it is not already set (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3556&quot;&gt;!3556&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Return status code 303 after a branch DELETE operation to avoid
project deletion (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3583&quot;&gt;!3583&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;two-factor-authentication-spoofing&quot;&gt;Two-factor Authentication spoofing&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;jobertabma&quot;&gt;Jobert Abma&lt;&#x2F;a&gt; of &lt;a href=&quot;https:&#x2F;&#x2F;hackerone.com&#x2F;jobert&quot;&gt;HackerOne&lt;&#x2F;a&gt;
alerted us to a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;14900&quot;&gt;security vulnerability&lt;&#x2F;a&gt; related to the two-factor authentication
(2FA) method used in GitLab CE and EE.&lt;&#x2F;p&gt;

&lt;p&gt;It was possible for an attacker to bypass password authentication of users that
have 2FA enabled, and consequently sign in as a different user without knowing
their password, if he could guess the user&#x27;s current six-digit 2FA validation
code.&lt;&#x2F;p&gt;

&lt;p&gt;It was also possible to enumerate users and check if they have 2FA enabled,
because GitLab responded with a different error for each case.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve also &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;04&#x2F;11&#x2F;gitlab-8-dot-5-dot-10-released&#x2F;&quot;&gt;released new packages for 8.5, 8.4, and 8.3&lt;&#x2F;a&gt; to include this
important fix.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.4, 8.5.9, 8.4.7, and 8.3.6 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/04/gitlab-8-dot-6-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/04/gitlab-8-dot-6-dot-4-released/</id>
<published>2016-04-04T12:00:00+00:00</published>
<updated>2016-04-04T12:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing versions 8.6.4, 8.5.9, 8.4.7, and 8.3.6 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions include a minor security fix.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t attempt to fetch any tags from a forked repo. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3504&quot;&gt;!3504&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;minor-security-issue-with-tags-and-forks&quot;&gt;Minor security issue with tags and forks&lt;&#x2F;h2&gt;

&lt;p&gt;Prior to these versions, it was possible for the Git tags from a fork project to
appear in the source project, if a merge request was opened on the source
project from the fork project, and then new tags were pushed to the forked
project. Tags that already existed in the source project would not be
overwritten.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;strong&gt;Update:&lt;&#x2F;strong&gt; &lt;em&gt;(2016-04-05 22:45 UTC)&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

  &lt;p&gt;As promised, we have included this security fix for the previous four GitLab
monthly releases, and have released new packages for each.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;These versions do not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/04/01/gitlab-8-dot-6-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/04/01/gitlab-8-dot-6-dot-3-released/</id>
<published>2016-04-01T16:00:00+00:00</published>
<updated>2016-04-01T16:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.6.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes, once again many fixes and improvements.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix other cases where git hooks would fail due to old commits. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;310&quot;&gt;!310&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Exit ElasticIndexerWorker&#x27;s job happily if record cannot be found. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;311&quot;&gt;!311&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &quot;Reload with full diff&quot; button not working. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;313&quot;&gt;!313&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Destroy related todos when an Issue&#x2F;MR is deleted. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3376&quot;&gt;!3376&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 when target is nil on todo list. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3376&quot;&gt;!3376&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix copying uploads when moving issue to another project. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3382&quot;&gt;!3382&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensuring Merge Request API returns boolean values for work_in_progress. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3432&quot;&gt;!3432&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix raw&#x2F;rendered diff producing different results on merge requests. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3450&quot;&gt;!3450&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix commit comment alignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3466&quot;&gt;!3466&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update gitlab-shell version and doc to 2.6.12. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;280&quot;&gt;!280&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Mentions on confidential issues doesn&#x27;t create todos for non-members. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3374&quot;&gt;!3374&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow temporary email as notification email. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3477&quot;&gt;!3477&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes two minor database migrations for CE. All the migrations
can be run without causing any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/30/gitlab-8-dot-6-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/30/gitlab-8-dot-6-dot-2-released/</id>
<published>2016-03-30T16:00:00+00:00</published>
<updated>2016-03-30T16:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.6.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes many fixes and improvements.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix old commits triggering git hooks on new branches branched off another branch. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;281&quot;&gt;!281&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix issue with deleted user in audit event. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;284&quot;&gt;!284&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Mark pending todos as done when approving a merge request. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;292&quot;&gt;!292&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; GitLab Geo: Display Attachments from Primary node. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;302&quot;&gt;!302&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix dropdown alignment. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3298&quot;&gt;!3298&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issuable sidebar overlaps on tablet. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3299&quot;&gt;!3299&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Make dropdowns pixel perfect. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3337&quot;&gt;!3337&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix order of steps to prevent PostgreSQL errors when running migration. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3355&quot;&gt;!3355&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bold text in issuable sidebar. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3358&quot;&gt;!3358&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error with anonymous token in applications settings. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3362&quot;&gt;!3362&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the milestone &#x27;upcoming&#x27; filter. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3364&quot;&gt;!3364&lt;&#x2F;a&gt;) &amp;amp; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3368&quot;&gt;!3368&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix comments on confidential issues showing up in activity feed to non-members. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3375&quot;&gt;!3375&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;NoMethodError&lt;&#x2F;code&gt; when visiting CI root path at &lt;code&gt;&#x2F;ci&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3377&quot;&gt;!3377&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a tooltip to new branch button in issue page. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3380&quot;&gt;!3380&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue hiding the password form when signed-in with a linked account. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3381&quot;&gt;!3381&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add links to CI setup documentation from project settings and builds pages. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3384&quot;&gt;!3384&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue with width of project select dropdown. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3386&quot;&gt;!3386&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove redundant &lt;code&gt;require&lt;&#x2F;code&gt;s from Banzai files. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3391&quot;&gt;!3391&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 with cancel button on issuable edit form. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3392&quot;&gt;!3392&lt;&#x2F;a&gt;) &amp;amp; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3417&quot;&gt;!3417&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix background when editing a highlighted note. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3423&quot;&gt;!3423&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove tabstop from the WIP toggle links. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3426&quot;&gt;!3426&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure private project snippets are not viewable by unauthorized people.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Gracefully handle notes on deleted commits in merge requests. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3402&quot;&gt;!3402&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fixed issue with notification settings not saving. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3452&quot;&gt;!3452&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Updated chef version to 12.6. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;704&quot;&gt;!704&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Use &lt;code&gt;:before&lt;&#x2F;code&gt; from Chef 12.6 to enable extension before migration or database seed. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;705&quot;&gt;!705&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Runner 1.1 with Autoscaling</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/29/gitlab-runner-1-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/29/gitlab-runner-1-1-released/</id>
<published>2016-03-29T14:00:00+00:00</published>
<updated>2016-03-29T14:00:00+00:00</updated>
<author>
<name>Kamil Trzciński</name>
</author>
<content type='html'>&lt;p&gt;Over the last year, GitLab Runner has become a significant part of the GitLab
family. We are happy to announce that GitLab Runner 1.1 is released today; a
release that brings major improvements over its predecessor. There is one
feature though that we are excited about and is the cornerstone of this release.&lt;&#x2F;p&gt;

&lt;p&gt;Without further ado, we present you GitLab Runner 1.1 and its brand-new, shiny
feature: Autoscaling!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;about-gitlab-runner&quot;&gt;About GitLab Runner&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab has &lt;a href=&quot;&#x2F;features&#x2F;continuous-integration&#x2F;&quot;&gt;built-in continuous integration&lt;&#x2F;a&gt; to allow you to run a
number of tasks as you prepare to deploy your software. Typical tasks
might be to build a software package or to run tests as specified in a
YAML file. These tasks need to run by something, and in GitLab this something
is called a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;runners&#x2F;README.html&quot;&gt;Runner&lt;&#x2F;a&gt;; an application that processes builds.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Runner 1.1 is the biggest release yet. Autoscaling provides the ability
to utilize resources in a more elastic and dynamic way. Along with autoscaling
come some other significant features as well. Among them is support for a
distributed cache server, and user requested features like passing artifacts
between stages and the ability to specify the archive names are now available.&lt;&#x2F;p&gt;

&lt;p&gt;Let&#x27;s explore these features one by one.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;the-challenge-of-scaling&quot;&gt;The Challenge of Scaling&lt;&#x2F;h2&gt;

&lt;p&gt;Other continuous integration platforms have a similar functionality.
For example, Runners are called &quot;Agents&quot; in Atlassian&#x27;s Bamboo (which integrates
with Bitbucket.) Some services, like Bamboo, charge individually for using these
virtual machines and if you need a number of them it can get quite expensive,
quite quickly. If you have only one available Agent or Runner, you could be
slowing down your work.&lt;&#x2F;p&gt;

&lt;p&gt;We don&#x27;t charge anything for connecting Runners in GitLab, it’s all built-in.
However, the challenge up until now has been the scaling of these Runners. With
GitLab, Runners can be specified per project, but this means you have to create
a Runner per project, and that doesn&#x27;t scale well.&lt;&#x2F;p&gt;

&lt;p&gt;An alternative up until now was to create a number of &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;runners&#x2F;README.html&quot;&gt;shared Runners&lt;&#x2F;a&gt; which
can be used across your entire GitLab instance.&lt;&#x2F;p&gt;

&lt;p&gt;However, what happens when you need more Runners than there are available?
You end up having to queue your tasks, and that will eventually slow things down.&lt;&#x2F;p&gt;

&lt;p&gt;Hence the need for autoscaling.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;autoscaling-increases-developer-happiness&quot;&gt;Autoscaling increases developer happiness&lt;&#x2F;h2&gt;

&lt;p&gt;We decided to build autoscaling with the help of &lt;a href=&quot;https:&#x2F;&#x2F;docs.docker.com&#x2F;machine&#x2F;&quot;&gt;Docker Machine&lt;&#x2F;a&gt;.
Docker Machine allows you to provision and manage multiple remote Docker hosts
and supports a vast number of &lt;a href=&quot;https:&#x2F;&#x2F;docs.docker.com&#x2F;machine&#x2F;drivers&#x2F;&quot;&gt;virtualization and cloud providers&lt;&#x2F;a&gt;,
and this is what autoscaling currently works only with.&lt;&#x2F;p&gt;

&lt;p&gt;Because the Runners will autoscale, your infrastructure contains only as
many build instances as necessary at anytime. If you configure the Runner to
only use autoscale, the system on which the Runner is installed acts as a
bastion for all the machines it creates.&lt;&#x2F;p&gt;

&lt;p&gt;Autoscaling allows you to increase developer happiness. Everyone hates to wait
for their builds to be picked up, just because all Runners are currently in use.&lt;&#x2F;p&gt;

&lt;p&gt;The autoscaling feature promotes heavy parallelization of your tests, something
that is made easy by defining multiple &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#jobs&quot;&gt;jobs&lt;&#x2F;a&gt; in your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;p&gt;While cutting down the waiting time to a minimum makes your developers happy,
this is not the only benefit of autoscaling. In the long run, autoscaling
reduces your infrastructure costs:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;autoscaling follows your team&#x27;s work hours,&lt;&#x2F;li&gt;
  &lt;li&gt;you pay for what you used, even when scaling to hundreds of machines,&lt;&#x2F;li&gt;
  &lt;li&gt;you can use larger machines for the same cost, thus having your builds run
faster,&lt;&#x2F;li&gt;
  &lt;li&gt;the machines are self-managed, everything is handled by docker-machine, making
your Administrators happy too,&lt;&#x2F;li&gt;
  &lt;li&gt;your responsibility is to only manage GitLab and one GitLab Runner instance.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Below, you can see a real-life example of the Runner&#x27;s autoscale feature, tested
on GitLab.com for the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&quot;&gt;GitLab Community Edition&lt;&#x2F;a&gt; project:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;runner_1_1&#x2F;auto-scaling-gitlab-com.png&quot; alt=&quot;Real life example of autoscaling&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Each machine on the chart is an independent cloud instance, running build jobs
inside Docker containers. Our builds are run on DigitalOcean 4GB machines, with
CoreOS and the latest Docker Engine installed.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;www.digitalocean.com&#x2F;&quot;&gt;DigitalOcean&lt;&#x2F;a&gt; proved to be one of the best choices for us, mostly because of
the fast spin-up time (around 50 seconds) and their very fast SSDs, which are
ideal for testing purposes. Currently, our GitLab Runner processes up to 160
builds at a time.&lt;&#x2F;p&gt;

&lt;p&gt;If you are eager to test this yourself, read more on &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;master&#x2F;docs&#x2F;configuration&#x2F;autoscale.md&quot;&gt;configuring the new
autoscaling feature&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;distributed-cache-server&quot;&gt;Distributed cache server&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab Runner 0.7.0 we introduced support for &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#cache&quot;&gt;caching&lt;&#x2F;a&gt;. This release brings
improvements to this feature too, which is especially useful with autoscaling.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Runner 1.1 allows you to use an external server to store all your caches.
The server needs to expose an S3-compatible API, and while you can use for
example Amazon S3, there are also a number of other servers that you can run
on-premises just for the purpose of caching.&lt;&#x2F;p&gt;

&lt;p&gt;Read more &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;master&#x2F;docs&#x2F;configuration&#x2F;autoscale.md#distributed-runners-caching&quot;&gt;about the distributed cache server&lt;&#x2F;a&gt; and learn how to set
up and configure your own.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;artifacts-improvements&quot;&gt;Artifacts improvements&lt;&#x2F;h2&gt;

&lt;p&gt;We listen closely to our community to extend GitLab Runner with user requests.
One of the often-requested features was related to passing artifacts between
builds.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab offers some awesome capabilities to define multiple &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#jobs&quot;&gt;jobs&lt;&#x2F;a&gt; and group
them in different &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#stages&quot;&gt;stages&lt;&#x2F;a&gt;. The jobs are always independent, and can be run on
different Runners.&lt;&#x2F;p&gt;

&lt;p&gt;Up until now, you had to use an external method if you wanted to pass the files
from one job to another. With GitLab Runner 1.1 this happens automatically.
Going one step further, GitLab 8.6 allows you to fine-tune &lt;em&gt;what&lt;&#x2F;em&gt; should be
passed. This is now handled by defining &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#dependencies&quot;&gt;dependencies&lt;&#x2F;a&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight yaml&quot;&gt;&lt;code&gt;&lt;span class=&quot;s&quot;&gt;build:osx&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;stage&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;build&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;artifacts&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;...&lt;&#x2F;span&gt;

&lt;span class=&quot;s&quot;&gt;test:osx&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;stage&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;test&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;dependencies&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt;
  &lt;span class=&quot;pi&quot;&gt;-&lt;&#x2F;span&gt; &lt;span class=&quot;s&quot;&gt;build:osx&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The second most-requested feature was the ability to change the name of the
uploaded artifacts archive. With GitLab Runner 1.1, this is now possible with
this simple syntax:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight yaml&quot;&gt;&lt;code&gt;&lt;span class=&quot;na&quot;&gt;build_linux&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt;
  &lt;span class=&quot;na&quot;&gt;artifacts&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt;
    &lt;span class=&quot;na&quot;&gt;name&lt;&#x2F;span&gt;&lt;span class=&quot;pi&quot;&gt;:&lt;&#x2F;span&gt; &lt;span class=&quot;s2&quot;&gt;&quot;&lt;&#x2F;span&gt;&lt;span class=&quot;s&quot;&gt;build_linux_$CI_BUILD_REF_NAME&quot;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Read more &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#artifactsname&quot;&gt;about naming artifacts&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-documentation&quot;&gt;Improved documentation&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab Runner 1.1 we&#x27;ve also released improved documentation, explaining
all executors and commands. The documentation also describes what features are
supported by different configurations.&lt;&#x2F;p&gt;

&lt;p&gt;Read the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;master&#x2F;README.md&quot;&gt;revised documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;using-runner-on-macos&quot;&gt;Using Runner on macOS&lt;&#x2F;h2&gt;

&lt;p&gt;We also upgraded GitLab Runner 1.1 to be compatible with El Capitan and Xcode 7.3.
You should read the revised &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;master&#x2F;docs&#x2F;install&#x2F;osx.md#install-on-osx&quot;&gt;installation guide for macOS&lt;&#x2F;a&gt;
and FAQ section describing the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-runner&#x2F;blob&#x2F;master&#x2F;docs&#x2F;faq&#x2F;README.md#12-failed-to-authorize-rights-0x1-with-status-60007&quot;&gt;needed preparation steps&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;changelog&quot;&gt;Changelog&lt;&#x2F;h2&gt;

&lt;p&gt;So far we described the biggest features, but these are not all the changes
introduced with GitLab Runner 1.1. We know that even the smallest change can
make a difference in your workflow, so here is the complete list:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;- Use Go 1.5
- Add docker-machine based autoscaling for docker executor
- Add support for external cache server
- Add support for `sh`, allowing to run builds on images without the `bash`
- Add support for passing the artifacts between stages
- Add `docker-pull-policy`, it removes the `docker-image-ttl`
- Add `docker-network-mode`
- Add `git` to gitlab-runner:alpine
- Add support for `CapAdd`, `CapDrop` and `Devices` by docker executor
- Add support for passing the name of artifacts archive (`artifacts:name`)
- Refactor: The build trace is now implemented by `network` module
- Refactor: Remove CGO dependency on Windows
- Fix: Create alternative aliases for docker services (uses `-`)
- Fix: VirtualBox port race condition
- Fix: Create cache for all builds, including tags
- Fix: Make the shell executor more verbose when the process cannot be started
- Fix: Pass gitlab-ci.yml variables to build container created by docker executor
- Fix: Don&#x27;t restore cache if not defined in gitlab-ci.yml
- Fix: always use `json-file` when starting docker containers
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You can see why we think version 1.1 is fantastic.
Go get it, test it and share your feedback with us!
You can meet with the CI team in our upcoming webcast.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;live-webcast-gitlab-ci&quot;&gt;Live webcast: GitLab CI&lt;&#x2F;h2&gt;

&lt;p&gt;Sign up for our webcast on April 14th, which includes an overview and tutorial
about using GitLab CI. Meet people from the GitLab CI team and get your questions
answered live!&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Date: Thursday, April 14, 2016&lt;&#x2F;li&gt;
  &lt;li&gt;Time: 5pm (17:00) UTC; 12pm EST; 9am PST&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;page.gitlab.com&#x2F;apr-2016-gitlab-intro-ci-webcast.html&quot;&gt;Register here&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Can&#x27;t make it? Register anyway, and we&#x27;ll send you a link to watch it later!&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;unsplash&#x2F;high-road.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/23/gitlab-8-dot-6-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/23/gitlab-8-dot-6-dot-1-released/</id>
<published>2016-03-23T15:00:00+00:00</published>
<updated>2016-03-23T15:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.6.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes many fixes and improvements.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Only rename the &lt;code&gt;light_logo&lt;&#x2F;code&gt; column in the &lt;code&gt;appearances&lt;&#x2F;code&gt; table if it is not there yet. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;290&quot;&gt;!290&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix diffs in text part of email-on-push messages. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;293&quot;&gt;!293&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix an issue with methods not accessible in some controllers. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;295&quot;&gt;!295&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Ensure &lt;code&gt;Projects::ApproversController&lt;&#x2F;code&gt; inherits from &lt;code&gt;Projects::ApplicationController&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;296&quot;&gt;!296&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add option to reload the schema before restoring a database backup. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2807&quot;&gt;!2807&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Display navigation controls on mobile. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3214&quot;&gt;!3214&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a bug where participants would not work correctly on merge requests. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3329&quot;&gt;!3329&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix sorting issues by votes on the groups issues page results in SQL errors. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3333&quot;&gt;!3333&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restrict notifications for confidential issues. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3334&quot;&gt;!3334&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not allow to move issue if it has not been persisted. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3340&quot;&gt;!3340&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a confirmation step before deleting an issuable. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3341&quot;&gt;!3341&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue with the sign-in button overflowing on mobile. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3342&quot;&gt;!3342&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Auto-collapses the navigation sidebar when resizing. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3343&quot;&gt;!3343&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix build dependencies, when the dependency is a string. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3344&quot;&gt;!3344&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show error messages when trying to create a label in dropdown menu. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3345&quot;&gt;!3345&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue with assign milestone not loading milestone list. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3346&quot;&gt;!3346&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue causing the Dashboard &amp;gt; Milestones page to be blank. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3348&quot;&gt;!3348&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix artifacts path key in &lt;code&gt;gitlab.yml.erb&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;694&quot;&gt;!694&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.6 released with Deploy to Kubernetes and Subscribe to Label</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/22/gitlab-8-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/22/gitlab-8-6-released/</id>
<published>2016-03-22T00:00:00+00:00</published>
<updated>2016-03-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Never have there been more people contributing to GitLab. And you can see it.&lt;&#x2F;p&gt;

&lt;p&gt;Whether you&#x27;re leading a large open source project, managing thousands of
private, interlinked projects, or even just use GitLab by yourself,
with GitLab 8.6 your life is going to get a whole lot easier.&lt;&#x2F;p&gt;

&lt;p&gt;Not only can you now effortlessly deploy to Kubernetes,
it&#x27;s now &lt;em&gt;so much&lt;&#x2F;em&gt; easier to only get the messages you need with
the ability to subscribe to labels. On top of that,
we made &lt;em&gt;many&lt;&#x2F;em&gt; things faster and better looking.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
Marcia Ramos for helping us &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;212&quot;&gt;improving GitLab Pages documentation&lt;&#x2F;a&gt;
and being a great contributor to the GitLab community. Being an MVP doesn&#x27;t
necessarily mean contributing code to GitLab!&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Marcia!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;deploy-straight-from-gitlab-ci-to-kubernetes&quot;&gt;Deploy straight from GitLab CI to Kubernetes&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab has always been the place where your projects start their life,
where you collaborate in issues and diffs and even test your code.
Now, GitLab is also the place where you ship your code quickly and easily
to Kubernetes.&lt;&#x2F;p&gt;

&lt;p&gt;We want to make easy to deploy straight from GitLab CI in one step,
without any custom scripts.&lt;&#x2F;p&gt;

&lt;p&gt;Redspread is a company in the current Y Combinator batch (Winter 2016).
They noticed an incredible increase in Kubernetes usage among early stage
startups. Many startups in this YC batch and recent alumni are evaluating
or already using Kubernetes in production.&lt;&#x2F;p&gt;

&lt;p&gt;Redspread’s open source command line tool,
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;redspread&#x2F;spread&quot;&gt;Spread&lt;&#x2F;a&gt;,
allows command line deployments to
Kubernetes. It uses the current &lt;code&gt;kubectl&lt;&#x2F;code&gt; context to read
a project directory and
automatically create or update any Kubernetes objects. It made sense to
integrate Spread with GitLab CI, since GitLab CI focuses on automating
deployment.&lt;&#x2F;p&gt;

&lt;p&gt;To use Spread with GitLab CI:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Add the correct image to .gitlab-ci.yml:&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;deploy:
  stage: deploy
  image: redspreadapps&#x2F;gitlabci
  script:
  - null-script
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;ol&gt;
  &lt;li&gt;Set the environment variables to what makes sense. &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;ethernetdan&#x2F;spread&#x2F;blob&#x2F;gitlab-ci&#x2F;images&#x2F;gitlabci&#x2F;README.md&quot;&gt;See the documentation of the environment variables&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;_Note: to use Spread with GitLab CI Variables, you will need &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;03&#x2F;29&#x2F;gitlab-runner-1-1-released&#x2F;&quot;&gt;GitLab Runner 1.1&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;subscribe-to-a-label&quot;&gt;Subscribe to a Label&lt;&#x2F;h2&gt;

&lt;p&gt;If you don&#x27;t want to miss issues that are important to you, simply
subscribe to a label! You&#x27;ll get notified whenever the label gets added to
an issue, making sure you don&#x27;t miss a thing.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_6&#x2F;subscribe-to-label.png&quot; alt=&quot;Subscribe to a label in GitLab 8.6&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you work on a large or popular project, try subscribing only to the labels
that are relevant to you. You&#x27;ll notice it&#x27;ll be much easier to focus on what&#x27;s
important.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;confidential-issues&quot;&gt;Confidential Issues&lt;&#x2F;h2&gt;

&lt;p&gt;At GitLab &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;08&#x2F;03&#x2F;almost-everything-we-do-is-now-open&#x2F;&quot;&gt;we&#x27;re all about being open&lt;&#x2F;a&gt;, but you can&#x27;t share everything.
For sensitive subjects, you can now make a confidential issue in a project.
This issue will only be visible to the members of the project and the creator of
the issue, even if the project is public or internal.&lt;&#x2F;p&gt;

&lt;p&gt;This means people can now safely report security issues to your open source
projects. You can communicate with them right there and then, without having
to rely on external applications.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_6&#x2F;confidential-issue.png&quot; alt=&quot;Use confidential issue for sensitive matters in GitLab 8.6&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;external-users&quot;&gt;External Users&lt;&#x2F;h2&gt;

&lt;p&gt;Internal projects allow you to practice &lt;a href=&quot;&#x2F;blog&#x2F;2014&#x2F;09&#x2F;05&#x2F;innersourcing-using-the-open-source-workflow-to-improve-collaboration-within-an-organization&#x2F;&quot;&gt;innersourcing&lt;&#x2F;a&gt;,
sharing projects internally as if they&#x27;re open source, but protecting them
as if they are private.&lt;&#x2F;p&gt;

&lt;p&gt;This is something we see more and more organisations adopt, but especially
larger organisations often have external parties working together with them.
These people also need access to GitLab, but not to the internal projects.&lt;&#x2F;p&gt;

&lt;p&gt;To prevent certain users from accessing internal projects, you can now mark
them as &lt;em&gt;External&lt;&#x2F;em&gt;. It&#x27;s a simple check in the users&#x27; page that can be set
by any administrator.&lt;&#x2F;p&gt;

&lt;p&gt;In a future release, we&#x27;ll be adding the ability to have this set automatically
based on LDAP membership.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;permissions&#x2F;permissions.html#external-users&quot;&gt;Read about external users in our documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;better-dropdowns&quot;&gt;Better Dropdowns&lt;&#x2F;h2&gt;

&lt;p&gt;This seems like a minor update, but just try them!
The dropdowns all over GitLab have been improved. Especially the filters
for lists are now much more functional and easier to use.&lt;&#x2F;p&gt;

&lt;p&gt;You can quickly add multiple labels and even make new labels on the go.
This release contains hundreds of improvements to the interface, big and small,
we hope you appreciate them!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_6&#x2F;create-label-from-dropdown.gif&quot; alt=&quot;Awesome dropdowns in GitLab 8.6&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Another improvement? Try Todos today!&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_6&#x2F;fast-todos.gif&quot; alt=&quot;Better Todos with GitLab 8.6&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;delete-issues&quot;&gt;Delete Issues&lt;&#x2F;h2&gt;

&lt;p&gt;Sometimes, simply closing an issue or merge request is not sufficient.
For those times, we are now making it possible to delete issues and merge
requests.&lt;&#x2F;p&gt;

&lt;p&gt;Only &lt;code&gt;owners&lt;&#x2F;code&gt; can delete issues by editing the issue or merge request and
clicking, you guessed it, &lt;code&gt;Delete&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;move-issues-to-other-projects&quot;&gt;Move Issues to other Projects&lt;&#x2F;h2&gt;

&lt;p&gt;If your product consists of multiple GitLab projects,
issues can easily end up in the wrong place.
You can now easily move issues between projects!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_6&#x2F;move-issue.png&quot; alt=&quot;Move issues between projects in GitLab 8.6&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The original issue will be copied, closed and referenced,
making sure nothing or no one will be confused with the move.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;commit-messages-in-jira&quot;&gt;Commit Messages in JIRA&lt;&#x2F;h2&gt;

&lt;p&gt;If you mention a JIRA issue in a commit,
GitLab will now not only reference the commit with a link,
but now also add the commit message in a comment in the JIRA issue.&lt;&#x2F;p&gt;

&lt;p&gt;We know many people are using JIRA and we&#x27;re looking forward to more feedback
on how we can improve GitLab&#x27;s integration with JIRA.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;jira&#x2F;&quot;&gt;Read about GitLab&#x27;s JIRA integration&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;group-visibility-level&quot;&gt;Group Visibility Level&lt;&#x2F;h2&gt;

&lt;p&gt;You can now set the visibility level of groups, just like you could always
do with projects. Groups now have a visibility level icon to show this.&lt;&#x2F;p&gt;

&lt;p&gt;The global restriction for visibility levels, which you can set as an administrator,
also applies to groups. That means that if you set it to &lt;code&gt;internal&lt;&#x2F;code&gt;,
the explore page will be empty for anonymous users.&lt;&#x2F;p&gt;

&lt;p&gt;The group level visibility solves
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;12658&quot;&gt;this popular issue&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;public_access&#x2F;public_access.html#visibility-of-groups&quot;&gt;Read about the group visibility level&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;gitlab-mattermost-21&quot;&gt;GitLab Mattermost 2.1&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-2-1-android-windows-linux-and-mac-apps-plus-portuguese&#x2F;&quot;&gt;Mattermost 2.1&lt;&#x2F;a&gt;
ships in GitLab 8.6 with new Android, Windows, Linux and Mac apps with full
GitLab SSO support, plus Brazilian Portuguese translation and more.&lt;&#x2F;p&gt;

&lt;p&gt;Mattermost 2.1 contains a &lt;a href=&quot;http:&#x2F;&#x2F;docs.mattermost.com&#x2F;administration&#x2F;changelog.html#security-update&quot;&gt;security update&lt;&#x2F;a&gt;
and earlier deployments should &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;gitlab-mattermost&#x2F;&quot;&gt;upgrade to this version&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has been so full, we didn&#x27;t have the space to highlight all!
We still want you to know about them, so here are some of them, in short:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;New keyboard shortcut: You can now press &lt;code&gt;e&lt;&#x2F;code&gt; to edit any issue &#x2F; MR.&lt;&#x2F;li&gt;
  &lt;li&gt;YAML frontmatter is now rendered nicely in markdown files.&lt;&#x2F;li&gt;
  &lt;li&gt;No more default password! Set your password on first sign in. &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;install&#x2F;installation.html#initial-login&quot;&gt;Read more in the docs&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;We now show test coverage in the builds view.&lt;&#x2F;li&gt;
  &lt;li&gt;Support for Golang subpackage fetching, straight from GitLab.&lt;&#x2F;li&gt;
  &lt;li&gt;Issues and Merge Requests now look better on mobile. Finally!&lt;&#x2F;li&gt;
  &lt;li&gt;Quickly create a new branch from an issue, with a dedicated button.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;saml.html#customization&quot;&gt;SAML customization&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;Easily (un)mark merge requests as WIP using a link. No more editing necessary!&lt;&#x2F;li&gt;
  &lt;li&gt;Better table of contents in Wikis!&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;gitlab-geo&#x2F;README.html&quot;&gt;GitLab Geo&lt;&#x2F;a&gt; now syncs even
more things! We urge you to upgrade to 8.6 if you&#x27;re interested in Geo.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;performance-improvements&quot;&gt;Performance improvements&lt;&#x2F;h3&gt;

&lt;p&gt;When &lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;02&#x2F;25&#x2F;making-gitlab-faster&#x2F;&quot;&gt;we said&lt;&#x2F;a&gt; that &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;02&#x2F;22&#x2F;gitlab-8-5-released&#x2F;&quot;&gt;making GitLab faster&lt;&#x2F;a&gt;
was a priority, we weren&#x27;t kidding.
Here is some of the work we&#x27;ve done to make GitLab 8.6 faster:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Search performance has been greatly improved for users using PostgreSQL
&lt;em&gt;without&lt;&#x2F;em&gt; using ElasticSearch. This requires the &lt;code&gt;pg_trgm&lt;&#x2F;code&gt; extension (see
barometer).&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of listing commits has been improved.&lt;&#x2F;li&gt;
  &lt;li&gt;Counting of tags and branches on the commits&#x2F;branches&#x2F;tags pages is now a bit
faster and is cached.&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of retrieving CI services of a project has been improved.&lt;&#x2F;li&gt;
  &lt;li&gt;Project avatars stored in Git repositories are now cached, cutting down request.
timings for &lt;em&gt;all&lt;&#x2F;em&gt; project pages for projects that don&#x27;t use an avatar uploaded
via the web UI. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3272&quot;&gt;!3272&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Diffs that are larger than 100 KB are no longer displayed, instead a &quot;This
diff is too large&quot; message is displayed. This prevents Unicorn timeouts when
viewing large diffs. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3185&quot;&gt;!3185&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;The branch commit ahead&#x2F;behind statistics are no longer pre-cached on every
push. For projects with lots of branches (e.g. thousands) this can have a huge
impact on the time it takes for the pre-caching process to complete.
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3274&quot;&gt;!3274&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Indexes were added for &lt;code&gt;ci_runners.token&lt;&#x2F;code&gt;
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3249&quot;&gt;!3249&lt;&#x2F;a&gt;) and
&lt;code&gt;git_hooks.project_id&lt;&#x2F;code&gt;. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;271&quot;&gt;!271&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of viewing individual issues is improved by caching certain Git operations.&lt;&#x2F;li&gt;
  &lt;li&gt;We enabled HTTP caching for requests that fetch the raw contents on a single
file in a Git repository. Cache times range from 1 minute (for &#x27;mutable&#x27;
resources like &lt;code&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;raw&#x2F;master&#x2F;VERSION&lt;&#x2F;code&gt;
which use a branch name) to 1 hour (for immutable resources like
&lt;code&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;raw&#x2F;17de30f412b5eddaa080006b6dd2aae2bd2d5647&#x2F;VERSION&lt;&#x2F;code&gt;
that use a commit SHA). In addition to this we configured NGINX in the Omnibus
packages to use up to 1 GB of disk space for proxy caching. These two changes
combined reduce the load on GitLab servers that get many requests of HTTP
clients polling a single file in a public repo.&lt;&#x2F;li&gt;
  &lt;li&gt;In GitLab 8.4 we added a &#x27;housekeeping button&#x27; to the project settings page.
This button triggers a
&lt;a href=&quot;https:&#x2F;&#x2F;www.kernel.org&#x2F;pub&#x2F;software&#x2F;scm&#x2F;git&#x2F;docs&#x2F;git-gc.html&quot;&gt;git gc&lt;&#x2F;a&gt; run on
the project. In GitLab 8.6 we have automated this button: every 10 pushes, but
no more than once per hour, GitLab will run &lt;code&gt;git gc&lt;&#x2F;code&gt; on repositories. This
should (slightly) improve Git disk use and performance.&lt;&#x2F;li&gt;
  &lt;li&gt;We split &lt;code&gt;LDAPSyncworker&lt;&#x2F;code&gt; and &lt;code&gt;LDAPGroupSync&lt;&#x2F;code&gt; worker. Performance will be
greatly improved for large installations. LDAPSyncworker runs once per hour.
In our benchmark runs, for 20,000 users and 10,000 groups, the sync takes 15
minutes. This is in contrast to hours or, in extreme cases, 1-2 days for the
old &lt;code&gt;LDAPSyncWorker&lt;&#x2F;code&gt; (which synced groups, too).&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;updates-in-the-omnibus-gitlab-package&quot;&gt;Updates in the omnibus-gitlab package&lt;&#x2F;h3&gt;

&lt;p&gt;As GitLab gets improved every release, so does the omnibus-gitlab package.
You can see the changes that package receives for every release in the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;omnibus-gitlab CHANGELOG&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;In this release there are some important changes in the bundled software:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Redis is updated to version 2.8.24&lt;&#x2F;li&gt;
  &lt;li&gt;PostgreSQL is updated to version 9.2.15&lt;&#x2F;li&gt;
  &lt;li&gt;Nginx proxy caching is enabled&lt;&#x2F;li&gt;
  &lt;li&gt;pg_trgm extension is automatically enabled&lt;&#x2F;li&gt;
  &lt;li&gt;Default Nginx http2 support can be disabled if necessary&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes migrations that require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Especially for very large instances running PostgreSQL, this upgrade can
take some time. In our instance (with almost a million projects), the PostgreSQL
migrations took more than half an hour, which caused a TCP connection to be dropped.
Connecting using a Unix socket or using TCP keepalive should prevent this.
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;operations&#x2F;issues&#x2F;135#note_4303804&quot;&gt;This is what we did&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Smaller instances or those running MySQL should have no such issues, but still
require some downtime for migrations.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;elasticsearch-requirements&quot;&gt;Elasticsearch Requirements&lt;&#x2F;h3&gt;

&lt;p&gt;We have added a requirement for the Elasticsearch integration with GitLab 8.6.
You now need to have the &lt;a href=&quot;https:&#x2F;&#x2F;www.elastic.co&#x2F;guide&#x2F;en&#x2F;elasticsearch&#x2F;plugins&#x2F;2.0&#x2F;plugins-delete-by-query.html&quot;&gt;Delete By Query Plugin&lt;&#x2F;a&gt;
installed, in addition to Elasticsearch 2.0+.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html&quot;&gt;Read about the Elasticsearch integration in our documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;changes-for-source-installations-with-postgresql&quot;&gt;Changes for Source installations with PostgreSQL&lt;&#x2F;h3&gt;

&lt;p&gt;Starting with GitLab 8.6 PostgreSQL users are required to enable the &quot;pg_trgm&quot;
extension. On certain Linux distributions this will require the installation of
an extra package. Ubuntu, Fedora, and Debian all ship this extension in the
&quot;postgresql-contrib&quot; package. Once installed the extension must be enabled, this
must be done before upgrading to GitLab 8.6 to ensure that all database
migrations succeed. This extension can be enabled by running the following as a
PostgreSQL super user for every GitLab database:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;CREATE EXTENSION IF NOT EXISTS pg_trgm;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Users using GitLab&#x27;s Omnibus packages do &lt;em&gt;not&lt;&#x2F;em&gt; have to manually enable this
extension as this is done automatically.&lt;&#x2F;p&gt;

&lt;p&gt;To check if the extension is enabled you can run the following query:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;SELECT true AS enabled
FROM pg_available_extensions
WHERE name = &#x27;pg_trgm&#x27;
AND installed_version IS NOT NULL;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If the extension is enabled this will produce the following output:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt; enabled
---------
 t
(1 row)
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;MySQL users do not need to take any extra steps.&lt;&#x2F;p&gt;

&lt;p&gt;This release also includes a migration that will create a number of indexes that
rely on the above extension. Creating these indexes may take up to 30 minutes to
complete depending on the amount of data stored in your database. Users are
advised to ensure that any PostgreSQL connections stay active long enough for
this process to complete.&lt;&#x2F;p&gt;

&lt;p&gt;In the unlikely event of this migration failing (or completing partially) users
can run the following SQL commands in their database:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;CREATE INDEX CONCURRENTLY IF NOT EXISTS index_ci_runners_on_token_trigram ON ci_runners USING gin(token gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_ci_runners_on_description_trigram ON ci_runners USING gin(description gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_issues_on_title_trigram ON issues USING gin(title gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_issues_on_description_trigram ON issues USING gin(description gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_merge_requests_on_title_trigram ON merge_requests USING gin(title gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_merge_requests_on_description_trigram ON merge_requests USING gin(description gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_milestones_on_title_trigram ON milestones USING gin(title gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_milestones_on_description_trigram ON milestones USING gin(description gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_namespaces_on_name_trigram ON namespaces USING gin(name gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_namespaces_on_path_trigram ON namespaces USING gin(path gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_notes_on_note_trigram ON notes USING gin(note gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_projects_on_name_trigram ON projects USING gin(name gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_projects_on_path_trigram ON projects USING gin(path gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_projects_on_description_trigram ON projects USING gin(description gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_snippets_on_title_trigram ON snippets USING gin(title gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_snippets_on_file_name_trigram ON snippets USING gin(file_name gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_users_on_username_trigram ON users USING gin(username gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_users_on_name_trigram ON users USING gin(name gin_trgm_ops);
CREATE INDEX CONCURRENTLY IF NOT EXISTS index_users_on_email_trigram ON users USING gin(email gin_trgm_ops);
INSERT INTO schema_migrations VALUES (&#x27;20160226114608&#x27;);
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;These commands ensure all indexes are in place and mark the migration as having
finished successfully (so Rails doesn&#x27;t end up trying to run it again).&lt;&#x2F;p&gt;

&lt;h3 id=&quot;deprecation-of-download_url-in-builds-api&quot;&gt;Deprecation of download_url in Builds API&lt;&#x2F;h3&gt;

&lt;p&gt;We removed &lt;code&gt;download_url&lt;&#x2F;code&gt; from the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;builds.html&quot;&gt;Builds API&lt;&#x2F;a&gt;.
Instead we provide &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;builds.html#get-build-artifacts&quot;&gt;an API for downloading artifacts of builds&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt;: We assume you are upgrading from the latest version. If not, then also consult the upgrade barometers of any intermediate versions you are skipping.
If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;EE only features and features such as LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;join-our-webcast-about-86&quot;&gt;Join our webcast about 8.6!&lt;&#x2F;h2&gt;

&lt;p&gt;In our next webcast on Thursday, March 24th, we&#x27;ll take a look at the new features in GitLab 8.6.
Our special guest is Douwe Maan, Development Lead here at GitLab.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Date: Thursday, March 24, 2016&lt;&#x2F;li&gt;
  &lt;li&gt;Time: 5pm (17:00) UTC; 12pm EST; 9am PST&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;page.gitlab.com&#x2F;mar242016-release-webcast.html&quot;&gt;Register here&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Can&#x27;t make it? Register anyway, and we&#x27;ll send you a link to watch later.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_6&#x2F;head.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.8, 8.4.6, 8.3.5, and 8.2.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/21/gitlab-8-dot-5-dot-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/21/gitlab-8-dot-5-dot-8-released/</id>
<published>2016-03-21T14:15:00+00:00</published>
<updated>2016-03-21T14:15:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Last Friday, we released versions 8.5.8, 8.4.6, 8.3.5, and 8.2.4 for GitLab
Community Edition (CE) and Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;These versions raise the minimum required Git version to 2.7.4 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;692&quot;&gt;!692&lt;&#x2F;a&gt;) to
address the recent
&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;03&#x2F;18&#x2F;what-git-vulnerabilities-cve-2016-2324-and-2315-mean-for-gitlab-and-you&#x2F;&quot;&gt;Git vulnerabilities&lt;&#x2F;a&gt;.
The Omnibus packages have been updated to include this new version.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab Geo documentation (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;236&quot;&gt;!236&lt;&#x2F;a&gt;) was also added in 8.5.8.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>What Git vulnerabilities CVE-2016-2324 and 2315 mean for GitLab and you</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/18/what-git-vulnerabilities-cve-2016-2324-and-2315-mean-for-gitlab-and-you/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/18/what-git-vulnerabilities-cve-2016-2324-and-2315-mean-for-gitlab-and-you/</id>
<published>2016-03-18T00:00:00+00:00</published>
<updated>2016-03-18T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer, Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;A few days ago two security vulnerabilities in Git were &lt;a href=&quot;http:&#x2F;&#x2F;www.openwall.com&#x2F;lists&#x2F;oss-security&#x2F;2016&#x2F;03&#x2F;15&#x2F;5&quot;&gt;made
public&lt;&#x2F;a&gt;. In
response, we &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;03&#x2F;16&#x2F;gitlab-8-dot-5-dot-7-released&#x2F;&quot;&gt;released GitLab
8.5.7&lt;&#x2F;a&gt; the
same day.&lt;&#x2F;p&gt;

&lt;p&gt;At the time, there was still some confusion regarding which version of Git
contained all of the security fixes. Yesterday, Git version 2.7.4 was released
with the fixes for all known vulnerabilities.&lt;&#x2F;p&gt;

&lt;p&gt;Due to the potential impact of this vulnerability, we&#x27;ve released new
omnibus-gitlab packages for the past four months&#x27; releases
(8.2, 8.3, 8.4, and 8.5).&lt;&#x2F;p&gt;

&lt;p&gt;In this blog post we will go into more detail about the vulnerabilities and
their impact on GitLab.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;the-problem&quot;&gt;The problem&lt;&#x2F;h2&gt;

&lt;p&gt;An attacker can create a malicious Git repository that causes a &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Heap_overflow&quot;&gt;heap
overflow&lt;&#x2F;a&gt; in &lt;code&gt;git&lt;&#x2F;code&gt; commands
that run on that repository (e.g.,
&lt;code&gt;git clone https:&#x2F;&#x2F;example.com&#x2F;evil-repo.git&lt;&#x2F;code&gt;). At best this causes your
&lt;code&gt;git&lt;&#x2F;code&gt; command to crash; at worst the malicious Git repository
effectively becomes a program that runs on your computer.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability got fixed in Git version 2.7.4.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;general-impact&quot;&gt;General impact&lt;&#x2F;h2&gt;

&lt;p&gt;If you are using a vulnerable version of the Git client and you run the &quot;right&quot;
&lt;code&gt;git&lt;&#x2F;code&gt; command on a malicious repository, an attacker may gain control over your
computer. It also means that if an attacker can upload a malicious repository to
a GitLab server, and if that GitLab server has a vulnerable version of Git
installed, then the attacker could execute arbitrary code on the GitLab server.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact-on-gitlab&quot;&gt;Impact on GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;During various operations GitLab will run &lt;code&gt;git&lt;&#x2F;code&gt; commands on the repositories it
hosts. If your GitLab server uses a vulnerable version of Git and if one of your
users pushed or imported a malicious repository onto your server then attacker
code embedded in the malicious Git repository may be executed on the GitLab
server as the application user.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;what-we-are-doing-about-it&quot;&gt;What we are doing about it&lt;&#x2F;h2&gt;

&lt;p&gt;We have released the new omnibus-gitlab packages for versions going back to
GitLab version 8.2.&lt;&#x2F;p&gt;

&lt;p&gt;The Omnibus packages for GitLab 8.2.4, 8.3.5, 8.4.6 and 8.5.8 contain Git
version 2.7.4.&lt;&#x2F;p&gt;

&lt;p&gt;We understand it&#x27;s not always possible for all of our users to upgrade to the
latest monthly releases. However, we urge you to upgrade to the latest
available version as it contains the latest security fixes for all bundled
software.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;what-you-should-do-about-it&quot;&gt;What you should do about it&lt;&#x2F;h2&gt;

&lt;p&gt;You should make sure that you are using the latest version of Git on
each computer you use Git. Because there are many different ways to
install Git it is difficult to give specific instructions how to this.&lt;&#x2F;p&gt;

&lt;p&gt;If you are an administrator for a GitLab server and you installed GitLab
using our Omnibus packages then you should make sure you are &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;using
GitLab 8.5.8 or newer&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source or through some other means it is
not enough to update to the latest version of GitLab; you should make
sure you are using the latest version of Git for your platform.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed Git from source according to the GitLab installation
guide you can check its version by running:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;usr&#x2F;local&#x2F;bin&#x2F;git --version
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;You should also verify that GitLab is seeing the correct version of Git by
visiting your Administration dashboard and looking under &lt;strong&gt;Components&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.7 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/16/gitlab-8-dot-5-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/16/gitlab-8-dot-5-dot-7-released/</id>
<published>2016-03-16T00:20:00+00:00</published>
<updated>2016-03-16T00:20:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.5.7 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version raises the minimum required Git version to 2.7.3 to address the
recent &lt;a href=&quot;http:&#x2F;&#x2F;seclists.org&#x2F;oss-sec&#x2F;2016&#x2F;q1&#x2F;645&quot;&gt;remote code execution&lt;&#x2F;a&gt;
vulnerability. The Omnibus packages have been updated to include this new
version.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus:&lt;&#x2F;strong&gt; Update Git to 2.7.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;687&quot;&gt;!687&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump Git version requirement to 2.7.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3240&quot;&gt;!3240&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.6 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/15/gitlab-8-dot-5-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/15/gitlab-8-dot-5-dot-6-released/</id>
<published>2016-03-15T16:00:00+00:00</published>
<updated>2016-03-15T16:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.5.6 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes one LDAP fix.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Obtain a lease before querying LDAP (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3181&quot;&gt;!3181&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;details-about-the-ldap-fix&quot;&gt;Details about the LDAP fix&lt;&#x2F;h2&gt;

&lt;p&gt;Before the LDAP fix above it could happen that a single GitLab user triggered
multiple simultaneous LDAP checks due to a race condition. On large LDAP-enabled
GitLab servers, especially with GitLab Enterprise Edition, this could generate
unnecessary load on the GitLab server.&lt;&#x2F;p&gt;

&lt;p&gt;We now use a 10-minute “lease” in Redis to ensure that at most one LDAP check is
started per user during this time interval.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.5 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/10/gitlab-8-dot-5-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/10/gitlab-8-dot-5-dot-5-released/</id>
<published>2016-03-10T17:00:00+00:00</published>
<updated>2016-03-10T17:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.5.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes a new GitLab Geo feature and fixes, several minor EE fixes
as well as fixes for Todos and project lists.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; GitLab Geo: Repository synchronization between primary and secondary nodes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;179&quot;&gt;!179&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Refactor user documentation for GitLab Pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;212&quot;&gt;!212&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix importing projects from GitHub Enterprise Edition (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;219&quot;&gt;!219&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix syntax error in init file (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;223&quot;&gt;!223&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; GitLab Geo: Improve GeoNodes Admin screen (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;251&quot;&gt;!251&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; GitLab Geo: Avoid locking yourself out when adding a GeoNode (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;252&quot;&gt;!252&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Only show group member roles if explicitly requested (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3044&quot;&gt;!3044&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure removing a project removes associated Todo entries (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3141&quot;&gt;!3141&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent a 500 error in Todos when author was removed (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3141&quot;&gt;!3141&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix pagination for filtered dashboard and explore pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3149&quot;&gt;!3149&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &quot;Show all&quot; link behavior on profile page (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3159&quot;&gt;!3159&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Add ldap_sync_time global configuration as the EE is still supporting it (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;679&quot;&gt;!679&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes one minor database migration for CE and two minor
migrations for EE. All the migrations can be run without causing any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/04/gitlab-8-dot-5-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/04/gitlab-8-dot-5-dot-4-released/</id>
<published>2016-03-04T15:00:00+00:00</published>
<updated>2016-03-04T15:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.5.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes one important fix for GitLab Enterprise Edition when
Elasticsearch is enabled, as well as a minor fix for GitLab Community Edition.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix a Notes exposure in Elasticsearch results&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Do not cache requests for badges (including builds badge) (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3086&quot;&gt;!3086&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require 
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/03/gitlab-8-dot-5-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/03/gitlab-8-dot-5-dot-3-released/</id>
<published>2016-03-03T17:00:00+00:00</published>
<updated>2016-03-03T17:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;We are releasing version 8.5.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).
This follows the release of version 8.5.2 earlier today, we try to release fixes as early and often as possible and this is the first time we have two patch releases on the same day.&lt;&#x2F;p&gt;

&lt;p&gt;This version includes one important fix for GitLab Enterprise Edition when
Elasticsearch is enabled, as well as two minor fixes.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Prevent LDAP from downgrading a group&#x27;s last owner (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;216&quot;&gt;!216&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Update &lt;code&gt;gitlab-elastic-search&lt;&#x2F;code&gt; gem to &lt;code&gt;0.0.11&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;234&quot;&gt;!234&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Flush repository caches before renaming projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2974&quot;&gt;!2974&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;gitlab-elastic-search-gem-update&quot;&gt;&lt;code&gt;gitlab-elastic-search&lt;&#x2F;code&gt; gem update&lt;&#x2F;h2&gt;

&lt;p&gt;This patch release updates the &lt;code&gt;gitlab-elastic-search&lt;&#x2F;code&gt; gem to &lt;code&gt;0.0.11&lt;&#x2F;code&gt;. If you
are using Elasticsearch, this will fix an issue where no CI builds where created
for new merge requests.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/03/03/gitlab-8-dot-5-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/03/03/gitlab-8-dot-5-dot-2-released/</id>
<published>2016-03-03T11:00:00+00:00</published>
<updated>2016-03-03T11:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.5.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes many fixes for the Issues sidebar, Todos, Labels, relative URL
installations, and forks list. It also ports a feature from GitLab Enterprise
Edition to GitLab Community Edition, adds documentation for the Todos feature
and updates the required Rails and OpenSSL versions.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Update LDAP groups asynchronously (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;221&quot;&gt;!221&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix an issue when weight text was displayed in Issuable collapsed sidebar (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;222&quot;&gt;!222&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix sidebar overlapping content when screen width was below 1200px (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2620&quot;&gt;!2620&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t repeat labels listed on Labels tab (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2924&quot;&gt;!2924&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bring the &quot;branded appearance&quot; feature from EE to CE (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2927&quot;&gt;!2927&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 when commenting on a commit (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2964&quot;&gt;!2964&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show days remaining instead of elapsed time for Milestone (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2978&quot;&gt;!2978&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix broken icons on installations with relative URL (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2979&quot;&gt;!2979&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix issue where tag list wasn&#x27;t refreshed after deleting a tag (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2986&quot;&gt;!2986&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix import from gitlab.com (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2988&quot;&gt;!2988&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Improve implementation to check read access to forks and add pagination (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2991&quot;&gt;!2991&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t show any &quot;2FA required&quot; message if it&#x27;s not actually required (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3014&quot;&gt;!3014&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix help keyboard shortcut on relative URL setups (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3016&quot;&gt;!3016&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update Rails to 4.2.5.2 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3020&quot;&gt;!3020&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix permissions for deprecated CI build status badge (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3030&quot;&gt;!3030&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Don&#x27;t show &quot;Welcome to GitLab&quot; when the search didn&#x27;t return any projects (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3059&quot;&gt;!3059&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add Todos documentation (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3064&quot;&gt;!3064&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Fix regression where NGINX config for standalone ci was not created (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;659&quot;&gt;!659&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Execute package preinst when starting Docker image (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;663&quot;&gt;!663&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Update openssl to 1.0.2g (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;665&quot;&gt;!665&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Add Redis server password support (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;668&quot;&gt;!668&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;branded-login-page-is-now-part-of-gitlab-community-edition&quot;&gt;Branded login page is now part of GitLab Community Edition&lt;&#x2F;h2&gt;

&lt;p&gt;This patch release &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2927&quot;&gt;ports the branded login page feature&lt;&#x2F;a&gt; from
&lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;a&gt; to
&lt;a href=&quot;&#x2F;features&#x2F;#community&quot;&gt;GitLab Community Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;rails-security-update&quot;&gt;Rails security update&lt;&#x2F;h2&gt;

&lt;p&gt;As soon as &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2016&#x2F;2&#x2F;29&#x2F;Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released&#x2F;&quot;&gt;Rails 4.2.5.2 was announced&lt;&#x2F;a&gt;, we reviewed the two CVEs
it addresses. However, we are confident in the fact that &lt;strong&gt;GitLab is not
affected&lt;&#x2F;strong&gt; by these vulnerabilities.&lt;&#x2F;p&gt;

&lt;p&gt;That being said, we are &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;3020&quot;&gt;upgrading to Rails 4.2.5.2&lt;&#x2F;a&gt; in GitLab 8.5.2 regardless of
that fact.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;openssl-security-update&quot;&gt;OpenSSL security update&lt;&#x2F;h2&gt;

&lt;p&gt;As soon as &lt;a href=&quot;https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-announce&#x2F;2016-March&#x2F;000066.html&quot;&gt;OpenSSL Security Advisory was announced&lt;&#x2F;a&gt;,
we reviewed it. However, we are confident in the fact that &lt;strong&gt;GitLab is not
affected&lt;&#x2F;strong&gt; by these vulnerabilities since &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1154#note_4031640&quot;&gt;we are not using SSLv2 anywhere&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;That being said, we are &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;665&quot;&gt;upgrading to OpenSSL 1.0.2g&lt;&#x2F;a&gt; in GitLab 8.5.2
regardless of that fact.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes one minor database migration which can be run without
causing any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.4.5 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/02/25/gitlab-8-dot-4-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/02/25/gitlab-8-dot-4-dot-5-released/</id>
<published>2016-02-25T00:00:00+00:00</published>
<updated>2016-02-25T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.4.5 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Note that this is a patch for the previous major release (8.4), and not the
latest (8.5). An 8.5.2 patch is expected soon!&lt;&#x2F;p&gt;

&lt;p&gt;This patch contains only one change: LDAP groups will now be updated
asynchronously.&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Update LDAP groups asynchronously (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;190&quot;&gt;!190&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release does not include any migrations, so no downtime should be
necessary.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.5.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/02/24/gitlab-8-dot-5-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/02/24/gitlab-8-dot-5-dot-1-released/</id>
<published>2016-02-24T00:00:00+00:00</published>
<updated>2016-02-24T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.5.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes several fixes for merge requests, todos, as well as many
UI fixes and improvements.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix adding pages domain for a project in a group (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;211&quot;&gt;!211&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix group projects styles (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2714&quot;&gt;!2714&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Show Crowd login tab when sign in is disabled and Crowd is enabled (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2749&quot;&gt;!2749&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix a set of small UI glitches in project, profile, and wiki pages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2758&quot;&gt;!2758&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Restrict permissions on public&#x2F;uploads (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2764&quot;&gt;!2764&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the merge request side-by-side view after loading diff results (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2880&quot;&gt;!2880&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix the look of tooltip for the &quot;Revert&quot; button (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2910&quot;&gt;!2910&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add when the Builds &amp;amp; Runners API changes got introduced (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2912&quot;&gt;!2912&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 on some merged merge requests (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2917&quot;&gt;!2917&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue causing the content of the issuable sidebar to disappear (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2919&quot;&gt;!2919&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error 500 when trying to mark an already done todo as &quot;done&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2926&quot;&gt;!2926&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix an issue where MRs weren&#x27;t sortable (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2935&quot;&gt;!2935&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Issues can now be dragged &amp;amp; dropped into empty milestone lists. This is also possible with MRs (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2935&quot;&gt;!2935&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Changed padding &amp;amp; background color for highlighted notes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2937&quot;&gt;!2937&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Re-add the newrelic_rpm gem which was removed without any deprecation or warning (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2943&quot;&gt;!2943&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update sentry-raven gem to 0.15.6 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2947&quot;&gt;!2947&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Push Raspbian repository for RPI2 to packagecloud (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;655&quot;&gt;!655&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Update GitLab pages daemon to v0.2.0 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;656&quot;&gt;!656&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab:&lt;&#x2F;strong&gt; Unset env variables that could interfere with &lt;code&gt;gitlab-rake&lt;&#x2F;code&gt; and &lt;code&gt;gitlab-rails&lt;&#x2F;code&gt; commands (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;658&quot;&gt;!658&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;re-introduction-of-the-newrelic_rpm-gem&quot;&gt;Re-introduction of the &lt;code&gt;newrelic_rpm&lt;&#x2F;code&gt; gem&lt;&#x2F;h2&gt;

&lt;p&gt;This release re-introduces the &lt;code&gt;newrelic_rpm&lt;&#x2F;code&gt; which was &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;12860&quot;&gt;removed without any
deprecation notice or warning&lt;&#x2F;a&gt;.
We are really sorry about that. Our goal in the long term is to replace the
proprietary NewRelic solution with InfluxDB (MIT License), and Grafana (Apache
2.0 License). We are already using this alternative on GitLab.com and are very
happy with it. That being said, it still
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1008#note_3825813&quot;&gt;needs proper documentation&lt;&#x2F;a&gt;
and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;1008#note_3526963&quot;&gt;built-in dashboards&lt;&#x2F;a&gt;
to be a drop-in replacement for NewRelic.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab&#x27;s fastest release ever: 8.5, with Todos and Geo</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/02/22/gitlab-8-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/02/22/gitlab-8-5-released/</id>
<published>2016-02-22T00:00:00+00:00</published>
<updated>2016-02-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;If there is one GitLab release that you&#x27;ll want to upgrade to as soon as
possible, it&#x27;s this one.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 8.5 is faster. &lt;em&gt;A lot faster&lt;&#x2F;em&gt;. Not only have we increased performance
for everyone, getting to what is important is now super quick with Todos (yes,
&lt;em&gt;all&lt;&#x2F;em&gt; important things for those of you that speak Spanish or Portuguese).&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.5 Enterprise Edition, we&#x27;re also introducing the alpha of
GitLab Geo, which allows you to have a remote replicate of your entire
GitLab instance.&lt;&#x2F;p&gt;

&lt;p&gt;Once again, we received some amazing contributions this release.
One of these is the support for &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;settings&#x2F;configuration.html#configuring-a-relative-url-for-gitlab&quot;&gt;relative URLs in Omnibus installations&lt;&#x2F;a&gt;,
which was one of the many contributions we received from Artem Sidorenko.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Artem Sidorenko and congratulations on being
&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;this month&#x27;s MVP&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;performance-for-scale&quot;&gt;Performance for Scale&lt;&#x2F;h2&gt;

&lt;p&gt;At GitLab, making sure everything runs smoothly with thousands of projects
has always been a priority. But with GitLab 8.5, we&#x27;ve raised the bar for
ourselves.&lt;&#x2F;p&gt;

&lt;p&gt;Average mean performance is up at least 1.4 times, up to 1.6 times for 99th
percentile response times. For slower pages, the response time has been improved
way beyond this.&lt;&#x2F;p&gt;

&lt;p&gt;For instance, displaying individual issues is now up to 3.5 times faster
for very large issues. The graph below shows you the slowest 95th percentile
response times for loading issues on GitLab.com before and after we deployed
the first release candidate of 8.5:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;issue_timings.png&quot; alt=&quot;Response times for single issues in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;And here&#x27;s a graph showing the overall response timings (per 30 minutes) from
10 to 12 February. The vertical arrow indicates the 8.5.0 RC1 deploy on
GitLab.com.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;gitlab_timings.png&quot; alt=&quot;Overall Response times in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;There are many performance improvements that you will notice with 8.5.
Especially if you&#x27;re running a very large server, this release will make
all your users happy.&lt;&#x2F;p&gt;

&lt;p&gt;Some notable performance notes are:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Broadcast messages are cached, reducing the impact they have on page loading
times &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2633&quot;&gt;!2633&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of &lt;code&gt;Repository#empty?&lt;&#x2F;code&gt; and &lt;code&gt;Repository#has_visible_content?&lt;&#x2F;code&gt; has
been improved and their output is cached, reducing project specific page
(issues, project dashboard, etc) loading times by about 3 to 3.5 times. This
was changed in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab_git&#x2F;merge_requests&#x2F;62&quot;&gt;gitlab_git!62&lt;&#x2F;a&gt;
followed by &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2752&quot;&gt;!2752&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Caches for branch commit ahead&#x2F;behind statistics are only flushed when needed.
For example, when pushing to a non default branch only the statistics for
said branch are flushed, whereas previously the statistics for all branches
would be flushed. This was changed in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2769&quot;&gt;!2769&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of retrieving the issues that should be closed by a merge request
has been improved in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2625&quot;&gt;!2625&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of Atom feeds has been greatly improved in
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2613&quot;&gt;!2613&lt;&#x2F;a&gt;,
leading to a reduction of up to roughly 10 seconds per page load
(depending on the amount of events involved)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2859&quot;&gt;!2859&lt;&#x2F;a&gt; changes
the way the Git &lt;code&gt;core.autocrlf&lt;&#x2F;code&gt; option is set. Previously this would be
written (regardless of whether it was already set) on every request. As of
now, this is only set by the web editor&#x2F;API before creating&#x2F;updating files
(as this is the only case where it&#x27;s actually needed).&lt;&#x2F;li&gt;
  &lt;li&gt;&#x27;Raw&#x27; file contents from Git repositories are served by gitlab-workhorse now,
which prevents timeouts.&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab no longer loads large Git blobs (e.g. binary files) into memory when
browsing a Git repository. This prevents timeouts and memory leaks.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;todos&quot;&gt;Todos&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab is where you do your work, so being able to get started quickly is
very important. Therefore, we&#x27;re now introducing Todos.&lt;&#x2F;p&gt;

&lt;p&gt;Todos is a chronological list of to-dos that are waiting for your input.
Whenever you&#x27;re assigned to an issue or merge request
or have someone mention you, a new to-do is created automatically.&lt;&#x2F;p&gt;

&lt;p&gt;Then when you&#x27;ve made a change, like replying to a comment or updating an issue,
the to-do is automatically set to &lt;strong&gt;Done&lt;&#x2F;strong&gt;. You can also manually mark to-dos
as done.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;todos.png&quot; alt=&quot;Todos in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Todos has been designed to be as actionable as possible, so that you can focus
on what is important. Having a personal space to work from has been a long-time
request and we&#x27;re looking forward to your feedback after having given it a go.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-geo-alpha-ee&quot;&gt;GitLab Geo Alpha (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;If you have two or more teams geographically spread out,
but your GitLab instance is in a single location,
fetching large repositories can take a long time.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab Geo, you can have a secondary GitLab instance that mirrors your
main GitLab instance. Your Geo instance can be used for cloning and fetching
projects, in addition to reading any data. This will make working with large
repositories over large distances much faster.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;geo.png&quot; alt=&quot;GitLab Geo available as Alpha in GitLab 8.5 EE&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.5, we&#x27;re offering GitLab Geo as an Alpha to all our Enterprise
Edition customers. Once GitLab Geo has left Alpha &#x2F; Beta state, a special
license will be required to use it.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-pages-now-support-custom-domains-and-custom-tls-certificates-ee&quot;&gt;GitLab Pages now support custom domains and custom TLS certificates (EE)&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages was first introduced in GitLab EE 8.3, giving you the ability to
host your own static website in GitLab under a separate domain name.
&lt;a href=&quot;https:&#x2F;&#x2F;dzaporozhets.gitlab.io&#x2F;&quot;&gt;Dmitriy&#x27;s blog&lt;&#x2F;a&gt; is hosted with it,
for example!&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.5 EE we&#x27;re adding support for custom domains and TLS certificates.
You can even point multiple domains to GitLab and easily upload your own TLS
certificates.&lt;&#x2F;p&gt;

&lt;p&gt;To make it easier to set this all up, GitLab Pages now has its own
settings page in your projects at &lt;strong&gt;Settings &amp;gt; Pages&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;pages_new_area.png&quot; alt=&quot;Pages new area&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can add custom domains and certificates if this
functionality is enabled by your GitLab administrator:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;pages_domain_list.png&quot; alt=&quot;Pages domain list&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The new functionality of GitLab Pages was made possible with the help of a new
HTTP server written in Go. We call
it the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-pages&quot;&gt;GitLab Pages daemon&lt;&#x2F;a&gt; and it supports dynamic certificates
through SNI and exposes pages using HTTP2 by default.&lt;&#x2F;p&gt;

&lt;p&gt;The upgrade path from GitLab 8.3 to 8.5 has changed quite a bit and we added
new comprehensive documentation how GitLab Pages work and the multiple ways to
set them up.&lt;&#x2F;p&gt;

&lt;p&gt;For GitLab.com users: Pages with CNAME and TLS support are fully live and
ready to use!&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;pages&#x2F;README.html&quot;&gt;Learn how to set up your own page in our Gitlab Pages user documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;pages&#x2F;administration.html&quot;&gt;GitLab Pages administration documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;revert-any-commit&quot;&gt;Revert any Commit&lt;&#x2F;h2&gt;

&lt;p&gt;If your motto is &quot;Move fast and break things&quot;, you must be familiar with the
usage of &lt;code&gt;git revert&lt;&#x2F;code&gt;. In GitLab it&#x27;s now much easier to use revert:
just press the button on any commit to create a merge request that reverts
it:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;revert.png&quot; alt=&quot;Revert any commit in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;workflow&#x2F;revert_changes.html&quot;&gt;Read about reverting changes in our documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;updated-issue-sidebar&quot;&gt;Updated Issue Sidebar&lt;&#x2F;h2&gt;

&lt;p&gt;We created the issue sidebar so we could free up the most important content
from other interface elements. With GitLab 8.5 we&#x27;re doing this in a
smarter, prettier, and more accessible way:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;sidebar1.png&quot; alt=&quot;Updated Issue Sidebar in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;To focus on your content, fold it in:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;sidebar2.png&quot; alt=&quot;Updated Issue Sidebar in its folded state in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Besides the sidebar, we&#x27;ve updated many things, big and small, in the interface.
Expect more improvements over the coming releases.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;labels-in-milestone-view&quot;&gt;Labels in Milestone View&lt;&#x2F;h2&gt;

&lt;p&gt;We want to make GitLab the best place to manage your projects,
whether they are
&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;01&#x2F;15&#x2F;making-gitlab-better-for-large-open-source-projects&#x2F;&quot;&gt;open source&lt;&#x2F;a&gt; or not.&lt;&#x2F;p&gt;

&lt;p&gt;To get a better overview of a milestone, we&#x27;re now showing labels in the
milestone view:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;milestone.png&quot; alt=&quot;See labels in Milestones in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;workflow&#x2F;milestones.html&quot;&gt;Read about milestones in our documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;render-svgs-in-diffs&quot;&gt;Render SVGs in Diffs&lt;&#x2F;h2&gt;

&lt;p&gt;As big fans of SVGs ourselves, we made it possible to view rendered SVGs
in diffs:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;svg.png&quot; alt=&quot;Rendered SVG in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;markdown-in-broadcast-messages&quot;&gt;Markdown in Broadcast messages&lt;&#x2F;h2&gt;

&lt;p&gt;When broadcasting important messages to all users on your instance,
it can be useful to include formatting or links. That&#x27;s possible now
with Markdown support for broadcast messages.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;broadcast_md.gif&quot; alt=&quot;Broadcast messages with markdown in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;highlighted-file-renames&quot;&gt;Highlighted File Renames&lt;&#x2F;h2&gt;

&lt;p&gt;Small changes can be great too!
We now highlight file renames in diffs:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;filenames.png&quot; alt=&quot;See differences on file renames in Gitlab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;sort-by-votes&quot;&gt;Sort by Votes&lt;&#x2F;h2&gt;

&lt;p&gt;You can now easily sort issues by votes!
This should make it easier to find popular or important issues.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;votes.png&quot; alt=&quot;Sort by votes in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;erase-build-content-in-ci&quot;&gt;Erase Build Content in CI&lt;&#x2F;h2&gt;

&lt;p&gt;Accidentally exposed some information in your build logs or in a
faulty build artifact in CI? You can now delete artifacts
and build traces from CI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_5&#x2F;erase_builds.png&quot; alt=&quot;Erase builds in GitLab 8.5&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-ci-features-in-api&quot;&gt;New CI features in API&lt;&#x2F;h2&gt;

&lt;p&gt;Every month we strive to expose more and more CI features to our API. With
GitLab 8.5 here&#x27;s what&#x27;s new:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;runners.html&quot;&gt;runners&lt;&#x2F;a&gt; - enable, disable, edit
and see the details of a runner&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;builds.html#get-build-artifacts&quot;&gt;builds artifacts&lt;&#x2F;a&gt; -
download the artifacts&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see all the named changes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;updates-in-the-omnibus-gitlab-package&quot;&gt;Updates in the omnibus-gitlab package&lt;&#x2F;h3&gt;

&lt;p&gt;As GitLab gets improved every release, so does the omnibus-gitlab package.
You can see the changes that package receives for every release in the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;omnibus-gitlab CHANGELOG&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;In this release there are some major changes in the bundled software:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Nginx is updated from version 1.7.12 to 1.9.10&lt;&#x2F;li&gt;
  &lt;li&gt;Nginx spdy protocol was replaced with http2&lt;&#x2F;li&gt;
  &lt;li&gt;OpenSSL is updated from version 1.0.1r to 1.0.2f&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;mattermost-20&quot;&gt;Mattermost 2.0&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;open-source-localizable-slack-alternative-mattermost-2-0&#x2F;&quot;&gt;Mattermost 2.0&lt;&#x2F;a&gt;
ships with GitLab 8.5 and includes localization support,
Spanish-language translation, and API support for GitLab single-sign-on in iOS
and Android apps.&lt;&#x2F;p&gt;

&lt;p&gt;Mattermost can now also skip 1 major build version. This means GitLab Mattermost
upgrades from GitLab 8.3 to 8.5 without needing to upgrade to 8.4.
The new 2.0 iOS app for Mattermost with GitLab SSO requires Mattermost server
2.0 and higher due to a breaking change in mobile API incompatible with
Mattermost 1.x.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;A migration affecting projects having a path ending in &#x27;.atom&#x27; has been added,
as they are no longer supported. This migration updates both the database and
the filesystem and previous versions of this migration have proven to be fragile.&lt;&#x2F;p&gt;

&lt;p&gt;If you have no projects with paths ending in &#x27;.atom&#x27; in your database (most likely, you don&#x27;t)
you can perform this upgrade online. If you do have them, we recommend to take downtime.
You can find the current number of affected database records with the following command:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo gitlab-rails runner &quot;puts Project.where(%q{path LIKE &#x27;%.atom&#x27;}).count&quot;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Note to early adopters: the 8.5.0 release candidates recommended using Ruby 2.2
but we have found
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;13514&quot;&gt;some issues&lt;&#x2F;a&gt;.
We recommend everybody to keep using Ruby 2.1 for now.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;join-us-for-a-live-demo-and-qa&quot;&gt;Join us for a live demo and Q+A&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;page.gitlab.com&#x2F;Feb252016Webcast_LandingPage.html&quot;&gt;Sign up to our webcast&lt;&#x2F;a&gt;.
&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;Jobvo&#x2F;&quot;&gt;Job&lt;&#x2F;a&gt; will give a live walkthrough for GitLab 8.5
and he&#x27;ll talk about GitLab Flow.
It&#x27;s on Thursday, February 25th, 5pm (17:00) UTC; 12pm EST; 9am PST.
Can&#x27;t make that time?
&lt;a href=&quot;http:&#x2F;&#x2F;page.gitlab.com&#x2F;Feb252016Webcast_LandingPage.html&quot;&gt;Register&lt;&#x2F;a&gt; anyway,
and we&#x27;ll send you the recording.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_5&#x2F;header.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.4.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/02/10/gitlab-8-dot-4-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/02/10/gitlab-8-dot-4-dot-4-released/</id>
<published>2016-02-10T00:00:00+00:00</published>
<updated>2016-02-10T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.4.4 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This version includes more fixes for Elasticsearch, a re-introduction of the
&quot;Send email to users&quot; administration link that was mistakenly removed, and
addresses one potential security issue concerning public CI build logs.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update omniauth-saml gem to 1.4.2 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2684&quot;&gt;!2684&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent long-running backup tasks from timing out the database
connection (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2757&quot;&gt;!2757&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add a Project setting to allow guests to view build logs (defaults
to true)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Re-introduce &quot;Send email to users&quot; link in Admin area (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;161&quot;&gt;!161&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix category values for Jenkins and JenkinsDeprecated services (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;163&quot;&gt;!163&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix Elasticsearch indexing for newly added Snippets (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;165&quot;&gt;!165&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Make Elasticsearch indexer more stable (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;167&quot;&gt;!167&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Update gitlab-elasticsearch-git to 0.0.10 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;170&quot;&gt;!170&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;possible-information-leak-via-gitlab-ci-logs&quot;&gt;Possible information leak via GitLab CI logs&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 8.3, we made CI build logs share the visibility level of their parent
project for the sake of simplicity. However, we failed to properly document this
change and some users may have been surprised by previously-hidden build logs
suddenly becoming visible, possibly exposing sensitive information such as
environment variables.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve addressed this in 8.4.4 by adding a project-level setting to allow anyone
(including guests) to access the build logs for a public or internal project.
This setting is enabled by default but can be disabled for additional security.
Build logs in private projects will still be visible only to members of that
project.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;elasticsearch-snippet-indexing&quot;&gt;Elasticsearch Snippet indexing&lt;&#x2F;h2&gt;

&lt;p&gt;If you enabled Elasticsearch indexing prior to this version, Snippets added
since that time may not be properly indexed.&lt;&#x2F;p&gt;

&lt;p&gt;To ensure those Snippets are properly indexed, run one of the following commands:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;&lt;span class=&quot;c&quot;&gt;# For Omnibus installations&lt;&#x2F;span&gt;
&lt;span class=&quot;nb&quot;&gt;sudo &lt;&#x2F;span&gt;gitlab-rails runner &lt;span class=&quot;s2&quot;&gt;&quot;Snippet.import&quot;&lt;&#x2F;span&gt;

&lt;span class=&quot;c&quot;&gt;# For source installations&lt;&#x2F;span&gt;
&lt;span class=&quot;nb&quot;&gt;cd&lt;&#x2F;span&gt; &#x2F;home&#x2F;git&#x2F;gitlab &lt;span class=&quot;o&quot;&gt;&amp;amp;&amp;amp;&lt;&#x2F;span&gt; &lt;span class=&quot;nb&quot;&gt;sudo&lt;&#x2F;span&gt; &lt;span class=&quot;nt&quot;&gt;-u&lt;&#x2F;span&gt; git &lt;span class=&quot;nt&quot;&gt;-H&lt;&#x2F;span&gt; bundle &lt;span class=&quot;nb&quot;&gt;exec &lt;&#x2F;span&gt;rails runner &lt;span class=&quot;s2&quot;&gt;&quot;Snippet.import&quot;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;ruby-saml-update&quot;&gt;&lt;code&gt;ruby-saml&lt;&#x2F;code&gt; update&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes an update to the &lt;code&gt;omniauth-saml&lt;&#x2F;code&gt; gem (which itself
includes an update to the &lt;code&gt;ruby-saml&lt;&#x2F;code&gt; gem) in order to properly allow SAML
responses that did not include an X.509 certificate in the response body; it now
properly fetches the certificate indicated in the settings and uses that one to
validate the response.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release includes one minor database migration which can be run without
causing any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.4.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/02/02/gitlab-8-dot-4-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/02/02/gitlab-8-dot-4-dot-3-released/</id>
<published>2016-02-02T00:00:00+00:00</published>
<updated>2016-02-02T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.4.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This patch release includes fixes for and improvements to Elasticsearch
indexing, more fixes for syntax highlighting in diffs, and a few other minor
fixes.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Increase lfs_objects size column to 8-byte integer to allow files larger
than 2.1GB (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2644&quot;&gt;!2644&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Correctly highlight MR diff when MR has merge conflicts (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2632&quot;&gt;!2632&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix highlighting in blame view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2630&quot;&gt;!2630&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update sentry-raven gem to prevent &quot;Not a git repository&quot; console output
when running certain commands (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2636&quot;&gt;!2636&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add instrumentation to additional Gitlab::Git and Rugged methods for
performance monitoring (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2664&quot;&gt;!2664&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow autosize textareas to also be manually resized (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2653&quot;&gt;!2653&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Elasticsearch: fix partial blob indexing on push (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;149&quot;&gt;!149&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Elasticsearch: added advanced indexer for repositories (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;154&quot;&gt;!154&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &quot;Mirror User&quot; dropdown (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;158&quot;&gt;!158&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus GitLab&lt;&#x2F;strong&gt; Update openssl to 1.0.1r (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;merge_requests&#x2F;621&quot;&gt;!621&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.4.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/01/28/gitlab-8-dot-4-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/01/28/gitlab-8-dot-4-dot-2-released/</id>
<published>2016-01-28T00:00:00+00:00</published>
<updated>2016-01-28T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.4.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;Most importantly, we&#x27;ve removed those ugly borders that accidentally got added
to all of our tables. That alone should be reason to upgrade, but this version
also includes some performance improvements to project pages and to
Elasticsearch indexing, and squashes a few bugs, including one that was
preventing LDAP users with 2FA enabled from logging in, which we think is an
important feature.&lt;&#x2F;p&gt;

&lt;p&gt;Read on for all the details!&lt;&#x2F;p&gt;



&lt;p&gt;It includes the following changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump required gitlab-workhorse version to bring in a fix for
missing artifacts in the build artifacts browser (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2616&quot;&gt;!2616&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Get rid of those ugly borders on the file tree view (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2615&quot;&gt;!2615&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix updating the runner information when asking for builds
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2618&quot;&gt;!2618&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump gitlab_git version to 7.2.24 in order to bring in a
performance improvement when checking if a repository was empty (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2535&quot;&gt;!2535&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add instrumentation for Gitlab::Git::Repository instance methods so
we can track them in Performance Monitoring. (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2528&quot;&gt;!2528&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Increase contrast between highlighted code comments and inline diff
marker (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2629&quot;&gt;!2629&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix method undefined when using external commit status in builds
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2576&quot;&gt;!2576&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Elasticsearch indexer performance improvements (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;140&quot;&gt;!140&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Don&#x27;t redirect away from Mirror Repository settings when repo is empty
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;135&quot;&gt;!135&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix updating of branches in mirrored repository (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;136&quot;&gt;!136&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix a 500 error preventing LDAP users with 2FA enabled from logging in
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;146&quot;&gt;!146&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Rake task gitlab:elastic:index_repositories handles errors and shows
progress (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;143&quot;&gt;!143&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Partial Elasticsearch indexing of repo on push (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;142&quot;&gt;!142&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;elasticsearch-re-indexing&quot;&gt;Elasticsearch re-indexing&lt;&#x2F;h2&gt;

&lt;p&gt;If you have already enabled Elasticsearch in your Enterprise Edition, you will
have to rebuild the indexes of the Git repositories to benefit from the new
indexer function. The new indexer works 8 times faster than in GitLab versions
8.4.0 and 8.4.1, and the indexes will be much smaller.&lt;&#x2F;p&gt;

&lt;p&gt;In case your repositories are very large, you might want to check the
documentation on &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html#indexing-large-repositories&quot; title=&quot;Elasticsearch - Indexing large repositories&quot;&gt;Indexing large repositories&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;First, remove the indexes from Elasticsearch:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;curl &lt;span class=&quot;nt&quot;&gt;-X&lt;&#x2F;span&gt; DELETE &lt;span class=&quot;s1&quot;&gt;&#x27;http:&#x2F;&#x2F;localhost:9200&#x2F;repository-index-development,projectwiki-index-development&#x2F;&#x27;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
    &lt;p&gt;The above request should return &lt;code&gt;{&quot;acknowledged&quot;:true}&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;And then build the new ones:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;&lt;span class=&quot;c&quot;&gt;# Omnibus installations&lt;&#x2F;span&gt;
gitlab-rake gitlab:elastic:index_repositories
gitlab-rake gitlab:elastic:index_wikis

&lt;span class=&quot;c&quot;&gt;# Installations from source&lt;&#x2F;span&gt;
bundle &lt;span class=&quot;nb&quot;&gt;exec &lt;&#x2F;span&gt;rake gitlab:elastic:index_repositories &lt;span class=&quot;nv&quot;&gt;RAILS_ENV&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt;production
bundle &lt;span class=&quot;nb&quot;&gt;exec &lt;&#x2F;span&gt;rake gitlab:elastic:index_wikis &lt;span class=&quot;nv&quot;&gt;RAILS_ENV&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt;production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.4.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/01/26/gitlab-8-dot-4-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/01/26/gitlab-8-dot-4-dot-1-released/</id>
<published>2016-01-26T00:00:00+00:00</published>
<updated>2016-01-26T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.4.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;This update includes several security fixes for gem dependencies, &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2016&#x2F;1&#x2F;25&#x2F;Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released&#x2F;&quot;&gt;including
Rails itself&lt;&#x2F;a&gt;, and is a recommended upgrade for all installations.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Apply security updates for Rails (4.2.5.1), rails-html-sanitizer (1.0.3),
and Nokogiri (1.6.7.2) (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2603&quot;&gt;!2603&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix redirect loop during import (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2606&quot;&gt;!2606&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix diff highlighting for all syntax themes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2530&quot;&gt;!2530&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2563&quot;&gt;!2563&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2594&quot;&gt;!2594&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security advisory for multiple Rails vulnerabilities</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/01/26/security-advisory-for-multiple-rails-vulnerabilities/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/01/26/security-advisory-for-multiple-rails-vulnerabilities/</id>
<published>2016-01-26T00:00:00+00:00</published>
<updated>2016-01-26T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski and Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;GitLab is built using the Ruby on Rails framework.
The team behind Ruby on Rails has &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2016&#x2F;1&#x2F;25&#x2F;Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released&#x2F;&quot;&gt;recently announced 9 possible security vulnerabilities&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This means that some of these Rails vulnerabilities could potentially
be exploitable in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We have &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;01&#x2F;26&#x2F;gitlab-8-dot-4-dot-1-released&#x2F;&quot;&gt;released GitLab 8.4.1&lt;&#x2F;a&gt; to address these
vulnerabilities.&lt;&#x2F;p&gt;

&lt;p&gt;Update: we have amended this blog post with more detailed information
about the impact on GitLab.&lt;&#x2F;p&gt;



&lt;p&gt;None of yesterday&#x27;s Rails vulnerabilities has been confirmed to affect any
version of GitLab. However, due to the large number of Rails vulnerabilities and
the large number of GitLab versions that could theoretically be affected
it is hard for us to say anything definitive.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;The simplest and safest thing to do is to upgrade to GitLab 8.4.1 or newer.&lt;&#x2F;strong&gt; In
that version we are using a version of Rails 4.2 which is patched
against all of the Rails vulnerabilities announced yesterday.&lt;&#x2F;p&gt;

&lt;p&gt;It is hypothetically possible that CVE-2016-0752 affects some version of
GitLab prior to 8.4.1. If this is the case it could be bad because
CVE-2016-0752 has the potential to be used for remote code execution.
However we have been unable to find signs that any version of GitLab is
affected by this vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;There are also three &lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cross-site_scripting&quot;&gt;XSS
vulnerabilities&lt;&#x2F;a&gt; in
the yesterday&#x27;s set. We do not seem to be affected by them but it is not
impossible. Generally speaking, the older your GitLab version, the more
likely it has some (known) XSS vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;Below we will go into some more detail of the possible impact of
yesterday&#x27;s Rails vulnerabilities on GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Because a code execution vulnerability, if present, is very severe, we
advise you to upgrade to 8.4.1 to prevent possible issues.&lt;&#x2F;p&gt;

&lt;p&gt;If you are an Enterprise Edition subscriber, please contact support with any questions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact-on-gitlab&quot;&gt;Impact on GitLab&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;cve-2015-7576-timing-attack-vulnerability-in-basic-authentication-in-action-controller&quot;&gt;CVE-2015-7576 Timing attack vulnerability in basic authentication in Action Controller&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab does not use the HTTP Basic Authentication implementation from
Action Controller. In addition we have had rate limiting on HTTP Basic
endpoints since GitLab 7.6.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2016-0751-cve-2015-7581-denial-of-service&quot;&gt;CVE-2016-0751, CVE-2015-7581 Denial of service&lt;&#x2F;h3&gt;

&lt;p&gt;Both of these denial of service vulnerabilities involve memory
exhaustion. Because GitLab has been using
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;operations&#x2F;unicorn.html#unicorn-worker-killer&quot;&gt;unicorn-worker-killer&lt;&#x2F;a&gt;
since GitLab 6.4 it is unlikely that these vulnerabilities can be
exploited against GitLab. Note that the same may not be true if you use
GitLab with a custom Ruby web server such as Puma or Passenger.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2015-7578-cve-2015-7579-cve-2015-7580-xss-vulnerabilities&quot;&gt;CVE-2015-7578, CVE-2015-7579, CVE-2015-7580 XSS vulnerabilities&lt;&#x2F;h3&gt;

&lt;p&gt;It is hard to tell if GitLab is vulnerable to any of these. From the
&lt;a href=&quot;&#x2F;security&#x2F;vulnerability-acknowledgements&#x2F;&quot;&gt;vulnerability
disclosures&lt;&#x2F;a&gt;
we receive we do know that we have been and continue to be probed for
XSS a lot.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2015-7577-nested-attributes-rejection-proc-bypass-in-active-record&quot;&gt;CVE-2015-7577 Nested attributes rejection proc bypass in Active Record&lt;&#x2F;h3&gt;

&lt;p&gt;This vulnerability needs a special &lt;code&gt;allow_destroy: false&lt;&#x2F;code&gt; setting which
was not shipped in any existing GitLab version. In other words
it does not affect GitLab.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2016-0753-possible-input-validation-circumvention-in-active-model&quot;&gt;CVE-2016-0753 Possible Input Validation Circumvention in Active Model&lt;&#x2F;h3&gt;

&lt;p&gt;This vulnerability only affects Rails 4 and newer, and the &#x27;Strong
Parameters&#x27; paradigm introduced in Rails 4 counteracts it. GitLab uses
Rails 4 since version 7.1.0. None of the GitLab versions released since
7.1.0 use the ActiveRecord &lt;code&gt;permit!&lt;&#x2F;code&gt; method in an unsafe way. It is very
unlikely that any released version of GitLab is affected by this
vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;cve-2016-0752-possible-information-leak-vulnerability-in-action-view&quot;&gt;CVE-2016-0752 Possible Information Leak Vulnerability in Action View&lt;&#x2F;h3&gt;

&lt;p&gt;This vulnerability, when present, lets an attacker load an arbitrary file
on disk to be interpreted by Rails as a template. Combined with user
uploads (which GitLab offers) this creates the potential for remote code
execution.&lt;&#x2F;p&gt;

&lt;p&gt;It is hard to search for this vulnerability in source code because
untrusted input may be assigned to a variable in one place, with the
variable being passed to &lt;code&gt;render&lt;&#x2F;code&gt; in another place. We have not found
occurrences of unsafely passing a value &lt;em&gt;directly&lt;&#x2F;em&gt; from &lt;code&gt;params&lt;&#x2F;code&gt;
to &lt;code&gt;render&lt;&#x2F;code&gt; in any released version of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;It is unlikely that any released version of GitLab is affected by this
vulnerability.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab&#x27;s 50th Release: 8.4</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/01/22/gitlab-8-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/01/22/gitlab-8-4-released/</id>
<published>2016-01-22T00:00:00+00:00</published>
<updated>2016-01-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;What better way to kick off a new year than with the 50th release of GitLab,
8.4!&lt;&#x2F;p&gt;

&lt;p&gt;No matter how you use GitLab, you&#x27;re going to like this release.
Your diffs will look better than ever, you can browse through your
build artifacts in CI and search has been super powered with Elasticsearch
in EE!&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re extremely happy to receive some amazing contributions this release.
Kyungchul Shin contributed a fuzzy file finder to GitLab this release,
a much requested and truly MVP-worthy contribution.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Kyungchul Shin and congratulations on being
&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;this month&#x27;s MVP&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;



&lt;div style=&quot;width: 112px; margin: 0 auto;&quot;&gt;
  &lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;loading_tanuki2.gif&quot; alt=&quot;GitLab&#x27;s Tanuki is loading&quot; &#x2F;&gt;
&lt;&#x2F;div&gt;

&lt;h2 id=&quot;super-powered-search-with-elasticsearch-ee-only&quot;&gt;Super-powered Search with Elasticsearch (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;If you have a lot of data, searching through everything in GitLab can
require a lot of number crunching, which can take a while.
Search is the last thing you want to wait for, which is why GitLab can now
leverage &lt;a href=&quot;https:&#x2F;&#x2F;www.elastic.co&#x2F;elasticsearch&quot;&gt;Elasticsearch&lt;&#x2F;a&gt;
to speed up those searches!&lt;&#x2F;p&gt;

&lt;p&gt;Elasticsearch is a flexible, scalable and powerful search service that lives
on its own server(s). Connecting it to GitLab is
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html&quot; title=&quot;Elasticsearch documentation for GitLab 8.4 and up&quot;&gt;easy as pie&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Just like good-old search, Elasticsearch will search through your
issues, merge requests, milestones, comments, projects, repositories,
snippets and wikis.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;elasticsearch.html&quot; title=&quot;Elasticsearch documentation for GitLab 8.4 and up&quot;&gt;Read about setting up Elasticsearch in our documentation&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;artifacts-browser&quot;&gt;Artifacts browser&lt;&#x2F;h2&gt;

&lt;p&gt;Since &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;11&#x2F;22&#x2F;gitlab-8-2-released&#x2F;&quot;&gt;GitLab 8.2&lt;&#x2F;a&gt;,
you&#x27;ve been able to have CI output artifacts, which you could then
download as a single compressed file containing all artifacts of a build.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;artifacts_browser.jpg&quot; alt=&quot;Build artifacts browser in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.4, you can now browse all your artifacts directly in GitLab&#x27;s
interface and download files individually. GitLab does not extract the entire
compressed file when viewing and when downloading, it&#x27;ll only extract the
requested file. This can save you a lot of storage space and makes it much
easier to work with large files or large volumes of artifacts, as you don&#x27;t need
to download everything to get a single file.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;build_artifacts&#x2F;README.html&quot;&gt;Read the documentation on build artifacts browser&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;improved-github-importer&quot;&gt;Improved GitHub Importer&lt;&#x2F;h2&gt;

&lt;p&gt;Want to move your projects from GitHub?
GitLab now imports your repositories, wikis, issues and pull requests from
GitHub!&lt;&#x2F;p&gt;

&lt;p&gt;On the new project page &lt;code&gt;&#x2F;projects&#x2F;new&lt;&#x2F;code&gt;, simply click on the GitHub link
and click to import any or all projects. GitLab will automatically take care
of the rest.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;workflow&#x2F;importing&#x2F;import_projects_from_github.html&quot;&gt;Read the documentation on the GitHub importer&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;fuzzy-file-finder&quot;&gt;Fuzzy File Finder&lt;&#x2F;h2&gt;

&lt;p&gt;The new Fuzzy File Finder lets you quickly navigate to a file by name
in the current repository without having to reach for the mouse!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;fuzzy_file_finder.gif&quot; alt=&quot;Find files easily with GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can quickly access the Fuzzy File Finder by pressing &lt;code&gt;t&lt;&#x2F;code&gt; anywhere
in a project.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;For more shortcuts, press &lt;code&gt;?&lt;&#x2F;code&gt; anywhere in GitLab!&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;workflow&#x2F;file_finder.html&quot;&gt;Read the documentation on the File finder&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;code-highlighting-in-diffs&quot;&gt;Code highlighting in Diffs&lt;&#x2F;h2&gt;

&lt;p&gt;Diffs in GitLab now have highlighted syntax!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;diff_highlighting.jpg&quot; alt=&quot;Diffs are now highlighted in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;diff_highlighting_2.jpg&quot; alt=&quot;Diffs are now highlighted in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unsubscribe-from-threads-in-email&quot;&gt;Unsubscribe from Threads in Email&lt;&#x2F;h2&gt;

&lt;p&gt;If you&#x27;re getting notifications from issues or merge requests you&#x27;re no
longer interested in, there is now a quick link in every email to
unsubscribe from that thread.&lt;&#x2F;p&gt;

&lt;div style=&quot;width: 400px; margin: 0 auto;&quot;&gt;
  &lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;unsub.jpg&quot; alt=&quot;Quickly unsubscribe from a thread in GitLab 8.4&quot; style=&quot;max-width: 400px&quot; &#x2F;&gt;
&lt;&#x2F;div&gt;

&lt;p&gt;The link doesn&#x27;t require you to sign in, so you can easily use it from your
phone, watch, or VR headset.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-links-in-other-apps-slack-unfurls&quot;&gt;Better links in other apps (Slack unfurls!)&lt;&#x2F;h2&gt;

&lt;p&gt;When pasting a GitLab link in Slack, Twitter or Facebook,
it now automagically becomes a little bit prettier and informative
by making use of the Open Graph standard.&lt;&#x2F;p&gt;

&lt;p&gt;For instance, if you post a GitLab link in Slack, you now get some
extra information about the issue or merge request:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;unfurl.png&quot; alt=&quot;Slack unfurls in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re looking forward to seeing pretty GitLab links all over the internet!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cas-support&quot;&gt;CAS Support&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab user &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;tduehr&quot;&gt;tduehr&lt;&#x2F;a&gt; contributed
&lt;a href=&quot;https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Central_Authentication_Service&quot;&gt;CAS support&lt;&#x2F;a&gt;
for GitLab, allowing you to use your CAS single sign-on server to sign
into GitLab.
Thanks, tduehr!&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;integration&#x2F;cas.html&quot;&gt;Read the documentation on using CAS with GitLab&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;performance-monitoring&quot;&gt;Performance Monitoring&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve said in
&lt;a href=&quot;&#x2F;blog&#x2F;2016&#x2F;01&#x2F;15&#x2F;making-gitlab-better-for-large-open-source-projects&#x2F;&quot;&gt;multiple&lt;&#x2F;a&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10923379&quot;&gt;places&lt;&#x2F;a&gt; that improving
performance of GitLab.com is a big priority for us.
To give us more insights into this,
we&#x27;ve built performance monitoring into GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab can now send performance data to an InfluxDB database, which in turn
can be connected to graphing software such as Grafana (shown below).&lt;&#x2F;p&gt;

&lt;p&gt;Data gathered by Performance Monitoring includes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;The time it took to complete a transaction (a web request or Sidekiq job).&lt;&#x2F;li&gt;
  &lt;li&gt;The time spent in running SQL queries and rendering HAML views.&lt;&#x2F;li&gt;
  &lt;li&gt;The time spent executing Ruby methods.&lt;&#x2F;li&gt;
  &lt;li&gt;Ruby objects that have not yet been released by the garbage collector.&lt;&#x2F;li&gt;
  &lt;li&gt;System statistics such as the process&#x27; memory usage and open file descriptors.&lt;&#x2F;li&gt;
  &lt;li&gt;Ruby garbage collection statistics.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;perf_1.png&quot; alt=&quot;Using Grafana to plot GitLab Performance Monitoring data&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;perf_2.png&quot; alt=&quot;Using Grafana to plot GitLab Performance Monitoring data&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Right now Performance Monitoring still requires some setup to be
useful, but we&#x27;re planning to bundle all the required software with
our EE Omnibus packages in the coming releases.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;monitoring&#x2F;performance&#x2F;introduction.html&quot;&gt;View the documentation on GitLab Performance Monitoring&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;filter-commit-messages&quot;&gt;Filter Commit Messages&lt;&#x2F;h2&gt;

&lt;p&gt;Want to quickly find a specific commit in the list of commits?
You can now quickly filter them by commit message, using the input on
top!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;commit_filter.gif&quot; alt=&quot;Filter commits in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Find the commit filter on the commits page of any of your projects.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;emoji-picker-improvements&quot;&gt;Emoji Picker Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;Now you can quickly search all available emoji!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;emoji_picker.gif&quot; alt=&quot;Search and find your favorite Emoji quickly in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The new Emoji picker also stores your favorite Emoji and is available
in any issue and merge request.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;design-updates&quot;&gt;Design Updates&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading the looks and usability of GitLab is very important to us.
GitLab 8.4 introduces several design changes that will be built upon in
future releases.&lt;&#x2F;p&gt;

&lt;p&gt;Groups now look cleaner:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;design_group.png&quot; alt=&quot;Upgraded Group page for GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;And issues are also easier on the eyes, especially if you&#x27;re using a smaller
window:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_4&#x2F;design_issue.png&quot; alt=&quot;Renewed issue design in GitLab 8.4&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re working hard to improve the design of GitLab and put more emphasis
on content, while making everything easier to use. We&#x27;d love to get your
feedback on the latest changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-ci-features-in-api&quot;&gt;New CI features in API&lt;&#x2F;h2&gt;

&lt;p&gt;The build artifacts browser is not the only enhancement in GitLab CI. With
GitLab 8.4 we are introducing new CI features in our API:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;builds.html&quot; title=&quot;Builds API documentation&quot;&gt;builds&lt;&#x2F;a&gt; - list, cancel or retry any build in your project&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;build_triggers.html&quot; title=&quot;Build triggers API documentation&quot;&gt;build triggers&lt;&#x2F;a&gt; - manage your project&#x27;s &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;triggers&#x2F;README.html&quot; title=&quot;Triggers documentation&quot;&gt;triggers&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;build_variables.html&quot; title=&quot;Build variables API documentation&quot;&gt;build variables&lt;&#x2F;a&gt; - manage your project&#x27;s variables&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;Some other notable changes include:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Do some housekeeping and use &lt;code&gt;git gc&lt;&#x2F;code&gt; on your projects &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;administration&#x2F;housekeeping.html&quot; title=&quot;Housekeeping documentation&quot;&gt;right from your browser&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;security&#x2F;two_factor_authentication.html&quot; title=&quot;Two-factor authentication security documentation&quot;&gt;Enforce Two-factor authentication&lt;&#x2F;a&gt; for all users on your GitLab
instance&lt;&#x2F;li&gt;
  &lt;li&gt;Sign-in using your &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;integration&#x2F;azure.html&quot; title=&quot;Microsoft Azure integration documentation&quot;&gt;Microsoft Azure account&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;This release has many more improvements. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;8-4-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt;
to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;downtime-required&quot;&gt;Downtime required&lt;&#x2F;h3&gt;

&lt;p&gt;This upgrade &lt;strong&gt;requires downtime&lt;&#x2F;strong&gt; as it brings a couple of migrations that are
updating a large set of records.&lt;&#x2F;p&gt;

&lt;p&gt;Most notably, the update iterates through all services, updating default values.
For instances that have LDAP enabled, it iterates through the whole user base
to update LDAP email settings.&lt;&#x2F;p&gt;

&lt;p&gt;On GitLab.com these migrations took around 5 minutes to complete. Do note that
GitLab.com doesn&#x27;t have LDAP enabled so on instances that do have it enabled,
migration will take longer.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upgrading-from-7x-or-prior&quot;&gt;Upgrading from 7.x or prior?&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled,
you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;default-upgrade-behavior&quot;&gt;Default upgrade behavior&lt;&#x2F;h3&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;join-us-for-a-live-q--a&quot;&gt;Join us for a live Q &amp;amp; A&lt;&#x2F;h2&gt;

&lt;p&gt;If you&#x27;d like to find out more about GitLab 8.4, &lt;a href=&quot;http:&#x2F;&#x2F;page.gitlab.com&#x2F;Jan282016Webcast.html&quot; title=&quot;Webcast: 8.4 Feature Walk-through&quot;&gt;sign up to the webcast&lt;&#x2F;a&gt;.
We&#x27;ll give a live walk-through for this release and talk about what&#x27;s coming up
next for GitLab. It&#x27;s on Thursday, January 28, 5pm (17:00) UTC; 12pm EST; 9am PST.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_4&#x2F;building_gitlab.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.3.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/01/12/gitlab-8-dot-3-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/01/12/gitlab-8-dot-3-4-released/</id>
<published>2016-01-12T00:00:00+00:00</published>
<updated>2016-01-12T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;&lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;01&#x2F;11&#x2F;gitlab-8-dot-3-dot-3-released&#x2F;&quot;&gt;GitLab 8.3.3&lt;&#x2F;a&gt; depends on
gitlab-workhorse 0.5.3 which has an &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;issues&#x2F;14&quot;&gt;API routing
bug&lt;&#x2F;a&gt;. We have
just released GitLab 8.3.4 and gitlab-workhorse 0.5.4 to fix the routing
bug.&lt;&#x2F;p&gt;



&lt;p&gt;If you are running GitLab 8.3.3 you should upgrade to 8.3.4. If you are
still using an earlier version of GitLab then you should skip version
8.3.3.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require
any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run
migrations, and start again, no matter how “big” or “small” the upgrade
is. This behavior can be changed by adding a
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-gitlab-workhorse&quot;&gt;Update gitlab-workhorse&lt;&#x2F;h3&gt;

&lt;p&gt;This version requires gitlab-workhorse version 0.5.4. Omnibus
installations will automatically have the latest version; installations
from source should follow the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;8-3-stable&#x2F;doc&#x2F;update&#x2F;8.2-to-8.3.md#5-update-gitlab-workhorse&quot;&gt;update
guide&lt;&#x2F;a&gt;
to ensure the required version is used.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features
exclusive to EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;. No time to upgrade
GitLab yourself? Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.3.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2016/01/11/gitlab-8-dot-3-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2016/01/11/gitlab-8-dot-3-dot-3-released/</id>
<published>2016-01-11T00:00:00+00:00</published>
<updated>2016-01-11T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Warning&lt;&#x2F;strong&gt; (2016-01-12 13:25 UTC)&lt;&#x2F;em&gt;: Do not upgrade to GitLab 8.3.3 at this time.
GitLab 8.3.3 ships with gitlab-workhorse 0.5.3, which contains an &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-workhorse&#x2F;issues&#x2F;14&quot;&gt;API routing bug&lt;&#x2F;a&gt;.
GitLab 8.3.4 &lt;a href=&quot;&#x2F;releases&#x2F;2016&#x2F;01&#x2F;12&#x2F;gitlab-8-dot-3-4-released&#x2F;&quot;&gt;has been released&lt;&#x2F;a&gt;
to correct the issue.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;Today we are releasing version 8.3.3 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Preserve CE behavior with JIRA integration by only calling API if
URL is set (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2341&quot;&gt;#2341&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix duplicated branch creation&#x2F;deletion events when using Web UI
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2343&quot;&gt;#2343&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add configurable LDAP server query timeout (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2267&quot;&gt;#2267&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Get &quot;Merge when build succeeds&quot; to work when commits were pushed to
MR target branch while builds were running (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2304&quot;&gt;#2304&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Suppress e-mails on failed builds if allow_failure is set (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2178&quot;&gt;#2178&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix project transfer e-mail sending incorrect paths in e-mail
notification (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2235&quot;&gt;#2235&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Enable &quot;Add key&quot; button when user fills in a proper key (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2208&quot;&gt;#2208&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Better support for referencing and closing issues in Asana service
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2111&quot;&gt;#2111&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix error in processing reply-by-email messages (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2288&quot;&gt;#2288&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 when visiting build page of project with nil
&lt;code&gt;runners_token&lt;&#x2F;code&gt; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2294&quot;&gt;#2294&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Use WOFF versions of SourceSansPro fonts (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2357&quot;&gt;#2357&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix regression when builds were not generated for tags created
through web&#x2F;api interface (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2366&quot;&gt;#2366&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Bump gitlab-workhorse to 0.5.3 (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2367&quot;&gt;#2367&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix undefined method call in Jenkins integration service (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;106&quot;&gt;#106&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-gitlab-workhorse&quot;&gt;Update gitlab-workhorse&lt;&#x2F;h3&gt;

&lt;p&gt;This version requires gitlab-workhorse version 0.5.3. Omnibus installations will
automatically have the latest version; installations from source should follow
the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;8-3-stable&#x2F;doc&#x2F;update&#x2F;8.2-to-8.3.md#5-update-gitlab-workhorse&quot;&gt;update guide&lt;&#x2F;a&gt;
to ensure the required version is used.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-asana-tokens&quot;&gt;Update Asana Tokens&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;asana.com&#x2F;developers&#x2F;feed&#x2F;api-key-deprecation&quot;&gt;Asana API Keys have been deprecated&lt;&#x2F;a&gt;
in favor of Personal Access Tokens and OAuth. You can create a personal access
token for GitLab on &lt;a href=&quot;https:&#x2F;&#x2F;app.asana.com&#x2F;-&#x2F;account_api&quot;&gt;the Apps tab of your profile settings&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Once you have a token, you can update all projects via the console:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;no&quot;&gt;AsanaService&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;all&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;each&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;{&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;|&lt;&#x2F;span&gt;&lt;span class=&quot;n&quot;&gt;s&lt;&#x2F;span&gt;&lt;span class=&quot;o&quot;&gt;|&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;s&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;api_key&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;[PERSONAL_ACCESS_TOKEN]&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;;&lt;&#x2F;span&gt; &lt;span class=&quot;n&quot;&gt;s&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;.&lt;&#x2F;span&gt;&lt;span class=&quot;nf&quot;&gt;save&lt;&#x2F;span&gt; &lt;span class=&quot;p&quot;&gt;}&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2111&quot;&gt;#2111&lt;&#x2F;a&gt; for more details on this change.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.3.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/12/29/gitlab-8-dot-3-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/12/29/gitlab-8-dot-3-dot-2-released/</id>
<published>2015-12-29T00:00:00+00:00</published>
<updated>2015-12-29T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.3.2 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add support for Google reCAPTCHA in user registration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2216&quot;&gt;#2216&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2231&quot;&gt;#2231&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Disable &lt;code&gt;--follow&lt;&#x2F;code&gt; in &lt;code&gt;git log&lt;&#x2F;code&gt; to avoid loading duplicate commit
data during infinite scroll (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2210&quot;&gt;#2210&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.3.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/12/28/gitlab-8-dot-3-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/12/28/gitlab-8-dot-3-dot-1-released/</id>
<published>2015-12-28T00:00:00+00:00</published>
<updated>2015-12-28T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.3.1 for GitLab Community Edition (CE) and
Enterprise Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 when global milestones have slashes (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2182&quot;&gt;#2182&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 when doing a search in dashboard before visiting any
project (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2110&quot;&gt;#2110&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix LDAP identity and user retrieval when special characters are used (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2176&quot;&gt;#2176&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Move Sidekiq-cron configuration to gitlab.yml (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2087&quot;&gt;#2087&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;78&quot;&gt;#78&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent a possible XSS attack in reference filters (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2209&quot;&gt;#2209&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; &quot;Group Statistics&quot; renamed to &quot;Contribution Analytics&quot; (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;merge_requests&#x2F;96&quot;&gt;#96&lt;&#x2F;a&gt;)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition? Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself? Subscribers receive upgrade and installation
services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.3 released with Auto-merge and GitLab Pages</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/12/22/gitlab-8-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/12/22/gitlab-8-3-released/</id>
<published>2015-12-22T00:00:00+00:00</published>
<updated>2015-12-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;re closing this fantastic year for GitLab with its 49th consecutive monthly
release, GitLab 8.3.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re very grateful for all the people that have contributed to this release.
You can now merge automatically after a build has passed, we&#x27;re introducing
GitLab Pages for Enterprise Edition, and issues have new powers in both CE and
EE!&lt;&#x2F;p&gt;

&lt;p&gt;Once again we&#x27;ve received some amazing contributions from our volunteers. This
month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Greg
Smethells. Greg made the proposal for and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1991&quot;&gt;subsequently implemented&lt;&#x2F;a&gt;
the new references in issues and merge requests. He communicated his every move
and worked together closely with many other people from the community.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks, Greg!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-pages-ee-only&quot;&gt;GitLab Pages (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Pages allows you to host a static website on your GitLab instance,
that is automatically deployed and updated, all from a normal GitLab project.&lt;&#x2F;p&gt;

&lt;p&gt;With &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;11&#x2F;22&#x2F;gitlab-8-2-released&#x2F;&quot;&gt;the last release of GitLab&lt;&#x2F;a&gt;
we shipped Build Artifacts for CI.
This means that your builds can have some sort of output.
We leveraged this to build GitLab Pages.&lt;&#x2F;p&gt;

&lt;p&gt;So if you have an open source project that you want to give a proper website,
you can now do it straight from your repository.&lt;&#x2F;p&gt;

&lt;p&gt;Have documentation that you want to feature nicely? Use pages to create a
clean experience for your users.&lt;&#x2F;p&gt;

&lt;p&gt;As GitLab.com runs GitLab Enterprise Edition, you can now use that for your
static sites for free. Your projects will be served on &lt;code&gt;namespace.gitlab.io&#x2F;project_name&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We plan to add CNAME and SSL support
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;134&quot;&gt;in an upcoming GitLab release&lt;&#x2F;a&gt;.
Right now, if you want to use SSL, you need a wildcard certificate for your
domain.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;pages&#x2F;README.html&quot;&gt;See the documentation for GitLab Pages&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you encounter any problems or have any feature proposals, please open an
issue in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&quot;&gt;EE issue tracker&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;auto-merge-on-build-success&quot;&gt;Auto-merge on Build Success&lt;&#x2F;h2&gt;

&lt;p&gt;If you&#x27;ve reviewed a merge request, but the CI builds are still running,
it can be annoying to have to wait for them to finish.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_3&#x2F;merge_on_pass.jpg&quot; alt=&quot;Merge on Build Success in GitLab 8.3&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;By default, we will now show you a button that will merge the MR when
the build succeeds. Less waiting, more reviewing!&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;zjvandeweg&quot;&gt;Zeger-Jan van de Weg&lt;&#x2F;a&gt; for
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1729&quot;&gt;his contribution&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;user&#x2F;project&#x2F;merge_requests&#x2F;auto_merge.html&quot;&gt;See the documentation on Auto-merge&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;contribution-analytics-ee-only&quot;&gt;Contribution Analytics (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;In order to make it easy to see how and where are active in your projects,
we&#x27;re building contribution analytics for Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab 8.3, you can now quickly get an overview of activity of a group
by going to &lt;strong&gt;Group -&amp;gt; Contribution Analytics&lt;&#x2F;strong&gt; at &lt;code&gt;groups&#x2F;groupname&#x2F;analytics&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_3&#x2F;stats.jpg&quot; alt=&quot;Get contribution analytics in GitLab 8.3 EE&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We intend to expand contribution analytics in future
releases of GitLab. We&#x27;re curious to hear your thoughts and feature proposals.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-references-in-issues&quot;&gt;Merge Request References in Issues&lt;&#x2F;h2&gt;

&lt;p&gt;An issue is often followed by one or multiple merge requests.
Thanks to the great contribution of Greg, you are now able to quickly
see all referenced merge requests with their status (Open &#x2F; Closed &#x2F; Merged)
and even their build status (Success &#x2F; Running &#x2F; Failed) in an issue!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_3&#x2F;references.jpg&quot; alt=&quot;See referenced merge requests in issues in GitLab 8.3&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This makes it much easier to see the current status of an issue and find all related
code, reviews and commits.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-weight-ee-only&quot;&gt;Issue Weight (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;When you have a lot of issues, it can be hard to get an overview.
By adding a weight to each issue, you can get a better idea of how much time,
value, or complexity a given issue has or will cost.&lt;&#x2F;p&gt;

&lt;p&gt;To set the weight of issue, simply change the value in the dropdown menu.
You can set it to a numeric value from 1 to 9.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_3&#x2F;weights1.jpg&quot; alt=&quot;Issue Weights in GitLab EE 8.3&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This value will appear in the issues list and on issues themselves, and you can
see the total sum of all issues on the milestone page.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;quickly-create-a-new-mr-from-the-web-editor&quot;&gt;Quickly create a new MR from the web editor&lt;&#x2F;h2&gt;

&lt;p&gt;You know you should create a merge request, but it&#x27;s so appealing to quickly
fix something in GitLab&#x27;s editor and push it to the master branch.&lt;&#x2F;p&gt;

&lt;p&gt;To prevent you from being naughty these holidays and onward, we&#x27;ve added
a quick option to create a merge request from your changes in the editor.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_3&#x2F;new_mr.jpg&quot; alt=&quot;Quickly create a new MR from the web editor in GitLab 8.3&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Get your commit reviewed and let your CI run before you push to master!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;builds-in-merge-requests&quot;&gt;Builds in Merge Requests&lt;&#x2F;h2&gt;

&lt;p&gt;As your merge requests trigger builds to run in CI, you now have quick
access to them in the &lt;strong&gt;Builds&lt;&#x2F;strong&gt; tab.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_3&#x2F;builds.jpg&quot; alt=&quot;See your CI Builds in MRs in GitLab 8.3&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This makes it much easier to see what is failing, making it even easier to work
with CI in code review.&lt;&#x2F;p&gt;

&lt;p&gt;As this is another step into integrating CI in GitLab, we&#x27;re
working hard on bringing more of these improvements. Have any ideas?
Share them by submitting a feature proposal or a merge request!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;automatic-references&quot;&gt;Automatic References&lt;&#x2F;h2&gt;

&lt;p&gt;You might know that you can reference anything from anywhere in GitLab,
using the simple syntax of &lt;code&gt;group&#x2F;projectREF&lt;&#x2F;code&gt;, for instance to reference
issue 1 in the GitLab CE repo you can do &lt;code&gt;gitlab-org&#x2F;gitlab#1&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We now automatically generate those references for you when posting a URL from
within your GitLab instance. So:
&lt;code&gt;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1991&lt;&#x2F;code&gt; becomes
&lt;code&gt;gitlab-org&#x2F;gitlab-ce!1991&lt;&#x2F;code&gt;. This makes reading issues much cleaner.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;jira-support-in-gitlab-ce&quot;&gt;JIRA support in GitLab CE&lt;&#x2F;h2&gt;

&lt;p&gt;Full JIRA integration was previously exclusive to GitLab Enterprise Edition.
With GitLab 8.3 forward, everyone has access to advanced JIRA integration in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;You can now connect GitLab with JIRA, making it possible to close JIRA tickets
with commit messages and reference JIRA tickets from within GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Our JIRA integration automatically provides context and links back to
GitLab issues, merge requests, users, and commits whenever you reference
a JIRA ticket.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;re currently using JIRA, we&#x27;re curious to hear how we can improve
further integration.&lt;&#x2F;p&gt;

&lt;p&gt;Configure the new settings for JIRA support in your projects under
&lt;strong&gt;Settings -&amp;gt; Services -&amp;gt; JIRA&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-improvements&quot;&gt;CI Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;With merging GitLab CI into GitLab &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;with GitLab 8.0&lt;&#x2F;a&gt;
we set out on a path of integrating two separate codebases.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.3, we conclude this path, as all CI code has been fully integrated
in GitLab and refactored and cleaned where necessary.&lt;&#x2F;p&gt;

&lt;p&gt;This should make it easier to contribute to the development of GitLab CI and
makes way for further integration those crucial CI tools in GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;decoupling-gitlab-from-nginx&quot;&gt;Decoupling GitLab from NGINX&lt;&#x2F;h3&gt;

&lt;p&gt;In GitLab 8.3 we are making a major behind the scenes change in how
GitLab works: all HTTP requests are now proxied through
gitlab-workhorse. We have moved most if not all GitLab-specific
configuration from the NGINX configuration files into gitlab-workhorse.&lt;&#x2F;p&gt;

&lt;p&gt;This change will make it easier for GitLab developers to add features
and improve GitLab using gitlab-workhorse because they no longer have
to work in three places: the Rails application, gitlab-workhorse, and
NGINX. This change is also making it simpler to deploy GitLab from
source, and simpler to use GitLab with Apache or HAproxy when so
desired, because the contact surface between GitLab and its reverse
proxy is now much smaller.&lt;&#x2F;p&gt;

&lt;p&gt;We are still recommending to run GitLab with NGINX because it offers
request&#x2F;response buffering (not yet implemented in gitlab-workhorse)
and SSL termination (not planned for gitlab-workhorse).&lt;&#x2F;p&gt;

&lt;p&gt;If you are using our Omnibus packages and its built-in NGINX service
then no action is needed when upgrading. If you installed GitLab from
source or if you are using your own reverse proxy then you will have
to check your init script (gitlab-workhorse got some new settings) and
reverse proxy configuration. The &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;8.2-to-8.3.md&quot;&gt;8.3 update
guide&lt;&#x2F;a&gt;
has more details.&lt;&#x2F;p&gt;

&lt;p&gt;Those of you who run GitLab at a &quot;relative URL&quot; (example.com&#x2F;gitlab)
will be pleased to hear that gitlab-workhorse now supports relative
URLs.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mattermost-13&quot;&gt;Mattermost 1.3&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;re shipping Mattermost 1.3 with GitLab 8.3.
See the &lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-a-top-10-open-source-project-of-2015&#x2F;&quot;&gt;release post for Mattermost 1.3&lt;&#x2F;a&gt;
for details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;If you are upgrading from GitLab 8.2 and none of your users are using GitLab CI
then you can perform the upgrade to 8.3 without downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Be advised that if you are not using the Omnibus packages and its built-in NGINX
settings, you will have to update your Nginx&#x2F;Apache settings when upgrading to 8.3.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;if-you-are-using-ci&quot;&gt;If you are using CI&lt;&#x2F;h3&gt;

&lt;p&gt;If you are using CI, there are migrations that will have to be performed offline.&lt;&#x2F;p&gt;

&lt;p&gt;As noted above, we&#x27;re migrating almost all database models of CI.
The migration of the CI services are somewhat lossy:
Slack and HipChat notifications will only migrate if they are &lt;strong&gt;enabled&lt;&#x2F;strong&gt;
before the migration.&lt;&#x2F;p&gt;

&lt;p&gt;These migrations took 280 seconds on GitLab.com on PostgreSQL (~500k projects).
We expect this to be a little longer for MySQL databases.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;jenkins-integration-changes-ee-only&quot;&gt;Jenkins Integration Changes (EE only)&lt;&#x2F;h3&gt;

&lt;p&gt;Jenkins integration using the
&lt;a href=&quot;https:&#x2F;&#x2F;wiki.jenkins-ci.org&#x2F;display&#x2F;JENKINS&#x2F;GitLab+Hook+Plugin&quot;&gt;GitLab Hook Plugin&lt;&#x2F;a&gt;
was deprecated in favor of the
&lt;a href=&quot;https:&#x2F;&#x2F;wiki.jenkins-ci.org&#x2F;display&#x2F;JENKINS&#x2F;GitLab+Plugin&quot;&gt;GitLab Plugin&lt;&#x2F;a&gt;.
This plugin enables closer integration between Jenkins and GitLab, including the display of build status on each commit and on the project home page. Previously, build status was only available in a merge request.
The deprecated integration has been renamed to &#x27;Jenkins CI (Deprecated)&#x27; and will continue to work for existing users. We may remove this in a future release and recommend
using the new &#x27;Jenkins CI&#x27; project service instead. See &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;integration&#x2F;jenkins.html&quot;&gt;GitLab Jenkins documentation&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;notes-on-upgrading-from-before-80&quot;&gt;Notes on upgrading from before 8.0&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE-only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;unsplash&#x2F;building.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.2.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/12/10/gitlab-8-dot-2-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/12/10/gitlab-8-dot-2-dot-3-released/</id>
<published>2015-12-10T00:00:00+00:00</published>
<updated>2015-12-10T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.2.3 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix application settings cache not expiring after changes
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1972&quot;&gt;#1972&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent 500 error when creating global milestones with Unicode
characters (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1983&quot;&gt;#1983&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Update documentation for &quot;Guest&quot; permissions (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1952&quot;&gt;#1952&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Properly convert Emoji-only comments into Award Emojis (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1936&quot;&gt;#1936&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Webhook payload has an added, modified and removed properties for
each commit (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1988&quot;&gt;#1988&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent 500 error when creating a merge request that removes a
submodule (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;1989&quot;&gt;#1989&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Enable &quot;paranoid mode&quot; for Devise logins to prevent user
enumeration (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;merge_requests&#x2F;2044&quot;&gt;#2044&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent a possible remote code execution (RCE) in &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;
parsing (see below for more details).&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;remote-code-execution-prevention&quot;&gt;Remote code execution prevention&lt;&#x2F;h2&gt;

&lt;p&gt;We found a vulnerability in GitLab where arbitrary Ruby objects could be
instantiated with arbitrary data, because of an unsafe YAML load. This is the
same problem that was found in Rails almost three years ago and was heavily
publicized at that time.&lt;&#x2F;p&gt;

&lt;p&gt;The vulnerability can be turned into remote code execution when an object can be
instantiated that evaluates one of its data attributes as Ruby code. At the time
when the issue was found in Rails, Rails contained a number of classes that
could be abused in this way, making it a RCE vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;In the version of Rails used in GitLab, these classes no longer meet the
criteria, and we have been unable to find any other classes that do, which is
why we currently consider this low-risk. However, someone with enough
perseverance could likely find another class that can be abused in this way, so
we recommend everyone to upgrade as soon as possible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.2.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/12/02/gitlab-8-dot-2-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/12/02/gitlab-8-dot-2-dot-2-released/</id>
<published>2015-12-02T00:00:00+00:00</published>
<updated>2015-12-02T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.2.2 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Ensure GitLab fires custom update hooks after commit via UI (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;3069&quot;&gt;#3069&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Expire application settings cache at startup (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;3643&quot;&gt;#3643&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix raw private snippet access workflow (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;3677&quot;&gt;#3677&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent 500 error when viewing a user&#x27;s projects from the admin area
(&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;3680&quot;&gt;#3680&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent 404 error after removing a project (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;3559&quot;&gt;#3559&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Nginx should no longer block large LFS uploads (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;3708&quot;&gt;#3708&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Use configured shared path for rebase before merge (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;issues&#x2F;56&quot;&gt;#56&lt;&#x2F;a&gt;).&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note for installations from source:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; The installation and update guides for
versions 8.2 and 8.2.1 mistakenly included instructions that would leave
installations with an outdated version of &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt;. Please ensure that you
have the correct required version (&lt;code&gt;2.6.8&lt;&#x2F;code&gt;) by performing the following
commands:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;&lt;span class=&quot;nb&quot;&gt;cd&lt;&#x2F;span&gt; &#x2F;home&#x2F;git&#x2F;gitlab-shell
&lt;span class=&quot;nb&quot;&gt;sudo&lt;&#x2F;span&gt; &lt;span class=&quot;nt&quot;&gt;-u&lt;&#x2F;span&gt; git &lt;span class=&quot;nt&quot;&gt;-H&lt;&#x2F;span&gt; git fetch
&lt;span class=&quot;nb&quot;&gt;sudo&lt;&#x2F;span&gt; &lt;span class=&quot;nt&quot;&gt;-u&lt;&#x2F;span&gt; git &lt;span class=&quot;nt&quot;&gt;-H&lt;&#x2F;span&gt; git checkout v2.6.8
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.2.1 security release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/11/25/gitlab-8-dot-2-1-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/11/25/gitlab-8-dot-2-1-security-release/</id>
<published>2015-11-25T00:00:00+00:00</published>
<updated>2015-11-25T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have found a remote code execution vulnerability in gitlab-shell
2.6.6 and 2.6.7. This affects GitLab Community Edition 8.2.0 and
GitLab Enterprise Edition 8.2.0. GitLab 8.1.4 and earlier versions
are not affected by this vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;This release also contains a number of other fixes, please see 
below for details.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab allows users to push and pull Git data over SSH. To prevent
full system access via SSH we use gitlab-shell, a program that
sanitizes and validates SSH commands that run on the GitLab server
to send and receive Git data. Due to a change in gitlab-shell
2.6.6-2.6.7, an attacker who has a user account on a GitLab server
can bypass the sanitization in gitlab-shell and run arbitrary
commands on the GitLab server.&lt;&#x2F;p&gt;

&lt;p&gt;The only versions of GitLab that include a vulnerable version of
gitlab-shell  are GitLab Community Edition 8.2.0 and GitLab Enterprise
Edition 8.2.0. If you are still running GitLab 8.1 or earlier then
you are not affected by this vulnerability.  As an administrator
you can check your gitlab-shell version by going to
gitlab.example.com&#x2F;admin and looking in the upper right corner in
the &#x27;Components&#x27; section. Only gitlab-shell versions 2.6.6 and 2.6.7
are affected.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab 8.2.0 on your server then you should  &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;upgrade
immediately&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes-in-821&quot;&gt;Other changes in 8.2.1&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Fix saving GitLabCiService as Admin Template&lt;&#x2F;li&gt;
  &lt;li&gt;Fix the artifacts storage path&lt;&#x2F;li&gt;
  &lt;li&gt;Update required version of LFS client and separate the docs for users and admins&lt;&#x2F;li&gt;
  &lt;li&gt;Omnibus: create directories for artifacts and lfs-objects&lt;&#x2F;li&gt;
  &lt;li&gt;Omnibus: Make deploy page show on all pages when up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;See the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CHANGELOG&lt;&#x2F;a&gt;
for more information.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.2 released with Award Emoji and Repository Mirroring</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/11/22/gitlab-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/11/22/gitlab-8-2-released/</id>
<published>2015-11-22T00:00:00+00:00</published>
<updated>2015-11-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Back home from our Summit in Amsterdam, we&#x27;re at full force again and have a
whole lot of awesome new features for GitLab 8.2!&lt;&#x2F;p&gt;

&lt;p&gt;This time we added more emoji power to GitLab and made it much easier to release
versioned software with Releases and Global Milestones. On top of that,
the CI train is rolling full steam ahead with artifacts and caching available
right now!
If you&#x27;re using GitLab Enterprise, you also get Repository Mirroring, a great
feature if you want to make your intensively-used repositories more easily
reachable all over the planet.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Cristian Bica for
allowing users to select the files view as default project view.
Thanks Cristian!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;git-lfs&quot;&gt;Git LFS&lt;&#x2F;h2&gt;

&lt;p&gt;We’re excited to announce we’ve added support for Git LFS in GitLab.com, GitLab CE, and GitLab EE. To learn more about this new feature, take a look at our &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;11&#x2F;23&#x2F;announcing-git-lfs-support-in-gitlab&#x2F;&quot;&gt;highlight blog post&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;award-emoji&quot;&gt;Award Emoji&lt;&#x2F;h2&gt;

&lt;p&gt;As a remote worker, you get fewer opportunities for high-fives and thumbs-ups. In order to make virtual celebrations easier, you can now vote on
issues and merge requests using emoji!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;emoji.png&quot; alt=&quot;Add award emoji to issues and merge requests in GitLab 8.2&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This makes it much easier to give and receive feedback, without a long comment thread.
For example, we will start using issues as a replacement for our
&lt;a href=&quot;http:&#x2F;&#x2F;feedback.gitlab.com&quot;&gt;feedback forum&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h2&gt;

&lt;p&gt;When creating versioned software, Git tags are ideal. It is not uncommon that you
want to include some extra files and release notes, which are not natively
supported by Git.&lt;&#x2F;p&gt;

&lt;p&gt;With releases you can now add a Markdown-formatted message to any Git tag
and attach any number of files to it.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;releases.png&quot; alt=&quot;Add notes and attachments to a git tag to create a release&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Simply press the edit button next to tags.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;global-milestones&quot;&gt;Global Milestones&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab you were already able to create milestones that cover multiple
projects. By giving a milestone the same name across projects, you can view the
grouped issues and merge requests on the dashboard and in groups.&lt;&#x2F;p&gt;

&lt;p&gt;With Global Milestones in GitLab 8.2, we made it possible to immediately create
milestones in multiple projects in a group. This makes it easier to track activity and
progress across groups and projects.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;global_milestones.png&quot; alt=&quot;With Global Milestones, quickly add a milestone to all projects in a group&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-mirroring-ee-only&quot;&gt;Repository Mirroring (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;If you want to maintain a mirror of a repository in a GitLab instance,
you can now let GitLab handle the mirroring for you automatically in &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab
Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;mirroring.png&quot; alt=&quot;Mirror any repository automatically in GitLab 8.2 EE&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;There are several use cases for repository mirroring. If you are globally distributed and want
to have a repository available for quick cloning, you can use repository mirroring
to always have an up-to-date, fast mirror of a remote repository.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;mirroring2.png&quot; alt=&quot;Mirror any repository automatically in GitLab 8.2 EE&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Alternatively, if you want to have a public mirror of your project, for instance
on GitLab.com, you can now do so effortlessly.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;build-artifacts&quot;&gt;Build Artifacts&lt;&#x2F;h2&gt;

&lt;p&gt;You were always able to work with the output from your CI builds,
as long as you up&#x2F;downloaded it somewhere. That&#x27;s a bit of a hassle, why not
put it on GitLab&#x27;s server?&lt;&#x2F;p&gt;

&lt;p&gt;With Build Artifacts in GitLab 8.2 you can do this now. By defining &lt;code&gt;artifacts&lt;&#x2F;code&gt;
in your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;, you can specify which files will get uploaded and
attached to the build on success.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;artifacts:
  paths:
  - binaries&#x2F;
  - .config
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Do you simply want to have all files that are not tracked by Git? You can
with one single setting:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;artifacts:
  untracked: true
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;This will upload anything from Runner that is not tracked by Git! Then simply
download them from the build:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;artifacts.png&quot; alt=&quot;Download the build artifact in GitLab 8.2 straight from your builds&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;To use build artifacts, make sure to upgrade your Runners to 0.7 or higher.
Have a look at
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#artifacts&quot;&gt;the artifact documentation for more information&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;In future releases, we aim to introduce artifact expiration, passing artifacts between
builds, and the ability to quickly get an overview of your artifacts.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-runner-caching&quot;&gt;CI Runner Caching&lt;&#x2F;h2&gt;

&lt;p&gt;When doing CI builds, many builds make use of the same dependencies. Because
Runners start fresh with every run, this means that they spend a lot of time
installing the same things over and over.&lt;&#x2F;p&gt;

&lt;p&gt;With caching now available for builds, this is no longer necessary. You can
specify a list of files and directories that will be cached between builds&lt;&#x2F;p&gt;

&lt;p&gt;For instance, to cache all files in &lt;code&gt;binaries&lt;&#x2F;code&gt; and &lt;code&gt;.config&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;rspec:
  script: test
  cache:
    paths:
    - binaries&#x2F;
    - .config
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;As with Build Artifacts, you can also cache all files that are not tracked by
Git:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;rspec:
  script: test
  cache:
    untracked: true
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;We hope this will give your Runners some much-needed time off.&lt;&#x2F;p&gt;

&lt;p&gt;For more options, view &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;ci&#x2F;yaml&#x2F;README.html#cache&quot;&gt;the documentation on build caching&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;copy-to-clipboard-buttons&quot;&gt;Copy to Clipboard buttons&lt;&#x2F;h2&gt;

&lt;p&gt;Want to get a commit SHA or the cross-project reference for an issue or
merge request? Simply click the copy-to-clipboard button to have it ready
for pasting!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;copy.jpg&quot; alt=&quot;Copy to clipboard with GitLab 8.2&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;search-through-commit-messages&quot;&gt;Search through Commit Messages&lt;&#x2F;h2&gt;

&lt;p&gt;When you search, GitLab now also searches through commit messages for you!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_2&#x2F;commit_search.jpg&quot; alt=&quot;Search through commits with GitLab 8.2&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci-runner-improvements&quot;&gt;CI Runner improvements&lt;&#x2F;h2&gt;

&lt;p&gt;With the release of GitLab 8.2, we&#x27;re also releasing the new Runner, version 0.7.&lt;&#x2F;p&gt;

&lt;p&gt;The biggest improvement in GitLab Runner 0.7.0 is that the Docker executor now uses
separate containers for: git clone, running builds (as specified in .gitlab-ci.yml),
and a separate container for uploading artifacts.
This means you can use images without git installed
(a limitation of previous releases).&lt;&#x2F;p&gt;

&lt;p&gt;Runners now also come with built-in support for TLS self-signed certificates.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ci--shared-runners-now-on-by-default&quot;&gt;CI &amp;amp; Shared Runners now on by default&lt;&#x2F;h2&gt;

&lt;p&gt;We want everyone to be able to use CI with zero effort or configuration.
That&#x27;s why we&#x27;ve enabled CI and shared runners by default for all new projects.&lt;&#x2F;p&gt;

&lt;p&gt;This means that all you need to do to start using CI is push your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;
and your current shared runners will start working on it!&lt;&#x2F;p&gt;

&lt;p&gt;This is also the case for GitLab.com, where we have a number of shared runners
available for everyone to use.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt;
to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;custom-nginx-update-needed&quot;&gt;Custom Nginx? Update needed!&lt;&#x2F;h3&gt;

&lt;p&gt;If you are not using the Omnibus packages and their built-in Nginx settings,
you will have to update your Nginx&#x2F;Apache settings when upgrading to 8.2.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;slow-ish-migrations&quot;&gt;Slow-ish migrations&lt;&#x2F;h3&gt;

&lt;p&gt;This version contains a (potentially) slow migration that loops through all
records in the &#x27;services&#x27; table (project services) to update JIRA settings to a new format.
This took about 5 minutes on our largest server.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;shared-file-storage&quot;&gt;Shared file storage&lt;&#x2F;h3&gt;

&lt;p&gt;There is a new config setting for &#x27;shared file storage&#x27; in &lt;code&gt;gitlab.yml&lt;&#x2F;code&gt; &#x2F; &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt;.
If you run GitLab with NFS or something similar,
you need to make sure this directory is on an NFS share.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upgrading-from-7x-or-before&quot;&gt;Upgrading from 7.x or before?&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;em&gt;Note&lt;&#x2F;em&gt; If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled,
you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;default-upgrade-behavior&quot;&gt;Default upgrade behavior&lt;&#x2F;h3&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE-only features and things like Repository Mirroring can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_2&#x2F;header2.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.1.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/11/11/gitlab-8-dot-1-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/11/11/gitlab-8-dot-1-dot-4-released/</id>
<published>2015-11-11T00:00:00+00:00</published>
<updated>2015-11-11T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.1.4 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug where manually merged branches in a MR would end up with an
empty diff&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent redirect loop when &lt;code&gt;home_page_url&lt;&#x2F;code&gt; is set to the root URL&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix incoming email configuration defaults&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Remove CSS properties preventing hard tabs from rendering in Chromium
45&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix bug in JIRA integration which prevented merge requests from being
accepted when using issue closing pattern&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.1.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/11/06/gitlab-8-dot-1-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/11/06/gitlab-8-dot-1-dot-3-released/</id>
<published>2015-11-06T00:00:00+00:00</published>
<updated>2015-11-06T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.1.3 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Add support for Facebook OAuth authentication&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Use issue editor as cross reference comment author when issue is
edited with a new mention&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Spread out runner contacted_at updates&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Force-update refs&#x2F;merge-requests&#x2F;X&#x2F;head upon a push to the source
branch of a merge request&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix &quot;Rebase onto master&quot;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;When upgrading to 8.1.3 using Omnibus packages, downtime is required because of
additions to the PostgreSQL configuration which will cause a database restart.&lt;&#x2F;p&gt;

&lt;p&gt;This version does not include any new migrations, and installations from source
should not require any downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.1.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/10/27/gitlab-8-dot-1-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/10/27/gitlab-8-dot-1-dot-2-released/</id>
<published>2015-10-27T00:00:00+00:00</published>
<updated>2015-10-27T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.1.2 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following changes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Require CI jobs to be named&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Prevent a 500 error when editing CI services&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Correct styling for runner status badge&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &quot;Edit Readme&quot; link on project home page&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix cloning wiki repositories over HTTP&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; lint rendering&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Allow users in the &quot;Developer&quot; role to manage builds&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix link to specific runner on the CI build page&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Redis version check on Debian&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add migration to automatically remove the satellites directory&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Add missing database index for project paths&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Prevent a 500 error related to the JIRA external issue tracker service&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus&lt;&#x2F;strong&gt;: Fix sysctl code in &lt;code&gt;gitlab-ctl reconfigure&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; We planned to release 8.1.1 yesterday but discovered a missing
database index that briefly brought down GitLab.com after we deployed the
release. We&#x27;re releasing 8.1.2, which includes all of the changes intended for
8.1.1, and adds the missing database index.&lt;&#x2F;p&gt;

&lt;p&gt;This release also addresses a minor security issue introduced in 8.0 that
disclosed the names of CI runners that the user may not have had permission to
view.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;When we &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;released GitLab 8.0 last month&lt;&#x2F;a&gt;, we promised to automatically remove
the satellites directory in 8.1. This seems to have slipped our minds, but we&#x27;re
now including a migration to automatically perform the promised cleanup in this
patch release.&lt;&#x2F;p&gt;

&lt;p&gt;Due to this migration, an upgrade to GitLab 8.1.2 may cause your GitLab service
to be offline for longer than a standard patch upgrade. The amount of time
depends on the size of the installation and, by extension, the number of
remaining satellite directories.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;d prefer to &lt;em&gt;manually&lt;&#x2F;em&gt; remove the satellites directory and avoid waiting
for a potentially lengthy migration to complete, you can use one of the commands
below for either Omnibus installations, or installations from source:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;&lt;span class=&quot;c&quot;&gt;# Omnibus&lt;&#x2F;span&gt;
&lt;span class=&quot;nb&quot;&gt;sudo &lt;&#x2F;span&gt;gitlab-rails runner &lt;span class=&quot;s2&quot;&gt;&quot;require &#x27;fileutils&#x27;; FileUtils.rm_rf(Gitlab.config.satellites.path)&quot;&lt;&#x2F;span&gt;

&lt;span class=&quot;c&quot;&gt;# Source&lt;&#x2F;span&gt;
&lt;span class=&quot;nb&quot;&gt;cd&lt;&#x2F;span&gt; &#x2F;home&#x2F;git&#x2F;gitlab
&lt;span class=&quot;nb&quot;&gt;sudo&lt;&#x2F;span&gt; &lt;span class=&quot;nt&quot;&gt;-u&lt;&#x2F;span&gt; git &lt;span class=&quot;nt&quot;&gt;-H&lt;&#x2F;span&gt; bundle &lt;span class=&quot;nb&quot;&gt;exec &lt;&#x2F;span&gt;rails runner &lt;span class=&quot;nt&quot;&gt;-e&lt;&#x2F;span&gt; production &lt;span class=&quot;s2&quot;&gt;&quot;require &#x27;fileutils&#x27;; FileUtils.rm_rf(Gitlab.config.satellites.path)&quot;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.1 with deeper CI integration, MR improvements, and more. Released from our team summit in Amsterdam!</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/10/22/gitlab-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/10/22/gitlab-8-1-released/</id>
<published>2015-10-22T00:00:00+00:00</published>
<updated>2015-10-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;With last month&#x27;s release of 8.0, we made a lot of improvements to GitLab.
Today we bring you GitLab 8.1, which brings you a deeper CI integration, the ability to check out
any merge request, design updates, and more.&lt;&#x2F;p&gt;

&lt;p&gt;We as a team are really excited about this release not only for the increased performance and
great new features but also because we are all together in Amsterdam for our team summit.
Our team is &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;04&#x2F;08&#x2F;the-remote-manifesto&#x2F;&quot;&gt;fully
remote&lt;&#x2F;a&gt; from around the
world so this is a special update for us to be releasing GitLab 8.1 together from Amsterdam.
Next week the team will be attending &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;10&#x2F;14&#x2F;gitlab-oscon-challenge-2015&#x2F;&quot;&gt;OSCON&lt;&#x2F;a&gt;
so please let us know if you&#x27;ll be there. We&#x27;d love to chat!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;team_sm.jpg&quot; alt=&quot;The GitLab Inc Team&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;GitLab now consists of &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;commits&#x2F;master&quot;&gt;20,000 commits&lt;&#x2F;a&gt;!
This is a great milestone for our community. With every release of GitLab, new people from
this great community contribute code and time. GitLab truly is a product built by the community
and we&#x27;re honored to be part of it.&lt;&#x2F;p&gt;

&lt;p&gt;Zeger-Jan van de Weg did several nice contributions this release and we&#x27;re happy
to elect him as this month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;)!
Thanks Zeger-Jan!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab--gl--ci&quot;&gt;GitLab = GL + CI&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 8.0 we integrated GitLab CI into GitLab, making it a single application
where you can collaborate on, test, and deploy your code.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.1, CI is everywhere.
You will find build status in the commit list view, in commits, and on the front page
of your projects. You&#x27;ll also find graphs of CI in the graphs view and a new
builds page for quick access to your project&#x27;s builds.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;ci1.png&quot; alt=&quot;GitLab CI Build status in the commit view&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;ci2.png&quot; alt=&quot;GitLab CI build graphs under graphs&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;design-updates&quot;&gt;Design Updates&lt;&#x2F;h2&gt;

&lt;p&gt;In our ongoing effort to improve the look and feel of GitLab, we have
made many changes big and small this release.&lt;&#x2F;p&gt;

&lt;p&gt;We now have a new color scheme for major interface elements:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;design.png&quot; alt=&quot;Further improved looks&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;check-out-merge-request&quot;&gt;Check out Merge Request&lt;&#x2F;h2&gt;

&lt;p&gt;Previously, checking out a merge request from someone was only possible if the
branch was in a repository you can read. Right now, you can check out any merge
request made to your repository, even if it&#x27;s from fork.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;co_mr1.png&quot; alt=&quot;Checkout any merge request&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You could do this previously, but now we make the remote branch available
locally, making it much faster.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;commit-status-api&quot;&gt;Commit Status API&lt;&#x2F;h2&gt;

&lt;p&gt;With the integration of GitLab CI in GitLab, we want to make it easier for
everyone to use CI. You can now get the status of any commit through the API.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;GET &#x2F;projects&#x2F;:id&#x2F;repository&#x2F;commits&#x2F;:sha&#x2F;statuses
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;commits.html#get-the-status-of-a-commit&quot;&gt;See the documentation on getting commit status through the API&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;In addition to this, you can even &lt;strong&gt;set the commit status&lt;&#x2F;strong&gt;. With this, you
can easily use any existing CI in combination with GitLab and still see the
commit status reflected in GitLab&#x27;s interface!&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;POST &#x2F;projects&#x2F;:id&#x2F;statuses&#x2F;:sha
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;commits.html#post-the-status-to-commit&quot;&gt;Docs on setting the commit status&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;The commit status API makes it easier to integrate your existing CI tools with GitLab.
We&#x27;re looking forward to see what you&#x27;ll use it for.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;further-improvements&quot;&gt;Further improvements&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;auto-engage-ci&quot;&gt;Auto-engage CI&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab will now automatically turn on CI for a project when you push
a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file. If you have some shared runner setup, this should
make it easier for your team to start using CI.&lt;&#x2F;p&gt;

&lt;p&gt;Of course, you can disable CI for projects you don&#x27;t want to use it for.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;fast-faster&quot;&gt;Fast, Faster!&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve been working hard to improve page speed. Issues, searching for users,
the trending page, signing in, and more will now load much faster.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;create-directories-from-the-web-editor&quot;&gt;Create Directories from the Web Editor&lt;&#x2F;h3&gt;

&lt;p&gt;You can now create directories straight from the interface!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;create_dir.png&quot; alt=&quot;Create a directory from the GitLab interface&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;activity-on-dashboard&quot;&gt;Activity on Dashboard&lt;&#x2F;h3&gt;

&lt;p&gt;If you prefer to see activity on the Dashboard by default, you can now
easily set this in your profile:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;activity_dashboard.png&quot; alt=&quot;See relevant activity on your GitLab dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;sign-in-as-other-user&quot;&gt;Sign in as other user&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Administrators now have a simple, useful tool: you can sign in as
any other user.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;loginas.png&quot; alt=&quot;Log in as other user as GitLab Admin&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Visit a user through the admin panel to find the button above.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;quick-submit&quot;&gt;Quick Submit&lt;&#x2F;h3&gt;

&lt;p&gt;Simply use &lt;code&gt;CMD+ENTER&lt;&#x2F;code&gt; on Mac or &lt;code&gt;CTRL+ENTER&lt;&#x2F;code&gt; on Win &#x2F; Linux to quickly
submit an issue or comment.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;faster-and-more-reliable-git-archive-downloads&quot;&gt;Faster and more reliable &#x27;git archive&#x27; downloads&lt;&#x2F;h3&gt;

&lt;p&gt;Each project in GitLab has a &#x27;download&#x27; button that lets you grab
a ZIP file with the contents of the repository at the revision you
are viewing. In GitLab 8.1 we have reduced the delay before the
download starts and optimized the way the ZIP file is generated and
sent to the user by shifting some of the work from the main GitLab
Rails application to
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-git-http-server&quot;&gt;gitlab-git-http-server&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; if you are not using the Omnibus packages and their built-in
NGINX settings this means that you will have to
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;lib&#x2F;support&#x2F;nginx&#x2F;gitlab#L116-132&quot;&gt;update your
NGINX&#x2F;Apache settings&lt;&#x2F;a&gt;
when upgrading to 8.1.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-mattermost-update&quot;&gt;GitLab Mattermost Update&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-GitLab packages are bundled with the latest version of &lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;&quot;&gt;Mattermost&lt;&#x2F;a&gt;.
Mattermost version 1.1.1 comes with a large number of improvements and
is even more integrated with GitLab.
Realtime notifications from GitLab can now be received by Mattermost,
using incoming webhooks.&lt;&#x2F;p&gt;

&lt;p&gt;The latest version of Mattermost also includes a large number of config changes.
If you have any custom configuration &lt;strong&gt;make sure you read the
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;mattermost&#x2F;platform&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;Upgrade-Guide.md&quot;&gt;Upgrade from v0.7 to v1.1 notes&lt;&#x2F;a&gt;
and make sure you check the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;files&#x2F;gitlab-config-template&#x2F;gitlab.rb.template#L665-790&quot;&gt;latest config options available for GitLab Mattermost&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_1&#x2F;mattermost.png&quot; alt=&quot;Mattermost is looking great with its latest release&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Rocket Chat is still working on
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;RocketChat&#x2F;Rocket.Chat&#x2F;issues&#x2F;533&quot;&gt;adding PostgreSQL compatibility&lt;&#x2F;a&gt;
and there is no estimated time when it will ship.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Update (2015-10-27):&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; When we &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;released GitLab 8.0 last month&lt;&#x2F;a&gt;, we promised
to automatically remove the satellites directory in 8.1. This seems to have
slipped our minds for the official 8.1 release, but we included it in the 8.1.2
patch release. See &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;10&#x2F;27&#x2F;gitlab-8-dot-1-dot-2-released&#x2F;&quot;&gt;the release post&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;If you are upgrading from GitLab 8.0 and none of your users are using
GitLab CI then you can perform the upgrade to 8.1 without downtime.
If your users &lt;em&gt;are&lt;&#x2F;em&gt; using CI you need to stop GitLab before performing
the upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; If you are upgrading from a GitLab version prior to 8.0 &lt;em&gt;and&lt;&#x2F;em&gt; you have CI enabled, you have to upgrade to GitLab 8.0 &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;first&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To see if your users are using GitLab CI go to
&lt;code&gt;gitlab.example.com&#x2F;ci&#x2F;admin&#x2F;projects&lt;&#x2F;code&gt; and look if there are any
projects. No projects means no CI.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Note:&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; If you&#x27;ve encountered an &lt;code&gt;&#x2F;etc&#x2F;init.d&#x2F;ci-{SERVICE} does not exist!&lt;&#x2F;code&gt; error during the reconfigure run, use the package 8.1.0-ce.1 or newer.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab EE-only features like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview of EE please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https:&#x2F;&#x2F;cyndicaviedes.com&#x2F;&quot;&gt;Cyndi&lt;&#x2F;a&gt; for the picture of the GitLab Inc team.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_1&#x2F;team.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.0.5 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/10/14/gitlab-8-dot-0-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/10/14/gitlab-8-dot-0-dot-5-released/</id>
<published>2015-10-14T00:00:00+00:00</published>
<updated>2015-10-14T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.0.5 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Correct lookup-by-email for LDAP logins&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: &quot;Multi-project&quot; and &quot;Treat unstable builds as passing&quot; parameters for
the Jenkins CI service are now correctly persisted.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Correct the build URL when &quot;Multi-project&quot; is enabled for the Jenkins
CI service.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.0.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/10/06/gitlab-8-dot-0-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/10/06/gitlab-8-dot-0-dot-4-released/</id>
<published>2015-10-06T00:00:00+00:00</published>
<updated>2015-10-06T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.0.4 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix Message-ID header to be RFC 2111-compliant to prevent e-mails being dropped&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix referrals for :back and relative URL installs&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix anchors to comments in diffs&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Remove CI token from build traces&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix &quot;Assign All&quot; button on Runner admin page&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Fix multi-project setup for Jenkins&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;p&gt;&lt;strong&gt;Omnibus-gitlab packages note:&lt;&#x2F;strong&gt; Before announcing this release, initial set of packages that was built contained an error.
We&#x27;ve noticed this and yanked the packages(version 8.0.4-ce.0). Sadly, the packages were publicly available before this blogpost was live so if you installed&#x2F;upgraded your GitLab in the timeframe(approx 12:00PM-12:45PM CET on Oct. 06, 2015.) where the broken packages were available, you will run into a &lt;code&gt;SyntaxError&lt;&#x2F;code&gt; during installation.
Run &lt;code&gt;sudo apt-get update&lt;&#x2F;code&gt; to get the correct version of the package (8.0.4-ce.1) and install the package again with &lt;code&gt;sudo apt-get install gitlab-ce&lt;&#x2F;code&gt; (or &lt;code&gt;gitlab-ee&lt;&#x2F;code&gt;).&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.0.3 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/09/30/gitlab-8-dot-0-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/09/30/gitlab-8-dot-0-dot-3-released/</id>
<published>2015-09-30T00:00:00+00:00</published>
<updated>2015-09-30T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.0.3 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix URL shown in Slack notifications&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix bug where projects would appear to be stuck in the forked import state&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE:&lt;&#x2F;strong&gt; Fix Error 500 in creating merge requests with more than 1000 diffs&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.0.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/09/25/gitlab-8-dot-0-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/09/25/gitlab-8-dot-0-dot-2-released/</id>
<published>2015-09-25T00:00:00+00:00</published>
<updated>2015-09-25T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 8.0.2 for Community Edition (CE) and Enterprise
Edition (EE).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix default avatar not rendering in network graph&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Skip check_initd_configured_correctly on omnibus installs&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Prevent double-prefixing of help page paths&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Clarify confirmation text on user deletion&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Make commit graphs responsive to window width changes&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix LDAP attribute mapping&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Remove git refs used internally by GitLab from network graph&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Fix Reply by email for non-UTF-8 messages&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&lt;&#x2F;strong&gt;: Add option to use StartTLS with Reply by email IMAP server&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.0.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/09/22/gitlab-8-dot-0-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/09/22/gitlab-8-dot-0-dot-1-released/</id>
<published>2015-09-22T00:00:00+00:00</published>
<updated>2015-09-22T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Hot on the heels of today&#x27;s &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;22&#x2F;gitlab-8-0-released&#x2F;&quot;&gt;big 8.0 release&lt;&#x2F;a&gt;,
we are releasing version 8.0.1 for Community Edition (CE), Enterprise Edition
(EE), and Continuous Integration (CI).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE&#x2F;EE&#x2F;CI&lt;&#x2F;strong&gt;: Improve CI migration procedure and documentation&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Correct gem dependency versions&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE&lt;&#x2F;strong&gt;: Re-add the &quot;Help Text&quot; feature that was inadvertently removed&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;Omnibus&lt;&#x2F;strong&gt;: Revert &quot;Do not buffer with nginx git http requests&quot;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;p&gt;&lt;strong&gt;&lt;em&gt;Update&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; &lt;em&gt;(2015-09-22 22:00 UTC)&lt;&#x2F;em&gt;: Omnibus packages for this release have
been updated to resolve the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;2670&quot;&gt;No resource, method, or local variable named
&lt;code&gt;ci_service&lt;&#x2F;code&gt;&lt;&#x2F;a&gt; error some of
our users saw during the upgrade process. Fixed packages have a &lt;code&gt;.1&lt;&#x2F;code&gt; Omnibus
patch version (e.g., &lt;code&gt;8.0.1-ee.1&lt;&#x2F;code&gt; and &lt;code&gt;8.0.1-ce.1&lt;&#x2F;code&gt;). If you&#x27;ve already upgraded
to GitLab 8.0.1 without issue, you can safely ignore this update.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 8.0 released with new looks and integrated CI!</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/09/22/gitlab-8-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/09/22/gitlab-8-0-released/</id>
<published>2015-09-22T00:00:00+00:00</published>
<updated>2015-09-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Fifteen months ago we &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;06&#x2F;22&#x2F;gitlab-7-dot-0-released&#x2F;&quot;&gt;released&lt;&#x2F;a&gt;
GitLab 7.0. Since then we&#x27;ve vastly improved the performance of GitLab,
made GitLab work in any Enterprise through deep LDAP integration and
made it possible to &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;workflow&#x2F;git_annex.html&quot;&gt;work with large files in Git&lt;&#x2F;a&gt;.
On top of that, the UI has been reworked and improved with every release,
GitLab CI has become a very powerful tool and we&#x27;ve made &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;hundreds of other improvements&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We built this all as a community and by being &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;05&#x2F;22&#x2F;gitlab-7-11-released&#x2F;&quot;&gt;more&lt;&#x2F;a&gt;
and &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;08&#x2F;03&#x2F;almost-everything-we-do-is-now-open&#x2F;&quot;&gt;more&lt;&#x2F;a&gt; open.&lt;&#x2F;p&gt;

&lt;p&gt;Today, GitLab&#x27;s next major version is here. We&#x27;re very excited that GitLab 8.0 allows for a faster,
more beautiful way for people to create, review and deploy code together.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab now comes with continuous integration (&lt;a href=&quot;&#x2F;features&#x2F;continuous-integration&#x2F;&quot;&gt;GitLab CI&lt;&#x2F;a&gt;)
fully integrated.
But that&#x27;s not all! Almost every element in the interface has been reworked
and GitLab will take up to 50% less disk space.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is
&lt;strong&gt;Kirill Zaitsev&lt;&#x2F;strong&gt; for the awesome Drone CI integration and work on the service API.
Thanks Kirill!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;continuous-integration-in-gitlab&quot;&gt;Continuous Integration in GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;Code lives in GitLab: It&#x27;s made, reviewed, and merged in GitLab. Now it gets
tested, packaged, and deployed in GitLab as well.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.0, we&#x27;ve integrated GitLab CI directly into GitLab itself. This
means that you no longer have to visit a separate application to see the status
of your projects.
You can see all of your tests, deployments, and packaging that
you would normally see in your CI, right in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;If you were using GitLab CI before, please see the notes on migrating at the
end of this post.&lt;&#x2F;p&gt;

&lt;p&gt;Simply visit &#x27;Continuous Integration&#x27; from the Dashboard:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;ci_dash.png&quot; alt=&quot;Continuous Integration in GitLab on the Dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Or through one of your projects:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;ci_proj.png&quot; alt=&quot;Continuous Integration in GitLab in your project&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;ci_proj2.png&quot; alt=&quot;Continuous Integration in GitLab: project view&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;There are &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;2164#note_1902301&quot;&gt;advantages and disadvantages&lt;&#x2F;a&gt; to this integration.
We feel confident that the benefits outweigh the drawbacks.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab versions following 8.0, the impact of this integration will become
more visible. The integration is a big step that we had to do first and we have
a policy of iterative improvements.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 8.1 will &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;2594&quot;&gt;integrate CI into the menu structure&lt;&#x2F;a&gt;
and add a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;2595&quot;&gt;commit status API&lt;&#x2F;a&gt;,
which will make it easier for third party CI services to integrate with GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;fresh-design&quot;&gt;Fresh Design&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.0 comes with a completely new look and feel.
This is not just a small iteration, but a major revision of almost every
UI element in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We fixed the width of certain views to make it easier to view text. We also improved
that text with a pretty new typeface. In addition, contrast is reduced for elements that are less important,
increased for elements that are more important and some soft lines were added for clarity.&lt;&#x2F;p&gt;

&lt;p&gt;Take a look for yourself at our clean, new design:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;dashboard.png&quot; alt=&quot;GitLab 8.0 Dashboard&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;project.png&quot; alt=&quot;GitLab 8.0 project&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;mr.png&quot; alt=&quot;GitLab 8.0 Merge Request&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;turbo-merges-vroom-vroom&quot;&gt;Turbo Merges (Vroom Vroom)&lt;&#x2F;h2&gt;

&lt;p&gt;Merging a merge request is now faster!
Rather than working in local copies of repositories (satellites),
we now work directly in them. This makes many git operations, like
merges, much faster and more reliable.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;50-less-space-used&quot;&gt;50% less space used&lt;&#x2F;h2&gt;

&lt;p&gt;By removing satellites in GitLab, we free up the space left behind.
Project size in GitLab is cut in half reducing disk usage up to 50%.
When you upgrade to GitLab 8.1 next month the satellites will automatically be
removed. If you need to remove them before that time you can do so manually.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;reply-by-email&quot;&gt;Reply by Email&lt;&#x2F;h2&gt;

&lt;p&gt;Want to quickly reply to your colleagues in GitLab while on the go or when
going through your email? Now you can.
You can now simply reply to any notification email to comment in the issue
or merge request. This brings GitLab to any app that can use email;
we&#x27;re already looking forward to comments from your smart watches!&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;See &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;incoming_email&#x2F;README.html&quot;&gt;the documentation on reply by email&lt;&#x2F;a&gt;
to set it up&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;rbe.png&quot; alt=&quot;Reply by Email!&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;quick-open-in-gmail&quot;&gt;Quick open in Gmail&lt;&#x2F;h2&gt;

&lt;p&gt;Still want to get the full view of the issue or merge request while in Gmail?
Use the new quick links. In Gmail and in Inbox you will see a direct link
to the referenced issue of a notification you got from your GitLab instance.
If you use Google Inbox on your phone, you&#x27;ll see the links there as well!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Note that you need to go through an involved approval process of Google to enable this.
We already did this for GitLab.com.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;For the approval process steps please see the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;integration&#x2F;gmail_action_buttons_for_gitlab.html&quot;&gt;documentation on Gmail action buttons&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;gmail.png&quot; alt=&quot;Gmail Action Buttons&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;easily-upload-files-in-gitlab&quot;&gt;Easily Upload files in GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;To make it much easier to upload files to your repository, you can now do this
directly through GitLab&#x27;s interface!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;upload.png&quot; alt=&quot;Quick Upload into your repository&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Yakun Li and Stan Hu deserve special recognition for being
patient and persistent while adding this feature, which had a &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;pull&#x2F;9138&quot;&gt;pull request with
250 comments&lt;&#x2F;a&gt;! Awesome work!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-http-support&quot;&gt;Better HTTP Support&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve replaced Grack in GitLab to handle HTTP clones and pushes and are now using our
own hip Go daemon, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-git-http-server&quot;&gt;gitlab-git-http-server&lt;&#x2F;a&gt;.
This means large clones and pushes over HTTP are now less likely to time out!
It also ensures the Unicorn workers are freed from these long running requests, making GitLab faster for users.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mattermost-improvements&quot;&gt;Mattermost Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;re shipping &lt;a href=&quot;http:&#x2F;&#x2F;www.mattermost.org&#x2F;mattermost-beta1-now-available&#x2F;&quot;&gt;Mattermost Beta1&lt;&#x2F;a&gt;
with GitLab 8.0!&lt;&#x2F;p&gt;

&lt;p&gt;You can now make use of GitLab Single Sign On to authenticate with Mattermost,
making the shared experience much more fluid.&lt;&#x2F;p&gt;

&lt;p&gt;On top of that, the Mattermost team has added File and Image sharing, a way
to import Slack data and a host of other improvements and fixes!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;mattermost.png&quot; alt=&quot;Mattermost Beta1!&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The team at Rocket Chat encountered a
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;RocketChat&#x2F;Rocket.Chat&#x2F;issues&#x2F;533#issuecomment-140627021&quot;&gt;few temporary road blocks&lt;&#x2F;a&gt;
in adding PostgreSQL compatibility.
How quickly these are solved will determine if GitLab 8.1 will ship
with Rocket Chat or whether it will be delayed.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ssl-verification-for-web-hooks&quot;&gt;SSL Verification for Web Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve now enabled SSL verification for web hooks by default.
This makes web hooks safer to use and helps mitigate man-in-the-middle attacks.&lt;&#x2F;p&gt;

&lt;p&gt;You can turn this off in the web hook settings of a project.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;webhooks.png&quot; alt=&quot;Configure SSL verification of Web Hooks&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;web_hooks&#x2F;web_hooks.html&quot;&gt;View the documentation for Web Hooks&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;public-user-profile-and-group-pages&quot;&gt;Public User Profile and Group Pages&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 8.0 all users and groups will have a publicly visible profile page.
This removes some complexity and makes it clear why you can&#x27;t claim a name
(which previously allowed you to find out what names existed).
Private and internal projects will not be shown on these profile pages unless
you&#x27;re allowed to see them.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;notification-settings-within-the-projects-main-page&quot;&gt;Notification Settings within the Project&#x27;s main page&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab 8.0 you will be able to set the project notifications setting
right from the project&#x27;s dashboard. You can now quickly control how much
information you&#x27;ll get from each project.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;8_0&#x2F;notifications.png&quot; alt=&quot;Project Notifications&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes.
Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt;
to see all of the named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 8.0 can be upgraded online. Do note that if you are using GitLab CI,
you will have to perform a manual migration, see below. In addition,
there is a small change of behavior in GitLab CI, described directly below.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source, or if you disabled the built-in
NGINX in the Omnibus packages, then you need to manually update
your web server configuration to make it use gitlab-git-http-server.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;gitlab-ciyml-usage-in-gitlab-ci&quot;&gt;.gitlab-ci.yml usage in GitLab CI&lt;&#x2F;h3&gt;

&lt;p&gt;In GitLab 7.12 .gitlab-ci.yml files were introduced to specify build configurations.
If there was no file yet CI would fall back to the legacy build script,
which was stored in the database.&lt;&#x2F;p&gt;

&lt;p&gt;With GitLab 8.0, CI will not pick up any builds from projects &#x2F; branches without
a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file present. Configuring a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; is not difficult.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;yaml&#x2F;README.html&quot;&gt;Documentation on configuring a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;gitlab-ci-migration&quot;&gt;GitLab CI Migration&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab 8.0 integrates GitLab CI in GitLab. Depending on your current usage of
GitLab CI, this could mean you have to perform a migration that merges your
GitLab CI data into GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;re currently not using GitLab CI
you do not have to do anything in regards to GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;If you have an active GitLab CI instance, you will need to follow our
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;migrate_ci_to_ce&#x2F;README.html&quot;&gt;CI migration guide&lt;&#x2F;a&gt;
to persist your data and registered runners. It is &lt;em&gt;necessary&lt;&#x2F;em&gt; to go to 8.0 first,
or you will lose all your build history. Once 8.1 and above have been released,
you can force the installation of 8.0 with the following commands, depending on
your operating system:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo apt-get install gitlab-ee=8.0.5-ee.0

sudo yum install gitlab-ee-8.0.5-ee.0.el6.x86_64

sudo yum install gitlab-ee-8.0.5-ee.0.el7.x86_64
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;This is an involved migration, especially if GitLab CI is running on a separate
server. It can be performed while GitLab is online, but GitLab CI will have
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Note that even if you do not care about persisting your CI data through the
migration, there is a chance that you have to perform some cleanup.
Please read &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;migrate_ci_to_ce&#x2F;README.html&quot;&gt;the migration document&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;span id=&quot;reverse-proxy-settings&quot;&gt;&lt;&#x2F;span&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;non-omnibus-web-servers-and-gitlab-git-http-server&quot;&gt;Non-omnibus web servers and gitlab-git-http-server&lt;&#x2F;h3&gt;

&lt;p&gt;All GitLab installations use a reverse proxy server to shield the
main Ruby application server (Unicorn) from handling requests it
is not &#x27;good at&#x27;. The recommended reverse proxy for GitLab is NGINX,
but some people also use Apache. Because GitLab 8.0 uses
gitlab-git-http-server upgrading to 8.0 requires changes in the
reverse proxy configuration. If you are using Omnibus packages with
the built-in NGINX server (which is the default) then these reverse
proxy changes happen automatically when you upgrade to 8.0 and you
can stop reading this section.&lt;&#x2F;p&gt;

&lt;p&gt;If you have an installation from source, or if you use the Omnibus
packages with your own reverse proxy (be it NGINX or Apache) then
you must upgrade your reverse proxy settings to direct Git HTTP
requests to gitlab-git-http-server instead of Unicorn. If you do
not do this, all Git push&#x2F;pull requests to your GitLab 8.0 server
will either fail or return empty repositories.&lt;&#x2F;p&gt;

&lt;p&gt;If you use an installation from source you also need to update your
GitLab init script so that it will start&#x2F;stop gitlab-git-http-server
along with other GitLab services.&lt;&#x2F;p&gt;

&lt;p&gt;Please see the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;7.14-to-8.0.html&quot;&gt;7.14 to 8.0 update
guide&lt;&#x2F;a&gt; for more
information on the new reverse proxy settings.&lt;&#x2F;p&gt;
&lt;h3 id=&quot;default-upgrade-behavior&quot;&gt;Default upgrade behavior&lt;&#x2F;h3&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run
migrations, and start again, no matter how &#x27;big&#x27; or &#x27;small&#x27; the
upgrade is. The behaviour can be changed by adding a
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;community-jenkins-integration&quot;&gt;Community Jenkins integration&lt;&#x2F;h3&gt;

&lt;p&gt;One of the biggest improvements of GitLab 8.0 is integrated GitLab CI.
Doing that required large amount of changes, including rebuild of the GitLab CI Service in GitLab.
With all these changes we removed the GitLabCiService. This change broke the Jenkins &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jenkinsci&#x2F;gitlab-plugin&quot;&gt;gitlab-plugin&lt;&#x2F;a&gt; that allowed Jenkins to act as an external GitLab CI in front of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;You can still use &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;jenkinsci&#x2F;gitlab-plugin&quot;&gt;mentioned plugin&lt;&#x2F;a&gt; with GitLab. For all Web Hooks that you added you need to enable not only &lt;em&gt;Merge Request Events&lt;&#x2F;em&gt;, but also &lt;em&gt;Push and Tag Events&lt;&#x2F;em&gt;. By doing that GitLab will properly notify Jenkins when you do &lt;strong&gt;git push&lt;&#x2F;strong&gt;. This doesn&#x27;t resolve missing build status for Jenkins builds in GitLab interface. We are working hard to bring the Commit Status API that will allow any external service to post the build status back to GitLab. When this gets implemented by the maintainer of this plugin it will make the integration much better then it was in versions prior to 8.0.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Enterprise Edition offers additional features for organisations.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;8_0&#x2F;sf.jpeg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.14.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/09/10/gitlab-7-dot-14-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/09/10/gitlab-7-dot-14-dot-3-released/</id>
<published>2015-09-10T00:00:00+00:00</published>
<updated>2015-09-10T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 7.14.3 for Community Edition (CE), Enterprise
Edition (EE), and Continuous Integration (CI).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fix:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CI&lt;&#x2F;strong&gt;: Fix commits ordering when using PostgreSQL&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;During &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;09&#x2F;gitlab-7-dot-14-dot-2-released&#x2F;&quot;&gt;yesterday&#x27;s release&lt;&#x2F;a&gt;, this fix meant to be included in 7.14.2 was
mistakenly omitted. Today we are releasing version 7.14.3 to properly include
the fix and apologize for the oversight.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.14.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/09/09/gitlab-7-dot-14-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/09/09/gitlab-7-dot-14-dot-2-released/</id>
<published>2015-09-09T00:00:00+00:00</published>
<updated>2015-09-09T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 7.14.2 for Community Edition (CE), Enterprise
Edition (EE), and Continuous Integration (CI).&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Fix &lt;code&gt;git blame&lt;&#x2F;code&gt; errors with ISO-encoded files&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Handle broken symlinks in create-hooks&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; &lt;strong&gt;&lt;em&gt;Security Fix&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; Escape user-provided content in preserved Haml
sections&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix rebase before merge.&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CI&lt;&#x2F;strong&gt;: &lt;del&gt;Fix commits ordering when using PostgreSQL&lt;&#x2F;del&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Update&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; &lt;em&gt;(2015-09-10 20:30 UTC)&lt;&#x2F;em&gt;: The CI fix mentioned above was mistakenly
omitted and a &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;09&#x2F;10&#x2F;gitlab-7-dot-14-dot-3-released&#x2F;&quot;&gt;new version has been released&lt;&#x2F;a&gt;
to include it.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This version includes required updates to external dependencies. Users
installing from source should be sure to follow the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-14-stable&#x2F;doc&#x2F;update&#x2F;7.13-to-7.14.md&quot;&gt;update guide&lt;&#x2F;a&gt;, particularly
the &quot;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-14-stable&#x2F;doc&#x2F;update&#x2F;7.13-to-7.14.md#4-update-gitlab-shell&quot;&gt;Update gitlab-shell&lt;&#x2F;a&gt;&quot; and &quot;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-14-stable&#x2F;doc&#x2F;update&#x2F;7.13-to-7.14.md#5-install-libs-migrations-etc&quot;&gt;Install libs, migrations, etc.&lt;&#x2F;a&gt;&quot; sections.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.14.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/08/25/gitlab-7-dot-14-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/08/25/gitlab-7-dot-14-dot-1-released/</id>
<published>2015-08-25T00:00:00+00:00</published>
<updated>2015-08-25T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing version 7.14.1 for GitLab Community Edition (CE),
Enterprise Edition (EE), and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Only include base URL in OmniAuth full_host parameter&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Fix Error 500 in API when accessing a group that has an avatar&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Fix &quot;Reload with full diff&quot; URL button in compare branch view&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CE:&lt;&#x2F;strong&gt; Improve abuse reports management from admin area&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;EE:&lt;&#x2F;strong&gt; Fix sign in form when just Kerberos is enabled&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CI:&lt;&#x2F;strong&gt; Fix &quot;skipped&quot; svg image&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;strong&gt;CI:&lt;&#x2F;strong&gt; Fix commit ordering&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This version does not include any new migrations, and should not require any
downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
Check out the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
Subscribers receive upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.14 released with improved syntax highlighting and Variables in CI</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/08/22/gitlab-7-14-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/08/22/gitlab-7-14-released/</id>
<published>2015-08-22T00:00:00+00:00</published>
<updated>2015-08-22T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;re pleased to announce version 7.14 of GitLab Community Edition (CE),
GitLab Enterprise Edition (EE), and GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;Whereas next month&#x27;s release, version 8.0, promises many new and exciting
features, our focus for 7.14 has been on fixing bugs and improving performance
and usability. Many of these bug fixes were contributed by this month&#x27;s
&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt; Stan Hu, bringing his total number of
awards to four. Thank you and congratulations, Stan!&lt;&#x2F;p&gt;

&lt;p&gt;To celebrate Stan&#x27;s hat-trick + 1 (4 MVP titles in the 7.x major release)
GitLab is giving him an extra weekend in Amsterdam after he joins us with the
rest of the core team for our summit during OSCON.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;beta-support-for-long-git-pushpull-over-https&quot;&gt;Beta: support for long git push&#x2F;pull over HTTPS&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab supports two protocols for pushing and fetching Git data from Git clients
such as the &lt;code&gt;git&lt;&#x2F;code&gt; command and &lt;a href=&quot;https:&#x2F;&#x2F;git-scm.com&#x2F;downloads&#x2F;guis&quot;&gt;GUI clients&lt;&#x2F;a&gt;:
SSH and HTTPS. Traditionally, the SSH protocol has been the best and sometimes
only way to do long-running (i.e., slow or large) push&#x2F;pull operations from Git
on your computer to a GitLab server. One of the reasons for this is that
&lt;a href=&quot;http:&#x2F;&#x2F;unicorn.bogomips.org&#x2F;&quot;&gt;Unicorn&lt;&#x2F;a&gt;, the Ruby web application server used by
GitLab, is not designed to handle many concurrent long-running requests. With
Unicorn, long git pushes&#x2F;pull will often fail (due to a timeout) after hogging
precious resources (Unicorn workers) for a long time.&lt;&#x2F;p&gt;

&lt;p&gt;To address this problem, we created
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-git-http-server&quot;&gt;gitlab-git-http-server&lt;&#x2F;a&gt;,
a stand-alone web server written in &lt;a href=&quot;https:&#x2F;&#x2F;golang.org&#x2F;&quot;&gt;Go&lt;&#x2F;a&gt; to take over (most
of) the job of serving Git HTTP requests. We use Nginx to route HTTP requests
either to Unicorn (normal requests) or gitlab-git-http-server (Git clients).&lt;&#x2F;p&gt;

&lt;p&gt;In the GitLab 7.14 Omnibus packages, gitlab-git-http-server is included but
disabled by default. In GitLab 8.0 we will deprecate the old Git HTTP server in
GitLab (&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-grack&quot;&gt;grack&lt;&#x2F;a&gt;).&lt;&#x2F;p&gt;

&lt;p&gt;If you want to start using gitlab-git-http-server ahead of the 8.0 release, as
we will on &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;gitlab.com&lt;&#x2F;a&gt;, you can add the following settings
to &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;gitlab_rails[&#x27;env&#x27;] = {
  &#x27;GITLAB_GRACK_AUTH_ONLY&#x27; =&amp;gt; &#x27;1&#x27;
}

gitlab_git_http_server[&#x27;enable&#x27;] = true
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Run &lt;code&gt;gitlab-ctl reconfigure&lt;&#x2F;code&gt; and &lt;code&gt;gitlab-ctl restart unicorn&lt;&#x2F;code&gt; after updating
your &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt; file.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-syntax-highlighting&quot;&gt;Improved syntax highlighting&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab has implemented the popular &lt;a href=&quot;http:&#x2F;&#x2F;rouge.jneen.net&#x2F;&quot;&gt;Rouge&lt;&#x2F;a&gt; library as
our syntax highlighter of choice. Rouge has support for 72 languages and does
a great job of properly highlighting your files in GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;show-who-edited-a-discussion-note&quot;&gt;Show who edited a discussion note&lt;&#x2F;h2&gt;

&lt;p&gt;When a note is edited by someone other than its original author, such as a
project administrator, we now show who it was along with the time.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_14&#x2F;comment_edit.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_14&#x2F;comment_edit.png&quot; alt=&quot;Note Modification&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-ldap-group-management-gitlab-ee&quot;&gt;Better LDAP group management (GitLab EE)&lt;&#x2F;h2&gt;

&lt;p&gt;Our Enterprise Edition users managing their GitLab groups with LDAP will be glad
to hear that we&#x27;ve improved the way they&#x27;re handled in GitLab. Groups synced
with LDAP can no longer be brought out of sync by group changes made via GitLab&#x27;s
interface.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;yaml-variables-gitlab-ci&quot;&gt;YAML Variables (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;Now you can define variables in your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file that will be passed
to your CI builds, allowing you to fine-tune linked services by, for example,
supplying a custom database name.&lt;&#x2F;p&gt;

&lt;p&gt;See &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;docker&#x2F;using_docker_images.html#configuring-services&quot;&gt;the Docker documentation&lt;&#x2F;a&gt; for configuring services and
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;variables&#x2F;README.html&quot;&gt;the CI documentation&lt;&#x2F;a&gt; for more information about variables.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;build-triggers-api-gitlab-ci&quot;&gt;Build Triggers API (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;As part of our ongoing effort to improve support for dependent builds, we&#x27;ve
introduced Build Triggers that can be used to force a rebuild of a specific
branch or tag via API call. To use Build Triggers, go to your project&#x27;s
&lt;strong&gt;Triggers&lt;&#x2F;strong&gt; page where you&#x27;ll find a custom link that can be called from other
services.&lt;&#x2F;p&gt;

&lt;p&gt;Build Triggers can also accept custom variables that can be used to customize
the behavior of the build scripts.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_14&#x2F;ci_triggers.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_14&#x2F;ci_triggers.png&quot; alt=&quot;Build Triggers&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;application-settings-interface-gitlab-ci&quot;&gt;Application Settings interface (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;re now surfacing application settings in the web interface of GitLab CI,
furthering our goal of making all of the GitLab applications as easy to
configure as possible.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_14&#x2F;ci_settings.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_14&#x2F;ci_settings.png&quot; alt=&quot;Application Settings&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-support-for-skipped-builds&quot;&gt;Better support for skipped builds&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab CI and its integration with GitLab CE and EE now have improved
support for builds skipped via the &lt;code&gt;[ci skip]&lt;&#x2F;code&gt; commit message tag.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_14&#x2F;ci_skipped.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_14&#x2F;ci_skipped.png&quot; alt=&quot;CI Skipped&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bundling-of-mattermost-now-possibly-rocketchat-in-the-future&quot;&gt;Bundling of Mattermost now, possibly RocketChat in the future&lt;&#x2F;h2&gt;

&lt;p&gt;In this release we&#x27;ve bundled Mattermost, an open source on-premises Slack alternative.
More information can be found in &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;08&#x2F;18&#x2F;gitlab-loves-mattermost&#x2F;&quot;&gt;the announcement&lt;&#x2F;a&gt;.
The current release is in alpha state, so we can&#x27;t guarantee it will be upgradable and recommend against exposing it to the public Internet.
Activation instructions can be found in the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;gitlab-mattermost&#x2F;&quot;&gt;Omnibus documentation for GitLab Mattermost&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;After we announced the Mattermost integration we &lt;a href=&quot;https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=10081963&quot;&gt;saw that RocketChat is also interested in shipping with the GitLab Omnibus packages&lt;&#x2F;a&gt;.
We didn&#x27;t consider RocketChat since they run on top of MongoDB while we prefer PostgreSQL, but it
seems that &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;meteor&#x2F;postgres-packages&quot;&gt;elephants don&#x27;t fly, most of the time&lt;&#x2F;a&gt;.
RocketChat is committed to &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;RocketChat&#x2F;Rocket.Chat&#x2F;milestones&#x2F;GitLab%200.8&quot;&gt;becoming compatible with the Omnibus packages&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re thinking of shipping RocketChat with the Omnibus packages of GitLab 8.1 (although earlier,
later, and not at all are also options). Having two different Slack alternatives
in the GitLab packages is not ideal. But both projects are moving quickly and
we find it hard to pick a winner now. Consider the alpha state a warning that
we don&#x27;t guarantee that both will ship with GitLab forever.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please view
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the full list of changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release&#x27;s migrations are minor. If you are on GitLab 7.13 CE or EE you can
upgrade to 7.14 while staying online.&lt;&#x2F;p&gt;

&lt;p&gt;The GitLab CI upgrade will require downtime.
Coming from 7.13 the database migrations in GitLab CI will be fast but they cannot be performed online.&lt;&#x2F;p&gt;

&lt;p&gt;Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how &quot;big&quot; or &quot;small&quot; the upgrade is. The behaviour
can be changed by adding a &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&#x2F;update&#x2F;README.html&quot;&gt;&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;skip-auto-migrations&lt;&#x2F;code&gt;
file&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;reminder-ruby-mri-20x-no-longer-supported&quot;&gt;Reminder: Ruby (MRI) 2.0.x no longer supported&lt;&#x2F;h3&gt;

&lt;p&gt;As of the previous release (7.13), we have dropped support for the 2.0.x
versions of Ruby (MRI). We support Ruby (MRI) 2.1.x and recommend using 2.1.6.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE-only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;7_14&#x2F;sf.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.13.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/08/12/gitlab-7-dot-13-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/08/12/gitlab-7-dot-13-dot-5-released/</id>
<published>2015-08-12T00:00:00+00:00</published>
<updated>2015-08-12T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;We reverted changes so that the satellites are now again used for performing git operations like merging MR and editing file with the web-editor. This because the new way to manage this operations didn&#x27;t trigger webhooks. We will reintroduce the removal of satellites in GitLab 8.0.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release upgrade will not require downtime&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.13.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/08/07/gitlab-7-dot-13-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/08/07/gitlab-7-dot-13-dot-4-released/</id>
<published>2015-08-07T00:00:00+00:00</published>
<updated>2015-08-07T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;ve released GitLab 7.13.4 for GitLab CE and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the ability to send abuse reports by users (CE) and a fix broken yaml error saving (CI).&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release upgrade will not require downtime&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.13.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/08/04/gitlab-7-dot-13-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/08/04/gitlab-7-dot-13-dot-3-released/</id>
<published>2015-08-04T00:00:00+00:00</published>
<updated>2015-08-04T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;ve released GitLab 7.13.3 for GitLab CE, EE and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes for CE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix bug causing Bitbucket importer to crash when the OAuth application had been removed.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;and for EE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Improved validation for an approver&lt;&#x2F;li&gt;
  &lt;li&gt;Don&#x27;t resend admin email to everyone if one delivery fails&lt;&#x2F;li&gt;
  &lt;li&gt;Added migration for removing of invalid approvers&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release upgrade will not require downtime&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.13.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/07/28/gitlab-7-dot-13-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/07/28/gitlab-7-dot-13-dot-2-released/</id>
<published>2015-07-28T00:00:00+00:00</published>
<updated>2015-07-28T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;ve released GitLab 7.13.2 for GitLab CE, EE and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes for CE and EE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix randomly failed spec&lt;&#x2F;li&gt;
  &lt;li&gt;Create project services on Project creation&lt;&#x2F;li&gt;
  &lt;li&gt;Add admin_merge_request ability to Developer level and up&lt;&#x2F;li&gt;
  &lt;li&gt;Fix Error 500 when browsing projects with no HEAD (Stan Hu)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix labels &#x2F; assignee &#x2F; milestone for the merge requests when issues are disabled&lt;&#x2F;li&gt;
  &lt;li&gt;Show the first tab automatically on MergeRequests#new&lt;&#x2F;li&gt;
  &lt;li&gt;Add rake task &#x27;gitlab:update_commit_count&#x27; (Daniel Gerhardt)&lt;&#x2F;li&gt;
  &lt;li&gt;Fix Gmail Actions&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release upgrade will require downtime, because redis has been updated to 2.8.21.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.13.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/07/23/gitlab-7-dot-13-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/07/23/gitlab-7-dot-13-dot-1-released/</id>
<published>2015-07-23T00:00:00+00:00</published>
<updated>2015-07-23T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;ve released GitLab 7.13.1 for GitLab CE, EE and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes for CE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix: Label modifications are not reflected in existing notes and in the issue list&lt;&#x2F;li&gt;
  &lt;li&gt;Fix: Label not shown in the Issue list, although it&#x27;s set through web interface&lt;&#x2F;li&gt;
  &lt;li&gt;Fix: Group&#x2F;project references are linked incorrectly&lt;&#x2F;li&gt;
  &lt;li&gt;Improve documentation&lt;&#x2F;li&gt;
  &lt;li&gt;Fix of migration: Check if session_expire_delay column exists before adding the column&lt;&#x2F;li&gt;
  &lt;li&gt;Fix: ActionView::Template::Error&lt;&#x2F;li&gt;
  &lt;li&gt;Fix: &quot;Create Merge Request&quot; isn&#x27;t always shown in event for newly pushed branch&lt;&#x2F;li&gt;
  &lt;li&gt;Fix bug causing &quot;Remove source-branch&quot; option not to work for merge requests from the same project.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;fixes for EE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Merge community edition changes for version 7.13.1&lt;&#x2F;li&gt;
  &lt;li&gt;Fix: &quot;Rebase before merge&quot; doesn&#x27;t work when source branch is in the same project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;and CI:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Security Fix: If user was assigned to project as non-master he could assign specific runners from that project to their own project.&lt;&#x2F;li&gt;
  &lt;li&gt;Fix: Don&#x27;t send notifications for jobs with allow_failure set&lt;&#x2F;li&gt;
  &lt;li&gt;Fix invalid link to doc.gitlab.com&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;No downtime is necessary.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.13 released with a Customizable Project Dashboard and even better Approvals</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/07/22/gitlab-7-13-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/07/22/gitlab-7-13-released/</id>
<published>2015-07-22T00:00:00+00:00</published>
<updated>2015-07-22T00:00:00+00:00</updated>
<author>
<name>GitLab</name>
</author>
<content type='html'>&lt;p&gt;It&#x27;s July and time for GitLab 7.13!
It&#x27;s been a warm month for most of us but it hasn&#x27;t slowed us down luckily.
&lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;07&#x2F;09&#x2F;1-5m-raised-in-seed-funding-for-gitlab-to-accelerate-growth-and-expand-operations&#x2F;&quot;&gt;We raised a seed round&lt;&#x2F;a&gt; and we &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;07&#x2F;03&#x2F;our-new-logo&#x2F;&quot;&gt;introduced a new logo&lt;&#x2F;a&gt;!&lt;&#x2F;p&gt;

&lt;blockquote class=&quot;twitter-tweet&quot; lang=&quot;en&quot;&gt;&lt;p lang=&quot;en&quot; dir=&quot;ltr&quot;&gt;The new &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;gitlab&quot;&gt;@gitlab&lt;&#x2F;a&gt; logo looks pretty awesome :)&lt;&#x2F;p&gt;&amp;mdash; Lev Lazinskiy (@levlaz) &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;levlaz&#x2F;status&#x2F;623117535618199552&quot;&gt;July 20, 2015&lt;&#x2F;a&gt;&lt;&#x2F;blockquote&gt;
&lt;script async=&quot;&quot; src=&quot;&#x2F;&#x2F;platform.twitter.com&#x2F;widgets.js&quot; charset=&quot;utf-8&quot;&gt;&lt;&#x2F;script&gt;

&lt;p&gt;Today, we&#x27;re happy to bring you a customizable Project Dashboard, better merge request approvals, a number of GitLab CI improvements (Docker support!) and more in this month&#x27;s GitLab release.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Stan Hu. He contributed support for commenting on side-by-side diffs.
This is the third time this year that Stan Hu is MVP, a GitLab hat-trick (three times MVP in the same major release!).
Thanks Stan, we&#x27;re happy to see you score more great features!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;customizable-project-dashboard&quot;&gt;Customizable Project Dashboard&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve gotten a lot of requests to make the README the default page of
projects in GitLab. At the same time, many of our contributors didn&#x27;t like
this idea. They just wanted to see what is happening, not the same README.&lt;&#x2F;p&gt;

&lt;p&gt;We kept redesigning it, looking for a great middle ground.
This time, we made it look good and are giving you the choice of what to see.&lt;&#x2F;p&gt;

&lt;p&gt;Want to see the README first? You can!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;dash_readme.png&quot; alt=&quot;Readme on Project Dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Rather see the activity in a project? Go ahead!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;dash_activity.png&quot; alt=&quot;Activity on Project Dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Change it in the settings, alongside the choice for either seeing the starred
projects or all projects on the home page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;dash_settings.png&quot; alt=&quot;Project Dashboard configuration&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;comment-on-side-by-side-diffs&quot;&gt;Comment on Side-by-Side diffs&lt;&#x2F;h2&gt;

&lt;p&gt;You can now place comments on side-by-side diffs.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;side_comment.png&quot; alt=&quot;Comments on side-by-side diff&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-merge-request-approvals-gitlab-ee&quot;&gt;Improved Merge Request Approvals (GitLab EE)&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab 7.12, we introduce Merge Request Approvals, allowing you to
set a number of required approvals before a Merge Request can be merged.&lt;&#x2F;p&gt;

&lt;p&gt;This month, we&#x27;re expanding the Approvals with the ability to set the
specific people that will have to approve a merge request. We&#x27;ve made it
flexible enough that you can have any combination of specific approvers and
unspecific approvers (Mindy and any one else, for instance).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;approvers_mr.png&quot; alt=&quot;Approvers in a Merge Request&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you want, you can set the default approvers for a project:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;approvers_settings.png&quot; alt=&quot;Setting default suggested approvers for a project&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;docker-support-for-gitlab-ci&quot;&gt;Docker support for GitLab CI&lt;&#x2F;h2&gt;

&lt;p&gt;This is a really cool new feature.
When configuring your project for GitLab CI, using the new
&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file, you can now make use of Docker Images and Services.&lt;&#x2F;p&gt;

&lt;p&gt;This means that all you need to run ruby test suite is the following
&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;image: ruby:2.2
services:
  - postgres:9.3
before_install:
  - bundle install

test:
  script:
  - bundle exec rake spec
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The Image is the name of any repository present in a local Docker Engine or
any repository that can be found at &lt;a href=&quot;https:&#x2F;&#x2F;registry.hub.docker.com&#x2F;&quot;&gt;Docker Hub&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;A Service is just another image that is run and linked to your build.
This image can run any application, but the most common use case is to
run a database container such as PostgreSQL.
So instead of having to install PostgreSQl with every build, you can simply
reuse your existing Services image, making your build less
complex and much faster.&lt;&#x2F;p&gt;

&lt;p&gt;For more information about the image and Docker Hub please read the &lt;a href=&quot;https:&#x2F;&#x2F;docs.docker.com&#x2F;introduction&#x2F;understanding-docker&#x2F;&quot;&gt;Docker Fundamentals&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Read more about this at &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;docker&#x2F;using_docker_images.html&quot;&gt;Using Docker Images&lt;&#x2F;a&gt;.
See &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;docker&#x2F;using_docker_build.html&quot;&gt;Using Docker Build&lt;&#x2F;a&gt; for more information on Docker features.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;allow_failure-option-for-jobs-gitlab-ci&quot;&gt;allow_failure option for jobs (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;If you want to ignore the status of a specific job when computing the status
of the build for a certain commit, you can now specify this with the
&lt;code&gt;allow_failure&lt;&#x2F;code&gt; option in the build script.&lt;&#x2F;p&gt;

&lt;p&gt;It&#x27;s easy to use in your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;rspec:
  script: bundle exec rspec
  allow_failure: true
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;cancel-all-builds-gitlab-ci&quot;&gt;Cancel all Builds (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;If a single commit starts many jobs in your GitLab CI project and you want
to cancel it, previously you&#x27;d have to cancel all builds by hand.
Now there is a single button that cancels all builds immediately.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_13&#x2F;ci_cancel.png&quot; alt=&quot;Quickly cancel all builds&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;flexible-build-types-gitlab-ci&quot;&gt;Flexible Build Types (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;We wanted to add flexibility to the configuration of build scripts.
Rather than having predefined build types, you can now group your builds
however you&#x27;d like it, with flexible build types.&lt;&#x2F;p&gt;

&lt;p&gt;This allows you to accurately define the behavior and order of builds in
&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;types:
  - build
  - test
  - deploy

rspec:
  type: test
  script: bundle exec rspec
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The script above, for instance, will execute all jobs with the type &lt;code&gt;build&lt;&#x2F;code&gt; first, followed by &lt;code&gt;test&lt;&#x2F;code&gt; and lastly &lt;code&gt;deploy&lt;&#x2F;code&gt;.
The next builds are executed only if all previous succeeds.
And, to speed-up building, all jobs for one type will run in parallel
automatically.&lt;&#x2F;p&gt;

&lt;p&gt;This is the first step towards flexible and powerful build pipelines in
GitLab CI with support for multiple stages.&lt;&#x2F;p&gt;

&lt;p&gt;You can read more information about this feature in &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;yaml&#x2F;README.html&quot;&gt;the .gitlab-ci.yml documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;runners-without-tags-gitlab-ci&quot;&gt;Runners without Tags (GitLab CI)&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab CI builds and runners can be tagged.
This allows you to do things like running different builds on different platforms. At GitLab we use this to build our packages.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab CI 7.12 and earlier would send tagged builds to runners without tags.
Now, runners without tags will only pick up builds that don&#x27;t have tags
assigned.&lt;&#x2F;p&gt;

&lt;p&gt;This is a breaking change coming from GitLab CI 7.12. If some of your builds
stop running after you upgrade to 7.13, make sure that your runners have tags
and builds assigned.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-omnibus-documentation&quot;&gt;Better Omnibus Documentation&lt;&#x2F;h2&gt;

&lt;p&gt;We spend a lot of time writing documentation. Some projects that started small,
like &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&quot;&gt;Omnibus-GitLab&lt;&#x2F;a&gt;, end up
becoming major projects with very large documentation. In this specific case,
it could use some restructuring and indexing.&lt;&#x2F;p&gt;

&lt;p&gt;All &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;omnibus&quot;&gt;Omnibus package documentation&lt;&#x2F;a&gt; can now be
found on our documentation site, &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;&quot;&gt;doc.GitLab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes. Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the CE Changelog&lt;&#x2F;a&gt;, &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;CHANGELOG-EE&quot;&gt;the EE Changelog&lt;&#x2F;a&gt; or &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the CI Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release upgrade will require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Coming from 7.12 the database migrations in GitLab and GitLab CI will be fast but they cannot be performed online.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-custom-git-hooks-no-longer-trigger-for-web-edits&quot;&gt;Update: Custom git hooks no longer trigger for web edits&lt;&#x2F;h3&gt;

&lt;p&gt;Due to changes in GitLab, custom git hooks no longer trigger for
commits made through the web UI. They do trigger as normal with pushes
to GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;re looking into a workaround for the problem and are planning to release
a patch for 7.13 that resolves this issue. Follow &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;1974#note_1845415&quot;&gt;this issue on GitLab.com&lt;&#x2F;a&gt;
for updates.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update-ruby-mri-20x-no-longer-supported&quot;&gt;Update: Ruby (MRI) 2.0.x no longer supported&lt;&#x2F;h3&gt;

&lt;p&gt;As of this release, we have dropped support for the 2.0.x versions of Ruby (MRI).
We support Ruby (MRI) 2.1.x and recommend using 2.1.6.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;important-notice-for-gitlab-ci-installations&quot;&gt;Important notice for GitLab CI installations&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab CI now uses symmetric encryption to share &#x27;secure variables&#x27;
(provided by your users) in the SQL database.
Symmetric encryption needs a secret key, which GitLab CI will generate for you
when you install &#x2F; upgrade to 7.13.&lt;&#x2F;p&gt;

&lt;p&gt;The key is called &lt;code&gt;db_key_base&lt;&#x2F;code&gt; and can be found in &#x2F;etc&#x2F;gitlab&#x2F;gitlab-secrets.json
(in Omnibus packages) or config&#x2F;secrets.yml (in installations from source).
If you lose this secret key during a backup restore
or a server migration, your users will lose their &#x27;secure variables&#x27;.&lt;&#x2F;p&gt;

&lt;p&gt;Don&#x27;t store the secret key in the same place as your database backups.
If you do, somebody who steals your backup also gets your users&#x27; secure variables.&lt;&#x2F;p&gt;

&lt;p&gt;If you use configuration management (Chef, Puppet etc.) you should
store the secret key securely in your configuration management system.
This way, your CI server uses the correct DB secret key after a server rebuild.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changed-default-location-of-database-socket-for-omnibus-packages&quot;&gt;Changed default location of database socket for Omnibus packages&lt;&#x2F;h3&gt;

&lt;p&gt;By default, PostgreSQL places the unix socket file inside of the &lt;code&gt;&#x2F;tmp&lt;&#x2F;code&gt; directory.
Prior to 7.13, GitLab installed using omnibus-gitlab packages would use PostgreSQL default socket location to connect to the database.
This has caused issues when installing GitLab using omnibus-gitlab packages if there is an existing PostgreSQL database.&lt;&#x2F;p&gt;

&lt;p&gt;Given the goal of omnibus-gitlab package to be self contained and not influenced by existing software we&#x27;ve moved the socket location to &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;postgresql&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you had previously set &lt;code&gt;db_host&lt;&#x2F;code&gt; setting in &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; explicitly for &lt;code&gt;gitlab_rails&lt;&#x2F;code&gt; or &lt;code&gt;gitlab_ci&lt;&#x2F;code&gt;, be aware that this will possibly require a change. For example, if you had&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;gitlab_rails&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;db_host&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&#x2F;tmp&#x27;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;this will need to change to&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight ruby&quot;&gt;&lt;code&gt;&lt;span class=&quot;n&quot;&gt;gitlab_rails&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;[&lt;&#x2F;span&gt;&lt;span class=&quot;s1&quot;&gt;&#x27;db_host&#x27;&lt;&#x2F;span&gt;&lt;span class=&quot;p&quot;&gt;]&lt;&#x2F;span&gt; &lt;span class=&quot;o&quot;&gt;=&lt;&#x2F;span&gt; &lt;span class=&quot;s1&quot;&gt;&#x27;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;postgresql&#x27;&lt;&#x2F;span&gt;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you didn&#x27;t change the db_host setting the migration will be completely automatic.&lt;&#x2F;p&gt;
&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;7_13&#x2F;ny.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Omnibus packages with OpenSSL 1.0.1p</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/07/10/omnibus-packages-with-openssl-1-dot-0-1p/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/07/10/omnibus-packages-with-openssl-1-dot-0-1p/</id>
<published>2015-07-10T00:00:00+00:00</published>
<updated>2015-07-10T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released new Omnibus packages for GitLab Community Edition, GitLab Enterprise Edition and GitLab Continuous Integration.
These new packages contain an OpenSSL security update.&lt;&#x2F;p&gt;



&lt;p&gt;Yesterday a &lt;a href=&quot;http:&#x2F;&#x2F;openssl.org&#x2F;news&#x2F;secadv_20150709.txt&quot;&gt;new version of OpenSSL&lt;&#x2F;a&gt; was released to address security vulnerability CVE-2015-1793.
This vulnerability, present in OpenSSL 1.0.1n and 1.0.1o, allows an attacker to trick an SSL client into accepting an untrusted server certificate.
This OpenSSL issue affects the Omnibus packages for GitLab 7.12 and newer because they contain OpenSSL 1.0.1o.
Older GitLab packages contain older versions of OpenSSL which are not affected by this particular issue.
This issue only affects outgoing SSL connections initiated by GitLab such as webhooks and &#x27;git clone&#x27; repository imports.
Incoming HTTPS requests are not affected (unless you use client side SSL certificates which is very uncommon).&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source you need to check whether the OpenSSL version provided by your operating system is affected.
Omnibus users should upgrade to the 7.12.2-omnibus.1 packages and run &lt;code&gt;sudo gitlab-ctl restart&lt;&#x2F;code&gt; to make sure the latest version of OpenSSL is used.&lt;&#x2F;p&gt;

&lt;p&gt;Please see our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt; for update instructions.
Coming from 7.12.x this upgrade requires short downtime because of &lt;code&gt;gitlab-ctl restart&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.12.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/07/03/gitlab-7-dot-12-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/07/03/gitlab-7-dot-12-dot-2-released/</id>
<published>2015-07-03T00:00:00+00:00</published>
<updated>2015-07-03T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we released version 7.12.2 of GitLab Community Edition, GitLab Continuous Integration and GitLab Enterprise Edition.
This version reverts a breaking change in GitLab CI 7.12.1 and fixes RPM upgrade problems.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlab-ci-runner-tags-and-runners-without-tags&quot;&gt;GitLab CI runner tags and runners without tags&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab CI builds and runners can be tagged.
This allows you to do things like running different builds on different platforms: some on Linux, some on Windows.
GitLab CI 7.12.0 and earlier would send tagged builds to runners without tags.
This is not what we intended and we &#x27;fixed&#x27; it in 7.12.1.
But now we &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;issues&#x2F;210&quot;&gt;found out&lt;&#x2F;a&gt; that some users were depending on untagged runners running tagged builds.
A breaking change like this does not belong in a patch release (7.12.1) so in GitLab CI 7.12.2 we are bringing back the old behavior.
The change will come back in GitLab CI 7.13.0.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;omnibus-rpm-upgrades&quot;&gt;Omnibus RPM upgrades&lt;&#x2F;h2&gt;

&lt;p&gt;In the GitLab 7.12.0 and 7.12.1 RPM packages we were seeing an &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;issues&#x2F;649&quot;&gt;issue&lt;&#x2F;a&gt; where right after &lt;code&gt;yum update&lt;&#x2F;code&gt;, GitLab would not be in a correctly configured state.
A file called &lt;code&gt;.gitlab_shell_secret&lt;&#x2F;code&gt; was going missing.
This problem could and can be solved quickly by running &lt;code&gt;gitlab-ctl reconfigure&lt;&#x2F;code&gt; manually after upgrading.
It was caused by an unfortunate interaction of a packaging change we made and the way that RPM handles package upgrades.
We included a fix in the GitLab 7.12.2 packages that removes the need for the second manual &lt;code&gt;gitlab-ctl reconfigure&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-fixes&quot;&gt;Other fixes&lt;&#x2F;h2&gt;

&lt;p&gt;We also fixed a CSS alignment issue in GitLab Enterprise Edition and an Oauth integration bug in both Community Edition and Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;For more details on the changes please see the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CE&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;CHANGELOG-EE&quot;&gt;EE&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CI&lt;&#x2F;a&gt;, and
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;Omnibus&lt;&#x2F;a&gt;
CHANGELOGs.&lt;&#x2F;p&gt;

&lt;p&gt;Please see our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt; for update instructions.
Coming from 7.12.0 or 7.12.1, updating to 7.12.2 does not require downtime.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.12.1 patch release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/07/01/gitlab-7-dot-12-dot-1-patch-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/07/01/gitlab-7-dot-12-dot-1-patch-release/</id>
<published>2015-07-01T00:00:00+00:00</published>
<updated>2015-07-01T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we released GitLab 7.12.1 (Community Edition, Enterprise Edition and
Continuous Integration). This is a bug fix release.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab Community Edition (CE) and Enterprise Edition (EE) 7.12.1 contain fixes
for integration with external issue trackers (e.g. Redmine), user removal and
SAML user activation.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab Continuous Integration (CI) we fixed several bugs related to the new
&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; job specification format.&lt;&#x2F;p&gt;

&lt;p&gt;In the Omnibus packages we fixed the remote_syslog feature (EE only), added
support for special SAML settings in gitlab.yml, and we fixed a bug in the
automatic GitLab &#x2F; GitLab CI integration.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a name=&quot;omnibus-fix-web-tags&quot;&gt;&lt;&#x2F;a&gt;&amp;lt;&#x2F;a&amp;gt;&lt;em&gt;Update 2015-07-02&lt;&#x2F;em&gt;: we have just pushed
new Omnibus packages (7.12.1.omnibus.1) which fix a regression preventing users
from creating annotated Git tags in the web interface.&lt;&#x2F;p&gt;

&lt;p&gt;For more details on the changes please see the
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CE&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;EE&lt;&#x2F;a&gt;,
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CI&lt;&#x2F;a&gt;, and
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;CHANGELOG.md&quot;&gt;Omnibus&lt;&#x2F;a&gt;
CHANGELOGs.&lt;&#x2F;p&gt;

&lt;p&gt;Please see our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;Update page&lt;&#x2F;a&gt; for update instructions. Coming from
7.12.0 updating to 7.12.1 does not require downtime.&lt;&#x2F;p&gt;

&lt;p&gt;Edit: added comment about downtime.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.12 released with SAML support, Merge Request Approvers and .gitlab-ci.yml</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/06/22/gitlab-7-12-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/06/22/gitlab-7-12-released/</id>
<published>2015-06-22T00:00:00+00:00</published>
<updated>2015-06-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;A new season is in, and so is GitLab 7.12! This month&#x27;s release brings some big
additions and changes to Community Edition (CE), Enterprise Edition (EE) and Continuous Integration (CI).
In both CE and EE, GitLab now supports authentication using
SAML! This was requested by many and we&#x27;re very happy that CERN
was so kind to contribute this. In GitLab Enterprise Edition you can now require multiple
people to approve a merge request before it can be merged. In GitLab CI, we&#x27;re
introducing the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file, making job scripts much easier to manage.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s MVP was an easy choice. Alexandre Lossent from &lt;a href=&quot;http:&#x2F;&#x2F;home.web.cern.ch&#x2F;&quot;&gt;CERN&lt;&#x2F;a&gt;
(where the web was born) contributed the SAML code they
wrote for their own usage. We&#x27;re very happy with this contribution and are sure
many of you will make use of this.
Thanks Alexandre!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;saml-support&quot;&gt;SAML Support&lt;&#x2F;h2&gt;

&lt;p&gt;With Alexandre&#x27;s contribution, GitLab can now be configured to act as
a SAML 2.0 Service Provider. This allows GitLab to consume assertions from a SAML 2.0
Identity Provider (IdP) such as Microsoft Active Directory Federation Services to authenticate users.&lt;&#x2F;p&gt;

&lt;p&gt;See our &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;integration&#x2F;saml.html&quot;&gt;documentation on how to set up SAML integration&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;web-hook-for-comments&quot;&gt;Web Hook for Comments&lt;&#x2F;h2&gt;

&lt;p&gt;There is a new webhook available that will trigger on all comments.
You could use this to add additional automations and integrations to GitLab.
For instance when someone comments on a merge request, you can have it
trigger internal systems or, depending on the comment contents,
run a certain build.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;better-performance-for-the-web-editor&quot;&gt;Better performance for the Web Editor&lt;&#x2F;h2&gt;

&lt;p&gt;Every new release of GitLab is faster than the last, but in this release
we did something special. Instead of performing code changes via the web
interface by cloning the bare repository to a temporary location, committing
there, and then pushing the changes back to the bare repository, we now commit
your changes directly into the bare repository. This has significantly
improved the performance of the web editor.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ui-update&quot;&gt;UI Update&lt;&#x2F;h2&gt;

&lt;p&gt;Every month we experiment and tune our UI to be better, prettier and more intuitive
and this month is no different.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve moved your profile link to the bottom left and updated the looks of
various parts of the UI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_12&#x2F;profile.png&quot; alt=&quot;Profile bottom left&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-approvers-ee-only&quot;&gt;Merge Request Approvers (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;If you want to make sure that merge requests on your favorite project are
reviewed by more than one person before they are merged, you can now configure a minimum number of Merge Request approvals for it.&lt;&#x2F;p&gt;

&lt;p&gt;You simply set the amount of approvals that a merge request needs before allowing
it to be merged and GitLab will restrict anyone from merging until the set amount
of approvals has been met.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_12&#x2F;approvals_settings.png&quot; alt=&quot;Setting up merge request approvers&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;7_12&#x2F;approvals_mr.png&quot; alt=&quot;Using merge request approvers&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;d love to hear how you are using this feature in your organization.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-hook-to-check-maximum-file-size-ee-only&quot;&gt;Git hook to check Maximum File Size (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve added a new Git Hook that allows you to restrict the incoming commits
with large files. You can simply set the threshold
and GitLab will block all future Git pushes containing files that are too big.
This can be used to prevent people from committing build artifacts, or to motivate them to use git-annex or some other form of large file storage when that&#x27;s more appropriate.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ldap-group-sync-improvements-ee-only&quot;&gt;LDAP Group Sync improvements (EE only)&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve made several improvements to LDAP Group sync in GitLab EE.
It now checks for several more attributes when syncing and
prevents the sync from removing the last owner in a group.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-ciyml-file-replaces-jobs-ci&quot;&gt;&lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file replaces jobs (CI)&lt;&#x2F;h2&gt;

&lt;p&gt;As &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;05&#x2F;06&#x2F;why-were-replacing-gitlab-ci-jobs-with-gitlab-ci-dot-yml&#x2F;&quot;&gt;announced on May 6&lt;&#x2F;a&gt;
we&#x27;re replacing GitLab CI jobs with a &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file stored in the code repository.
The advantages are listed in the announcement but the main ones are:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Since the build script is version controlled, more people can see it and propose changes&lt;&#x2F;li&gt;
  &lt;li&gt;Older and newer branches build correctly since they can contain a different build file&lt;&#x2F;li&gt;
  &lt;li&gt;Forks automatically get a proper build script that gets updated when they merge upstream in&lt;&#x2F;li&gt;
  &lt;li&gt;You can experiment with CI build settings in your branch without breaking other branches&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;The above things are not possible with Jenkins-like scripts that are the same for the whole project.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;how-it-works&quot;&gt;How it works&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab sends the web-hook and the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; contents
to the CI Coordinator, which creates builds based on the YAML file. In turn,
these builds are executed by the Runners as it was before.&lt;&#x2F;p&gt;

&lt;p&gt;Here is an example of YAML file:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;before_script:
  - gem install bundler
  - bundle install
  - bundle exec rake db:create

rspec:
  script: &quot;rake spec&quot;
  tags:
    - ruby
    - postgres
  only:
    - branches

spinach:
  script: &quot;rake spinach&quot;
  tags:
    - ruby
    - mysql
  except:
    - tags

staging:
  script: &quot;cap deploy staging&quot;
  type: deploy
  tags:
    - capistrano
    - debian
  except:
    - stable

production:
  script:
    - cap deploy production
    - cap notify
  type: deploy
  tags:
    - capistrano
    - debian
  only:
    - master
    - &#x2F;^deploy-.*$&#x2F;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;We include a Lint tool to check your syntax. It is available in every GitLab CI instance by the short url &lt;code&gt;&#x2F;lint&lt;&#x2F;code&gt;.
If something goes wrong with your &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; after push your code you will be able to see errors in the commit page.&lt;&#x2F;p&gt;

&lt;p&gt;The &lt;code&gt;before_script&lt;&#x2F;code&gt; section will be performed before each job.
You can define a deploy job by adding &lt;code&gt;type: deploy&lt;&#x2F;code&gt;.
Every job contains parameters such as &lt;code&gt;script&lt;&#x2F;code&gt; (shell script), &lt;code&gt;tags&lt;&#x2F;code&gt;
(only runner with this tag&#x2F;tags can pick this build) and &lt;code&gt;only&lt;&#x2F;code&gt; or &lt;code&gt;except&lt;&#x2F;code&gt; parameter
that defines branch names allowed to run build on.
The &lt;code&gt;only&lt;&#x2F;code&gt; section takes precedence over the &quot;except&quot;.
You can read more information about new syntax in the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;yaml&#x2F;README.html&quot;&gt;Configuration of your builds with .gitlab-ci.yml&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The new format is inspired by the work of Travis CI and CircleCI who are already using YAML files.
Initially we considered using the open source modules of Travis CI,
but we ended up writing our own so we could offer:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Customizable deploy jobs&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to run jobs on metal, VM&#x27;s and docker images&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to run on the same machine each time (for example for performance testing)&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to run on special architectures (for example a Raspberry Pi 2)&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to run on machines in a special place or with certain credentials&lt;&#x2F;li&gt;
  &lt;li&gt;A simple and shallow syntax for the YAML file&lt;&#x2F;li&gt;
  &lt;li&gt;Named jobs, so they are easily recognizable&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;Because of this, the &quot;one image per architecture and that&#x27;s it&quot; -approach was not an option.
As you are able to tag runners and jobs, this gives you a lot of freedom in
assigning a job to a certain runner.
We hope the new format combines the freedom of Jenkins
with the user friendliness of Travis CI.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;migrating&quot;&gt;Migrating&lt;&#x2F;h3&gt;

&lt;p&gt;Upon upgrading to GitLab 7.12, your CI job scripts will be converted automatically
into an example &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file, which you can view and download in the
project page in GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;On a push that triggers a build, GitLab sends along the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; file
from the root of the repository. If this is not present, GitLab CI will make use
of the generated example script. This means your projects that are not updated
should work fine. However, we do recommend that you add the &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt;
file to the root of your repository as soon as possible.&lt;&#x2F;p&gt;

&lt;p&gt;You should add &lt;code&gt;.gitlab-ci.yml&lt;&#x2F;code&gt; files to all branches in your projects that receive
ongoing Git pushes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;beta-secret-variables-for-runner-ci&quot;&gt;BETA: Secret Variables for runner (CI)&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve added a new function to GitLab CI that allows you to set secret variables
for runners. Secret variables will be set to the environment by the runner
and will be hidden from the build log.
Use them for passwords, secret keys or anything else.
Make sure you have runner version 0.4 or greater (released today).&lt;&#x2F;p&gt;

&lt;p&gt;This feature is currently in beta.
Secrets added to GitLab CI 7.12 will be stored in its SQL database WITHOUT encryption.
We will add encryption in 7.13.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_12&#x2F;secrets.png&quot; alt=&quot;Secret Variables&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This release only adds minor migrations.
If you are on GitLab 7.11 CE or EE you can upgrade to 7.12 while staying online.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;changed-behavior-for-secret_token-settings-when-using-omnibus-packages&quot;&gt;Changed behavior for &#x27;secret_token&#x27; settings when using Omnibus packages&lt;&#x2F;h4&gt;

&lt;p&gt;If you set a custom value for &lt;code&gt;gitlab_rails[&#x27;secret_token&#x27;]&lt;&#x2F;code&gt;, &lt;code&gt;gitlab_shell[&#x27;secret_token&#x27;]&lt;&#x2F;code&gt; or &lt;code&gt;gitlab_ci[&#x27;secret_token&#x27;]&lt;&#x2F;code&gt; in &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; then please double-check that the value in &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt; matches the value in &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab-secrets.json&lt;&#x2F;code&gt;.
If some of the values do not match, copy the values from &lt;code&gt;gitlab-secrets.json&lt;&#x2F;code&gt; to &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt; prior to upgrading to GitLab 7.12.&lt;&#x2F;p&gt;

&lt;p&gt;Prior to 7.12, any &lt;code&gt;secret_token&lt;&#x2F;code&gt; values you had in &lt;code&gt;gitlab.rb&lt;&#x2F;code&gt; were actually being ignored in favor of whatever is in &lt;code&gt;gitlab-secrets.json&lt;&#x2F;code&gt;.
This was an unexpected behaviour as it was expected that specifying a setting in gitlab.rb always takes precedence.&lt;&#x2F;p&gt;

&lt;p&gt;On most GitLab omnibus installations the &#x27;secret_token&#x27; values are set only in &lt;code&gt;gitlab-secrets.json&lt;&#x2F;code&gt;, and no action is required.&lt;&#x2F;p&gt;

&lt;p&gt;This change only applies to GitLab omnibus packages.
Installations from source are not affected.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;changed-detection-of-the-operating-system-init&quot;&gt;Changed detection of the operating system init&lt;&#x2F;h4&gt;

&lt;p&gt;When running &lt;code&gt;gitlab-ctl reconfigure&lt;&#x2F;code&gt; omnibus-gitlab needs to decide if the system
is using SysV init, Upstart or Systemd so it can install the &lt;code&gt;gitlab-runsvdir&lt;&#x2F;code&gt; service.&lt;&#x2F;p&gt;

&lt;p&gt;Prior to this version, this decision was being done by looking at the platform and version of the OS and what the default init for that system was.&lt;&#x2F;p&gt;

&lt;p&gt;This was unreliable and with omnibus-gitlab being installable on more OS&#x27; code that handles this became complicated and error prone.&lt;&#x2F;p&gt;

&lt;p&gt;From this release onwards, this has been replaced and detection is done by querying the OS init system. Based on this response &lt;code&gt;gitlab-runsvdir&lt;&#x2F;code&gt; service is installed.&lt;&#x2F;p&gt;

&lt;p&gt;If you encounter an issue as described in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;tree&#x2F;master#reconfigure-freezes-at-ruby_blocksupervise_redis_sleep-action-run&quot;&gt;omnibus-gitlab README&lt;&#x2F;a&gt; try applying the workaround and raise an issue on the omnibus-gitlab issue tracker.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;updated-recommended-ssl-cipher-suites&quot;&gt;Updated recommended SSL cipher suites&lt;&#x2F;h4&gt;

&lt;p&gt;Following the &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;05&#x2F;21&#x2F;security-advisory-for-logjam-vulnerability&#x2F;&quot;&gt;Logjam vulnerability&lt;&#x2F;a&gt; we changed the recommended SSL cipher suites in omnibus-packages and installations from source. More details can be found in &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;06&#x2F;17&#x2F;gitlab-com-and-logjam&#x2F;&quot;&gt;this blogpost&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the
&lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;downloads&#x2F;&quot;&gt;download GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;7_12&#x2F;sf.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.11.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/05/28/gitlab-7-dot-11-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/05/28/gitlab-7-dot-11-dot-4-released/</id>
<published>2015-05-28T00:00:00+00:00</published>
<updated>2015-05-28T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;ve released GitLab 7.11.4 for GitLab CE, EE and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes for CE and EE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix rendering of list bullets&lt;&#x2F;li&gt;
  &lt;li&gt;Force a &lt;code&gt;rel=&quot;nofollow&quot;&lt;&#x2F;code&gt; attribute on all external links in markdown&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;For GitLab Enterprise Edition this patch release also fixes a bug in
git-annex. This fix was also included in the (unannounced) 7.11.3 patch.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This is a minor update, without any migrations.
No downtime is necessary.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/05/27/gitlab-7-dot-10-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/05/27/gitlab-7-dot-10-dot-5-released/</id>
<published>2015-05-27T00:00:00+00:00</published>
<updated>2015-05-27T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;In GitLab 7.11 we have &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;05&#x2F;22&#x2F;gitlab-7-11-released&#x2F;&quot;&gt;introduced&lt;&#x2F;a&gt;
the requirement of a license key for users of GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This can cause a moment of downtime when upgrading, as you will need to upload
the license key before being able to push to the GitLab instance.&lt;&#x2F;p&gt;

&lt;p&gt;With this patch release we&#x27;re adding a license upload functionality that allows
you to upload your license in GitLab 7.10.5, preventing downtime when upgrading
to GitLab 7.11 Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;This patch release also includes a fix for GitLab Annex and patches a MySQL
vulnerability in GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;If you are not using GitLab Enterprise Edition,
you can skip this patch and go straight to &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;05&#x2F;22&#x2F;gitlab-7-11-released&#x2F;&quot;&gt;GitLab 7.11&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This is a minor update, without any migrations.
No downtime is necessary.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;As Enterprise Edition user, if you want to update to 7.10.5 rather than straight to 7.11,
download and install the Omnibus package
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;at the old download location, here.&lt;&#x2F;a&gt;.
For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.11 released with Two-factor Authentication and a publicly viewable Enterprise Edition</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/05/22/gitlab-7-11-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/05/22/gitlab-7-11-released/</id>
<published>2015-05-22T00:00:00+00:00</published>
<updated>2015-05-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;It&#x27;s the 22nd of the month, so we have a new GitLab release ready!
GitLab 7.11 brings more improvements to the look and feel of GitLab,
two-factor authentication, a version check and more!&lt;&#x2F;p&gt;

&lt;p&gt;Of course we&#x27;re also releasing GitLab CI 7.11, with a new backup and restore
utility, improvements in the UI and other new features.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s MVP is &lt;a href=&quot;http:&#x2F;&#x2F;jamesnewton.com&#x2F;&quot;&gt;James Newton&lt;&#x2F;a&gt; (newton on IRC)!
James is very active on our &lt;code&gt;#gitlab&lt;&#x2F;code&gt; IRC channel, often helping people out
with issues or helping people getting started with GitLab. We&#x27;re very
happy to have James supporting the community and believe that is deserving
of a MVP award!
Thanks James!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;better-looking-sidebar&quot;&gt;Better looking sidebar&lt;&#x2F;h2&gt;

&lt;p&gt;We changed the look of the sidebar to reflect its function better and make it look
more pretty:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;sidebar.png&quot; alt=&quot;The new sidebar in GitLab 7.11&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;clean-project-dashboard&quot;&gt;Clean project dashboard&lt;&#x2F;h2&gt;

&lt;p&gt;The project dashboard was a good example of design by committee, one GitLab
contributor noted. We broomed through it and cleaned it up:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;project.png&quot; alt=&quot;Project Dashboard in GitLab 7.11&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;two-factor-authentication&quot;&gt;Two-factor authentication&lt;&#x2F;h2&gt;

&lt;p&gt;Keep your code more secure and start using two-factor authentication (2FA)!
GitLab has built-in 2FA in both CE and EE now and makes use of the convenient
Google Authenticator.&lt;&#x2F;p&gt;

&lt;p&gt;All you have to do is go to your Profile &amp;gt; Account and scan the QR code using
Google&#x27;s app.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;2fa.png&quot; alt=&quot;two-factor authentication&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;From now on, on login you&#x27;ll be required to provide the code the app gives you
for GitLab. Two-factor authentication only works with the web-UI for now.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;user-roles-in-comments&quot;&gt;User roles in comments&lt;&#x2F;h2&gt;

&lt;p&gt;Now you know who&#x27;s who in your favorite project. On comments you will see
the role of the person in that project:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;roles.png&quot; alt=&quot;not an actual conversation&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;task-lists-everywhere&quot;&gt;Task lists everywhere&lt;&#x2F;h2&gt;

&lt;p&gt;Want a task list in the comments? Now you can!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;task.png&quot; alt=&quot;Task list in comments&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;version-check&quot;&gt;Version Check&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab releases a new version &lt;em&gt;every single month on the 22nd&lt;&#x2F;em&gt;, so we understand
that people are not always up to date. We wanted to give you some help with
this, so from now on you can quickly see which version of GitLab you have running
by visiting the Help or Admin page. It will show if you are up to date and
if there is a security release you should have installed.&lt;&#x2F;p&gt;

&lt;p&gt;Read more about the version check in our &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;05&#x2F;07&#x2F;version-check&#x2F;&quot;&gt;blog post about it.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can turn off the version check under Admin &amp;gt; Settings.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;license-keys-for-enterprise-edition&quot;&gt;License keys for Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Enterprise Edition used to live in a private repository, which was fine up
until now. However, with the addition of our package server, we want
to make it easier to start using GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;Rather than locking up the package repository of GitLab EE, we decided to
open up all the code and &lt;a href=&quot;https:&#x2F;&#x2F;packages.gitlab.com&#x2F;gitlab&#x2F;gitlab-ee&quot;&gt;packages&lt;&#x2F;a&gt; and start using license keys. The code
is still proprietary, but now is &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ee&#x2F;&quot;&gt;publicly viewable&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This has several advantages. The installation of GitLab EE becomes as easy as
installing GitLab CE. You no longer needs access to specific repositories,
rather you can download it using the same methods as CE (including AWS&#x2F;Azure templates, Docker images, etc).&lt;&#x2F;p&gt;

&lt;p&gt;In addition, the code for Enterprise Edition is now becoming open to inspect
for everyone. This will make it easier to send enhancements and makes it easier
to do a trial of Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;Getting organizations to purchase a subscription after their trial expires or
at renewal time sometimes took a substantial effort from us.
We don&#x27;t want to raise prices for customers that renew without prompting because
we need to invest more time in unresponsive customers.
Therefore we decided to introduce license keys that prompt customers automatically.
We regret the inconvenience that license keys introduce
but we think it is the best solution to keep prices low.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;true-up-model-for-subscriptions&quot;&gt;True-up model for subscriptions&lt;&#x2F;h2&gt;

&lt;p&gt;The worst thing about license keys is that they can be very inflexible.
Most GitLab installations quickly grow in popularity within the organization.
Having to purchase a new license key every time this happens is very inefficient.
Also, we noticed that the majority of our customers didn&#x27;t have a compliant subscription, for us this indicates that having to renew the subscription multiple times a year is very inconvenient.&lt;&#x2F;p&gt;

&lt;p&gt;Therefore we will switch to a true-up model that allows you to grow now and pay later.
When you get a new license you should get it for your current number of active users.
For users that are added during the year you pay half price when you renew.&lt;&#x2F;p&gt;

&lt;p&gt;So if you have 100 active users today you get a 100 user subscription.
Suppose that when you renew a year from now you have 300 active users.
You pay for a 300 user subscription and pay half a year for the 200 users that you added during the year.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;getting-the-license-key&quot;&gt;Getting the license key&lt;&#x2F;h3&gt;

&lt;p&gt;If you are currently a GitLab customer, you should have received your license
key already at the email you registered with your payment. You can also email
&lt;code&gt;sales at gitlab dot com&lt;&#x2F;code&gt; to request it at any time.&lt;&#x2F;p&gt;

&lt;p&gt;New subscribers will receive their license key automatically.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;installing-the-license-key&quot;&gt;Installing the license key&lt;&#x2F;h3&gt;

&lt;p&gt;To install the license, vist &lt;code&gt;&#x2F;admin&#x2F;license&lt;&#x2F;code&gt; in your GitLab instance as an
admin. Here you can upload your &lt;code&gt;.gitlab-license&lt;&#x2F;code&gt; file, which will instantly
unlock GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;license.png&quot; alt=&quot;Installing your license&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can also download and review your current license here.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Please note that we will release GitLab 7.10.5 soon, that will allow you to
upload the license key to your GitLab instance before upgrading, to avoid
unnecessary downtime.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;two-factor-authentication-for-ldap--active-directory-ee-only&quot;&gt;Two-Factor Authentication for LDAP &#x2F; Active Directory (EE-only)&lt;&#x2F;h2&gt;

&lt;p&gt;Want to use two-factor authentication together with your LDAP or Active Directory
integration? With GitLab Enterprise Edition you can.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-gitlab-ci-features&quot;&gt;New GitLab CI Features&lt;&#x2F;h2&gt;

&lt;p&gt;With the release of GitLab 7.11, we also updated GitLab CI to 7.11.
Some changes worth mentioning are an improved runners page,
public accessible build and commit pages for public projects
, a new backup&#x2F;restore utility that will backup your CI database and
HipChat notifications!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-awesome-changes-in-gitlab-ce&quot;&gt;Other awesome changes in GitLab CE&lt;&#x2F;h2&gt;

&lt;p&gt;We can never cover all the new stuff in each GitLab release, but these
are worth to have a quick look at as well:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Quick quote-reply&lt;&#x2F;strong&gt; You can now reply with a quotation by simply selecting text in an issue
or merge request and pressing &lt;code&gt;r&lt;&#x2F;code&gt;. It will set the focus to the editing window
and have the quoted text already in it!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Atom feeds for all!&lt;&#x2F;strong&gt; There is now an atom feed for each project!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Settings in admin UI&lt;&#x2F;strong&gt; We moved default project and snippet visibility settings
to the admin web interface.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Improved UI for mobile&lt;&#x2F;strong&gt; GitLab is now better viewable on mobile!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;WIP your MRs!&lt;&#x2F;strong&gt; If you add &lt;code&gt;WIP&lt;&#x2F;code&gt; or &lt;code&gt;[WIP]&lt;&#x2F;code&gt; (work in progress) to the start of the title of a merge request,
it will be protected from merging now.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_11&#x2F;wip.png&quot; alt=&quot;WIP blocking the merge request of this blog post!&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This release has more improvements, including security fixes, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Coming from 7.10, the migrations in 7.11 are pretty fast (under 1 minute), but one of them is tricky:
we rename any existing users with names ending in a period (&#x27;.&#x27;).
This migration updates both the database and the filesystem and previous versions
of this migration have proven to be fragile.&lt;&#x2F;p&gt;

&lt;p&gt;If you have no user namespaces with paths ending in &#x27;.&#x27; in your database and if you trust your users not to
create any until after you upgrade to GitLab 7.11 you can perform this upgrade online.
If not, we recommend to take downtime (this is what we did for gitlab.com).
You can find the current number of affected database records with the following command:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt; sudo gitlab-rails runner &quot;puts Namespace.where(type: nil).where(%q{path LIKE &#x27;%.&#x27;}).count&quot;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please note that cookbook-omnibus-gitlab, our Chef cookbook that installs&#x2F;manages GitLab omnibus packages,
does not yet support packages.gitlab.com. See &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;cookbook-omnibus-gitlab&#x2F;issues&#x2F;8&quot;&gt;this issue&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE-only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;7_11&#x2F;ny.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/05/11/gitlab-7-dot-10-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/05/11/gitlab-7-dot-10-dot-4-released/</id>
<published>2015-05-11T00:00:00+00:00</published>
<updated>2015-05-11T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Last week we had to pull our 7.10.2 release as in a small number of installations
the migrations would fail because of a uniqueness constraint on tags. We
did not release GitLab 7.10.3, as we improved a migration after creating
the 7.10.3 version tag and wanted to include that in our patch release.&lt;&#x2F;p&gt;

&lt;p&gt;Today we release GitLab 7.10.4 which solves the issues with the migrations
and contains all fixes also present in 7.10.2. If you&#x27;ve already successfully
upgraded to 7.10.2, you do not need to update at this time.&lt;&#x2F;p&gt;

&lt;p&gt;The fixes in this patch:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix migrations broken in 7.10.2&lt;&#x2F;li&gt;
  &lt;li&gt;Add missing indices to tags for some installations&lt;&#x2F;li&gt;
  &lt;li&gt;Make tags for GitLab installations running on MySQL case sensitive&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;And the following were fixed with 7.10.2, also included here:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;A bug when using the Gitorious importer&lt;&#x2F;li&gt;
  &lt;li&gt;A bug that prevented adding group members through the admin screen&lt;&#x2F;li&gt;
  &lt;li&gt;Broken links on the merge request page leading to CI services&lt;&#x2F;li&gt;
  &lt;li&gt;A 500 error when trying to search in the wiki&lt;&#x2F;li&gt;
  &lt;li&gt;A 500 error when trying to add new tags to a project&lt;&#x2F;li&gt;
  &lt;li&gt;A bug where commit data would not appear in some subdirectories due to escaped slashes&lt;&#x2F;li&gt;
  &lt;li&gt;A bug where branches with escaped characters in their names would not always work
in the compare view&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;There is a migration that loops through all tags.
This can take a while for larger installations.&lt;&#x2F;p&gt;

&lt;p&gt;The upgrade can be performed online.&lt;&#x2F;p&gt;

&lt;p&gt;Theoretically, there is a small chance that if a tag is created during
the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;db&#x2F;migrate&#x2F;20150425164649_add_taggings_counter_cache_to_tags.acts_as_taggable_on_engine.rb&quot;&gt;migration&lt;&#x2F;a&gt;
of that specific tag, the tag counter gets a value that is
slightly higher or lower than its actual value. We do not believe this
is reason to schedule downtime and recommend performing the upgrade online.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.10.4 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/05/07/gitlab-7-dot-10-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/05/07/gitlab-7-dot-10-dot-2-released/</id>
<published>2015-05-07T00:00:00+00:00</published>
<updated>2015-05-07T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Please note that we have discovered an issue in the migrations in this patch
release. The tag migration will fail on certain duplicate tags in the database.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Do not upgrade to 7.10.2 at this time.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;If you have already updated to 7.10.2 and everything is working fine,
there is no need to worry. You can keep using GitLab normally.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;We&#x27;ve released GitLab 7.10.2 CE, EE and CI.&lt;&#x2F;p&gt;

&lt;p&gt;It includes the following fixes, that apply to both CE and EE:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;A bug when using the Gitorious importer&lt;&#x2F;li&gt;
  &lt;li&gt;A bug that prevented adding group members through the admin screen&lt;&#x2F;li&gt;
  &lt;li&gt;Broken links on the merge request page leading to CI services&lt;&#x2F;li&gt;
  &lt;li&gt;A 500 error when trying to search in the wiki&lt;&#x2F;li&gt;
  &lt;li&gt;A 500 error when trying to add new tags to a project&lt;&#x2F;li&gt;
  &lt;li&gt;A bug where commit data would not appear in some subdirectories due to escaped slashes&lt;&#x2F;li&gt;
  &lt;li&gt;A bug where branches with escaped characters in their names would not always work
in the compare view&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;There is a migration that loops through all tags.
This can take a while for larger installations.&lt;&#x2F;p&gt;

&lt;p&gt;The upgrade can be performed online.&lt;&#x2F;p&gt;

&lt;p&gt;Theoretically, there is a small chance that if a tag is created during
the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;db&#x2F;migrate&#x2F;20150425164649_add_taggings_counter_cache_to_tags.acts_as_taggable_on_engine.rb&quot;&gt;migration&lt;&#x2F;a&gt;
of that specific tag, the tag counter gets a value that is
slightly higher or lower than its actual value. We do not believe this
is reason to schedule downtime and recommend performing the upgrade online.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;To update, check out our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.10.2 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10.1 Omnibus patch release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/05/01/gitlab-7-dot-10-dot-1-omnibus-patch-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/05/01/gitlab-7-dot-10-dot-1-omnibus-patch-release/</id>
<published>2015-05-01T00:00:00+00:00</published>
<updated>2015-05-01T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;We have just released new Omnibus packages for GitLab 7.10.1 that address issues
with duplicated settings.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab Omnibus packages use &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;chef&#x2F;omnibus-ctl&quot;&gt;omnibus-ctl&lt;&#x2F;a&gt; for
service control and configuration management.&lt;&#x2F;p&gt;

&lt;p&gt;For GitLab 7.10, omnibus packages were updated to version 0.3.3 of &lt;code&gt;omnibus-ctl&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This caused all settings to be cached in &lt;code&gt;&#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;nodes&#x2F;NODENAME.json&lt;&#x2F;code&gt; and with
that changes to settings in &lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; would appear as a new line in
file which contains the changed setting.&lt;&#x2F;p&gt;

&lt;p&gt;The new omnibus packages contain an upgraded version of omnibus-ctl which includes &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;chef&#x2F;omnibus-ctl&#x2F;issues&#x2F;24&quot;&gt;the fix&lt;&#x2F;a&gt;
for this problem.&lt;&#x2F;p&gt;

&lt;p&gt;If you cannot upgrade right away and you experienced duplicated settings in configuration files, you can use the following workaround for
this problem:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight shell&quot;&gt;&lt;code&gt;  &lt;span class=&quot;nb&quot;&gt;sudo &lt;&#x2F;span&gt;rm &lt;span class=&quot;nt&quot;&gt;-rf&lt;&#x2F;span&gt; &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;nodes
  &lt;span class=&quot;nb&quot;&gt;sudo &lt;&#x2F;span&gt;gitlab-ctl reconfigure
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;updates&quot;&gt;Updates&lt;&#x2F;h2&gt;

&lt;p&gt;Please see our &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;downloads page&lt;&#x2F;a&gt; for installation instructions for
the latest packages.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/30/gitlab-7-dot-10-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/30/gitlab-7-dot-10-dot-1-released/</id>
<published>2015-04-30T00:00:00+00:00</published>
<updated>2015-04-30T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We&#x27;ve just released GitLab 7.10.1 (CE, EE and CI).&lt;&#x2F;p&gt;

&lt;p&gt;This patch release removes &lt;code&gt;GroupMembers&lt;&#x2F;code&gt; that have &lt;code&gt;nil&lt;&#x2F;code&gt; as group from the database, for both
GitLab CE and EE.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;There is a small migration in the patch that&#x27;ll only take a few milliseconds to run.
This patch can be performed online if you&#x27;re coming from 7.10.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;See our &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;upgrade page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.10.1 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10.0 Omnibus patch release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/23/gitlab-7-dot-10-dot-0-omnibus-patch-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/23/gitlab-7-dot-10-dot-0-omnibus-patch-release/</id>
<published>2015-04-23T00:00:00+00:00</published>
<updated>2015-04-23T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released new Omnibus packages for GitLab 7.10 that address issues
with outgoing SSL connections for GitLab and GitLab CI. The new packages also
contain instructions to work around RPM upgrade issues going from GitLab 7.9 or
earlier to 7.10 or later.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;outgoing-ssl-connection-issues&quot;&gt;Outgoing SSL connection issues&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Omnibus packages contain a copy of the mozilla.org CA certificate bundle
&lt;a href=&quot;http:&#x2F;&#x2F;curl.haxx.se&#x2F;docs&#x2F;caextract.html&quot;&gt;as distributed by the cURL project&lt;&#x2F;a&gt;.
These CA certificates are required to verify SSL peer identities during
outgoing SSL connections such as API calls made by GitLab and GitLab CI. Due to
a build error, the CA certificate bundle file included in the original 7.10
Omnibus packages had incorrect permissions, denying access to GitLab processes.
The result is that it is as if the original 7.10 packages came with no trusted
CA certificates at all. The new Omnibus packages released today address this
issue.&lt;&#x2F;p&gt;

&lt;p&gt;If you cannot upgrade straightaway, you can use the following workaround for
this problem:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo chmod 644 &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;ssl&#x2F;certs&#x2F;cacert.pem
sudo gitlab-ctl restart
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;-rpm-upgrade-issues&quot;&gt;&lt;a id=&quot;rpm-upgrade-issues&quot;&gt;&lt;&#x2F;a&gt; RPM upgrade issues&lt;&#x2F;h2&gt;

&lt;p&gt;Motivated by our move to distributing GitLab Omnibus packages via
&lt;a href=&quot;https:&#x2F;&#x2F;packages.gitlab.com&#x2F;gitlab&quot;&gt;packages.gitlab.com&#x2F;gitlab&lt;&#x2F;a&gt; we have
renamed our Omnibus packages from plain &#x27;gitlab&#x27; to &#x27;gitlab-ce&#x27; and &#x27;gitlab-ee&#x27;
respectively. When you upgrade from GitLab 7.9 or earlier to the latest Omnibus
packages, the package system will detect a &#x27;conflict&#x27; and remove &#x27;gitlab&#x27; in
favor of &#x27;gitlab-ce&#x27; or &#x27;gitlab-ee&#x27;.&lt;&#x2F;p&gt;

&lt;p&gt;It has come to our attention that due to the order in which RPM post-removal
and post-installation scripts run, this change from &#x27;gitlab&#x27; to
&#x27;gitlab-ce&#x27;&#x2F;&#x27;gitlab-ee&#x27; removes &lt;code&gt;&#x2F;usr&#x2F;bin&#x2F;gitlab-ctl&lt;&#x2F;code&gt; and related commands.
This issue does not affect Debian-based systems.&lt;&#x2F;p&gt;

&lt;p&gt;As a workaround on RPM-based systems, please run the following command &lt;em&gt;after&lt;&#x2F;em&gt;
upgrading to GitLab 7.10 or newer:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo ln -sf                       \
  &#x2F;opt&#x2F;gitlab&#x2F;bin&#x2F;gitlab-ctl      \
  &#x2F;opt&#x2F;gitlab&#x2F;bin&#x2F;gitlab-rake     \
  &#x2F;opt&#x2F;gitlab&#x2F;bin&#x2F;gitlab-rails    \
  &#x2F;opt&#x2F;gitlab&#x2F;bin&#x2F;gitlab-ci-rake  \
  &#x2F;opt&#x2F;gitlab&#x2F;bin&#x2F;gitlab-ci-rails \
  &#x2F;usr&#x2F;bin&#x2F;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The post-install message of the package will also tell you to make this change.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updates&quot;&gt;Updates&lt;&#x2F;h2&gt;

&lt;p&gt;Please see our &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;downloads page&lt;&#x2F;a&gt; for installation instructions for
the latest packages.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.10 released with Google Code Import, Default Git Hooks and a package server!</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/22/gitlab-7-10-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/22/gitlab-7-10-released/</id>
<published>2015-04-22T00:00:00+00:00</published>
<updated>2015-04-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Everyone has been working really hard to bring GitLab 7.10 to you today!
This is the first release since GitLab graduated from &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;03&#x2F;04&#x2F;gitlab-is-part-of-the-y-combinator-family&#x2F;&quot;&gt;Y Combinator&lt;&#x2F;a&gt;.
With new-found energy and our ever productive community this is most definitely
the best release of GitLab Community Edition and Enterprise Edition so far
(over 90 changelog entries vs. slightly over 80 with GitLab 7.9)!&lt;&#x2F;p&gt;

&lt;p&gt;Besides bug fixes and performance improvements, you can now import your code
from Google Code, quickly invite your colleagues and friends to GitLab
and set default Git Hooks for everyone.&lt;&#x2F;p&gt;

&lt;p&gt;On top of that, this release marks the start of our package server! This means
you can install GitLab &lt;em&gt;right now&lt;&#x2F;em&gt; with &lt;code&gt;apt-get&lt;&#x2F;code&gt; and &lt;code&gt;yum&lt;&#x2F;code&gt;. More about that,
below.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is,
just like last month, Stan Hu!
Stan Hu squashed a number of bugs in the wiki, cross references and more, and
added new configuration options. We&#x27;re happy to award him MVP for that again
this month.
Thanks Stan Hu!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;apt-get-install-gitlab&quot;&gt;Apt-get install GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;re very excited to start using our new package server with the release of
GitLab 7.10, powered by the awesome &lt;a href=&quot;https:&#x2F;&#x2F;packagecloud.io&quot;&gt;packagecloud.io&lt;&#x2F;a&gt; software.
This means that from now on, you can install GitLab with the
magically simple command &lt;code&gt;sudo apt-get install gitlab-ce&lt;&#x2F;code&gt;!&lt;&#x2F;p&gt;

&lt;p&gt;The package server is currently only available for GitLab CE.&lt;&#x2F;p&gt;

&lt;p&gt;To install GitLab using our package server, all you need is the following
commands (depending on your OS):&lt;&#x2F;p&gt;

&lt;p&gt;Ubuntu &#x2F; Debian:&lt;&#x2F;p&gt;
&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;curl https:&#x2F;&#x2F;packages.gitlab.com&#x2F;install&#x2F;repositories&#x2F;gitlab&#x2F;gitlab-ce&#x2F;script.deb | sudo bash
sudo apt-get install gitlab-ce
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;CentOS:&lt;&#x2F;p&gt;

&lt;p&gt;If you already have an existing Omnibus package installed please see our &lt;a href=&quot;&#x2F;releases&#x2F;2015&#x2F;04&#x2F;23&#x2F;gitlab-7-dot-10-dot-0-omnibus-patch-release&#x2F;#rpm-upgrade-issues&quot;&gt;instructions for restoring the bin links&lt;&#x2F;a&gt; after running the command below.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;curl https:&#x2F;&#x2F;packages.gitlab.com&#x2F;install&#x2F;repositories&#x2F;gitlab&#x2F;gitlab-ce&#x2F;script.rpm | sudo bash
sudo yum install gitlab-ce
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p id=&quot;package-name&quot;&gt;
  Starting with GitLab 7.10, the packages are called `gitlab-ce` (GitLab Community Edition)
  and `gitlab-ee` (GitLab Enterprise Edition).
  Either of these packages will automatically replace the `gitlab` package
  used for GitLab 7.9 and earlier.
&lt;&#x2F;p&gt;

&lt;p&gt;You can view the packages &lt;a href=&quot;https:&#x2F;&#x2F;packages.gitlab.com&#x2F;gitlab&#x2F;gitlab-ce&#x2F;install&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;The package server install scripts sends back the hostname of your server, this is default packagecloud.io behaviour.&lt;&#x2F;p&gt;

&lt;p&gt;If you have any problems with the package server, please report them &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;issues&#x2F;1475&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;rc-package-info&quot;&gt;Update on package server issue&lt;&#x2F;h3&gt;

&lt;p&gt;The problem below only occurred with apt-get installations before 7pm UTC on April 22, 2015.&lt;&#x2F;p&gt;

&lt;p&gt;Due to a problem with the package server, the release candidate was seen
as newer than the 7.10 stable release and got installed on some machines instead.&lt;&#x2F;p&gt;

&lt;p&gt;If your instance is running the release candidate, rather than the stable version,
you will need to bypass the version check and explicitly install the new GitLab
version. Use the commands below:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo apt-get install gitlab-ce=7.10.0~omnibus-1
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;or&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo yum install gitlab-ce-7.10.0~omnibus-1.x86_64
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;google-code-import&quot;&gt;Google Code Import&lt;&#x2F;h2&gt;

&lt;p&gt;Quickly import your Google Code projects? It&#x27;s easy now with our
new Google Code Import tool:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_10&#x2F;google_code.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_10&#x2F;google_code.png&quot; alt=&quot;Google Code Import&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;fork-projects-with-ci&quot;&gt;Fork projects with CI&lt;&#x2F;h2&gt;

&lt;p&gt;If you fork a project in GitLab that has GitLab CI set up,
you forked project will now also be served by CI with the same settings!&lt;&#x2F;p&gt;

&lt;p&gt;That makes working with CI much easier and convenient for those of you that
work with forks.&lt;&#x2F;p&gt;

&lt;p&gt;Of course, we made sure this won&#x27;t be possible if it infringes on permissions
you&#x27;ve set, so make sure to check the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;&quot;&gt;documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;invite-new-people-into-project-by-email&quot;&gt;Invite new people into project by email&lt;&#x2F;h2&gt;

&lt;p&gt;Starting an amazing new project, but your co-conspirors don&#x27;t have an account
on your GitLab instance yet? No problem! You can now simply invite people
by email, whether they have an account on the instance or not:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_10&#x2F;invite_by_email.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_10&#x2F;invite_by_email.png&quot; alt=&quot;Invite new people by Email&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;quick-view-changelog-license-and-contribution-guide&quot;&gt;Quick view Changelog, License and Contribution guide&lt;&#x2F;h2&gt;

&lt;p&gt;Besides the Activity view, GitLab now also automatically generates quick-links
to the Changelog, License and Contribution guide of a repository.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_10&#x2F;quick_links.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_10&#x2F;quick_links.png&quot; alt=&quot;Quick Links&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;default-git-hooks-ee-only-feature&quot;&gt;Default Git Hooks (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;If you regularly use the same Git Hooks, you can now pre-define them for all
projects, as an admin.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_10&#x2F;default_git_hooks.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_10&#x2F;default_git_hooks.png&quot; alt=&quot;Default Git hooks&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For instance, banish any commit containing nothing but &lt;code&gt;wip&lt;&#x2F;code&gt;!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;audit-log-for-deploy-keys-ee-only-feature&quot;&gt;Audit log for Deploy keys (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;A nice addition to our audit logging: Any changes to deploy keys are now also
logged in the audit log. Make sure you know who can read your code.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_10&#x2F;deploy_key_log.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_10&#x2F;deploy_key_log.png&quot; alt=&quot;Audit log Deploy keys&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Coming from GitLab 7.9.4, the migrations run very fast.
The migrations include SQL &#x27;UPDATE&#x27; statements so you should take your GitLab service offline during the upgrade.
As always, make sure to backup your instance before running upgrades.&lt;&#x2F;p&gt;
&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Check out &lt;a href=&quot;&#x2F;update&#x2F;&quot;&gt;update page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;7_10&#x2F;sf.jpeg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab on Raspberry Pi 2!</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/21/gitlab-on-raspberry-pi-2/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/21/gitlab-on-raspberry-pi-2/</id>
<published>2015-04-21T00:00:00+00:00</published>
<updated>2015-04-21T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Want to run GitLab on your Raspberry Pi 2?
Now you can do so much easier!&lt;&#x2F;p&gt;

&lt;p&gt;Previously you had to install GitLab from source yourself.&lt;&#x2F;p&gt;

&lt;p&gt;We have just released the &lt;a href=&quot;&#x2F;install&#x2F;#other-methods&quot;&gt;official Raspberry Pi 2 Omnibus package for Raspbian OS&lt;&#x2F;a&gt;
that you can use to install GitLab quickly on your new small-but-powerful
repository server!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;We recommend adding at least 1GB of swap&lt;&#x2F;em&gt;, read about the reasons at the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;install&#x2F;requirements.html#memory&quot;&gt;hardware requirements page.&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Install the required packages like shown on the &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;installation instructions&lt;&#x2F;a&gt; page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;UPDATE&lt;&#x2F;em&gt; Raspberry Pi 2 packages are now uploaded to its own package repository so it&#x27;s now even easier to keep your GitLab up-to-date! Just go to the &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;installation instructions page&lt;&#x2F;a&gt; and select &lt;code&gt;Raspberry Pi 2 for Raspbian&lt;&#x2F;code&gt; from the &lt;code&gt;Select Operating System&lt;&#x2F;code&gt; dropdown for directions on how to add the repository and install GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;del&gt;Download the Omnibus package for Raspberry Pi 2 and install it:&lt;&#x2F;del&gt;&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;wget https:&#x2F;&#x2F;s3-eu-west-1.amazonaws.com&#x2F;downloads-packages&#x2F;raspberry-pi&#x2F;gitlab_7.9.0-omnibus.pi-1_armhf.deb
sudo dpkg -i gitlab_7.9.0-omnibus.pi-1_armhf.deb
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Run reconfigure to install:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo gitlab-ctl reconfigure
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Sign in on your new micro-instance with username &lt;code&gt;root&lt;&#x2F;code&gt; and password &lt;code&gt;5iveL!fe&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;help-us-scaling-gitlab-up-the-fruit-tree&quot;&gt;Help us scaling GitLab up the fruit tree&lt;&#x2F;h2&gt;

&lt;p&gt;Currently, the packages for Raspberry Pi are built manually and for minor
releases only.&lt;&#x2F;p&gt;

&lt;p&gt;We are looking for ways to automate building the Raspberry Omnibus packages,
so we can keep them up to date. For this we either need to cross-compile them (complex),
or build them on ARM servers (hard to find).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;del&gt;We welcome suggestions on this subject.&lt;&#x2F;del&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;UPDATE&lt;&#x2F;em&gt; Thank you for all your suggestions. Currently we are using Scaleway.com to build packages for Raspberry Pi 2 on Raspbian OS.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;update&quot;&gt;Update&lt;&#x2F;h3&gt;

&lt;p&gt;If you are using GitLab on your Raspberry Pi 2, it works exactly the same way as it does regularly. You can use &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;GitLab&#x27;s official user documentation&lt;&#x2F;a&gt; as a guide.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;stock&#x2F;rbp.jpg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.9.4 security release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/15/gitlab-7-dot-9-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/15/gitlab-7-dot-9-4-released/</id>
<published>2015-04-15T00:00:00+00:00</published>
<updated>2015-04-15T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released GitLab 7.9.4 which fixes an unrestricted local repository
import vulnerability. Additionally, this version addresses LDAP group
synchronization problems in GitLab Enterprise Edition and a bug that would
prevent more than 25 commit messages from being loaded in the file browser.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;unrestricted-local-repository-import-vulnerability&quot;&gt;Unrestricted local repository import vulnerability&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab allows users to import an existing repository when creating a new
project using &lt;code&gt;git clone&lt;&#x2F;code&gt;. Insufficient sanitization of user input made it
possible for an attacker with the rights to create new projects to clone any
git repository on disk accessible to the &lt;code&gt;git&lt;&#x2F;code&gt; user on the GitLab server. If
the attacker could guess the path on disk to a Git repository they could clone
it, allowing them to read Git data that they perhaps should not have access to.
An attacker needs to be authenticated as a GitLab user and to have the right to
create new projects to exploit this vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: GitLab Community Edition 7.9.3 and older, GitLab Enterprise
Edition 7.9.3 and older.&lt;&#x2F;p&gt;

&lt;p&gt;See below for update instructions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ldap-group-synchronization-problems-enterprise-edition-only&quot;&gt;LDAP group synchronization problems (Enterprise Edition only)&lt;&#x2F;h2&gt;

&lt;p&gt;We have recently discovered an incompatibility between the support for multiple
LDAP servers (added in GitLab EE 7.4) and the support for multiple identities
per user (e.g. LDAP, OAuth, Kerberos, added in GitLab 7.6). This
incompatibility causes the gradual introduction of invalid data into the SQL
database, which in turn causes LDAP group synchronization to stop working. In
GitLab 7.9.4 we have made application code changes to avoid this problem in the
future. When you upgrade to GitLab 7.9.4 or newer any existing invalid data
related to this issue is automatically purged and corrected.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-fixes&quot;&gt;Other fixes&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 7.9.4 also fixes an issue where not all commit messages would get
displayed in the file browser.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;We recommend shutting down your GitLab instance before upgrading to 7.9.4
because this release includes database migrations. The migrations themselves
run very quickly.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab 7.9.4 can be found via &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;our downloads
page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Interested in GitLab Enterprise Edition?&lt;&#x2F;strong&gt;
For an overview of feature exclusive to GitLab Enterprise Edition please have a
look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab
EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a
&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.9.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/08/gitlab-7-9-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/08/gitlab-7-9-3-released/</id>
<published>2015-04-08T00:00:00+00:00</published>
<updated>2015-04-08T00:00:00+00:00</updated>
<author>
<name>Patricio Cano</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.9.3 CE, EE and GitLab CI 7.9.3.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.9.3 EE fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fixes a link in LDAP groups page that linked to the group&#x27;s member page and the redirect URL after clearing
  the LDAP permission cache.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Community Edition 7.9.3 and GitLab CI 7.9.3 contain no changes.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading from GitLab 7.9.2 requires no downtime as this release contains no migrations.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.9.3 are not necessary, since the code for CE hasn&#x27;t changed.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.9.3 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;.
For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Interested in GitLab Enterprise Edition?&lt;&#x2F;strong&gt;
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;No time to upgrade GitLab yourself?&lt;&#x2F;strong&gt;
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.9.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/04/02/gitlab-7-9-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/04/02/gitlab-7-9-2-released/</id>
<published>2015-04-02T00:00:00+00:00</published>
<updated>2015-04-02T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski, Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab CE, GitLab EE and GitLab CI 7.9.2.&lt;&#x2F;p&gt;

&lt;p&gt;This release only affects GitLab CI. If you do not use GitLab CI, you do not need to upgrade to GitLab 7.9.2.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: GitLab CI 7.9.1&lt;&#x2F;p&gt;

&lt;p&gt;Versions fixed: GitLab CI 7.9.2&lt;&#x2F;p&gt;

&lt;p&gt;In 7.9.1 (previous release) we added a project setting option &quot;Allow shared runners&quot;.&lt;&#x2F;p&gt;

&lt;p&gt;After upgrading to this version all existing CI projects have this option enabled, so that all projects can be served by shared runners (runners which added by admin).&lt;&#x2F;p&gt;

&lt;p&gt;This introduced an issue: shared runners do not remove projects from the temporary directory because of performance reason. This means that by creating a special job script it is possible to get access to the repository of any project which has been ran on the shared runner.&lt;&#x2F;p&gt;

&lt;p&gt;This fix disables the option &quot;Allow shared runners&quot; in project settings for those projects that have at least one specific runner.&lt;&#x2F;p&gt;

&lt;p&gt;For installations from source we advise you to upgrade GitLab CI using traditional method.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading GitLab CI from 7.9.1 to 7.9.2 contains database migrations. Downtime is not required but it is recommended as existing records are updated.&lt;&#x2F;p&gt;

&lt;p&gt;Upgrading GitLab CE or EE from 7.9.1 requires no downtime as this release contains no changes related to GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.9.2 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.9.2 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.9.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/03/25/gitlab-7-9-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/03/25/gitlab-7-9-1-released/</id>
<published>2015-03-25T00:00:00+00:00</published>
<updated>2015-03-25T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.9.1 CE, EE and GitLab CI 7.9.1.&lt;&#x2F;p&gt;

&lt;p&gt;Special thanks goes out to Stan Hu for providing majority of the fixes in GitLab CE 7.9.1.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.9.1 CE fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix &quot;Import projects from&quot; button to show the correct instructions&lt;&#x2F;li&gt;
  &lt;li&gt;Fix OAuth2 issue importing a new project from GitHub and GitLab&lt;&#x2F;li&gt;
  &lt;li&gt;Fix for LDAP with commas in DN&lt;&#x2F;li&gt;
  &lt;li&gt;Fix missing events and in admin Slack service template settings form&lt;&#x2F;li&gt;
  &lt;li&gt;Don&#x27;t show commit comment button when user is not signed in.&lt;&#x2F;li&gt;
  &lt;li&gt;Downgrade gemnasium-gitlab-service gem to retain Ruby 2.0.x compatibility&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Enterprise Edition 7.9.1 contains the fixes from Community Edition.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;791-gitlab-ci-security-release&quot;&gt;7.9.1 GitLab CI security release&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab CI versions pre 7.9.1 it was possible, in certain cases, for specific runner to start behaving like a shared runner.
This is a security concern so we strongly advise upgrading to 7.9.1.&lt;&#x2F;p&gt;



&lt;h3 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h3&gt;

&lt;p&gt;Upgrading GitLab CI from 7.9.0 to 7.9.1 requires downtime as this release contains database migrations which are changing existing records.&lt;&#x2F;p&gt;

&lt;p&gt;Upgrading from GitLab 7.9.0 requires no downtime as this release contains no migrations.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h3&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.9.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h3&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.9.1 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.9 released with drag and drop for all files and group hooks</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/03/22/gitlab-7-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/03/22/gitlab-7-9-released/</id>
<published>2015-03-22T00:00:00+00:00</published>
<updated>2015-03-22T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
This is the biggest release of GitLab ever. This release alone contains over 70 entries in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;GitLab CE changelog&lt;&#x2F;a&gt; and more than 800 commits!
The biggest new features in Community Edition are Bitbucket importer, unsubscribe button and the possibility to drag-and-drop any file-type in issues and merge requests markdown.
In addition to the updates from Community Edition, GitLab Enterprise Edition has gained group level webhooks.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Stan Hu for contributing number of features and fixes in GitLab Community Edition and omnibus-gitlab project.
Thanks Stan!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;dashboard&quot;&gt;Dashboard&lt;&#x2F;h2&gt;

&lt;p&gt;Dashboard received a facelift so you can see your starred projects, groups and milestones in one menu.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_9&#x2F;dashboard.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_9&#x2F;dashboard.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;bitbucket-importer&quot;&gt;Bitbucket importer&lt;&#x2F;h2&gt;

&lt;p&gt;With 7.9 comes a new way of importing your projects. Bitbucket importer is added so you can now import all your projects.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;save-web-edit-in-new-branch&quot;&gt;Save web edit in new branch&lt;&#x2F;h2&gt;

&lt;p&gt;When editing file in web editor UI you can save it to a new branch. This can speed up your workflow considerably as you can now easily create a merge request after.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_9&#x2F;new-branch.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_9&#x2F;new-branch.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;drag-and-drop-any-file-in-markdown&quot;&gt;Drag and drop any file in markdown&lt;&#x2F;h2&gt;

&lt;p&gt;In previous versions it was easy to add a screenshot to a discussion. Now it is also possible to drag and drop pdf file or a zip archive in an issue description or comment!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_9&#x2F;drag-and-drop.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_9&#x2F;drag-and-drop.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;emoji-one&quot;&gt;Emoji One&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab 7.9 we change the emoji library to Emoji One. What we like about Emoji One, apart from the gorgeous emojis, is that the software license matches our MIT license.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_9&#x2F;emoji.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_9&#x2F;emoji.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;subscribeunsubscribe-from-issue-or-merge-request&quot;&gt;Subscribe&#x2F;Unsubscribe from issue or merge request&lt;&#x2F;h2&gt;

&lt;p&gt;Did you ever get mentioned in an issue just to be informed and then wanted to get away from the discussion? Every issue and merge request got
a subscribe&#x2F;unsubscribe button so you can follow conversations that you find most important.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;backup-with-git-annex-files&quot;&gt;Backup with git-annex files&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab 7.8 we had the possibility to manipulate large binaries with git-annex. Backups did not include files uploaded with git-annex but with 7.9 all files will be archived (using tar) and included in the backup. Of course, if you used snapshots of your GitLab server everything was backed up anyway!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;blocking-users-is-non-destructive&quot;&gt;Blocking users is non-destructive&lt;&#x2F;h2&gt;

&lt;p&gt;Blocking user will not remove users from their projects and groups. GitLab 7.9 will disable their access so if you change your mind and unblock the user, they can get up and running quickly.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-level-webhooks-ee-only-feature&quot;&gt;Group level webhooks (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;In earlier versions of GitLab you were able to add a webhook for a project.
Share the same webhooks between multiple projects - just set it up once in group.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_9&#x2F;group-hooks.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_9&#x2F;group-hooks.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;A new dependency is added, for installations from source &lt;code&gt;nodejs&lt;&#x2F;code&gt; is required. For Debian&#x2F;Ubuntu it should be as easy as &lt;code&gt;sudo apt-get install nodejs&lt;&#x2F;code&gt;. For CentOS &lt;code&gt;yum install nodejs&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Omnibus packages are shipped with nodejs already compiled so no action is needed if you are installing using a package.&lt;&#x2F;p&gt;

&lt;p&gt;When upgrading from 7.8.4 no downtime is required as database migrations are only adding new columns.&lt;&#x2F;p&gt;

&lt;p&gt;When upgrading from versions prior to 7.8.4 downtime is required due to database changes.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to v2.6.0 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.8-to-7.9.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.8-to-7.9.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Omnibus GitLab OpenSSL 1.0.1m security release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/03/19/omnibus-gitlab-openssl-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/03/19/omnibus-gitlab-openssl-security-release/</id>
<published>2015-03-19T00:00:00+00:00</published>
<updated>2015-03-19T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;The OpenSSL developers released a &lt;a href=&quot;http:&#x2F;&#x2F;openssl.org&#x2F;news&#x2F;secadv_20150319.txt&quot;&gt;security
advisory&lt;&#x2F;a&gt; today advising
all users of OpenSSL 1.0.1 to upgrade to version 1.0.1m in light of
vulnerabilities CVE-2015-0204, CVE-2015-0286, CVE-2015-0287, CVE-2015-0289,
CVE-2015-0292, CVE-2015-0293, CVE-2015-0209 and CVE-2015-0288.&lt;&#x2F;p&gt;

&lt;p&gt;This affects users of omnibus-gitlab because
omnibus-gitlab packages contain their own copy of OpenSSL 1.0.1. Today we are
releasing new omnibus packages for GitLab 7.8.4 CE and GitLab 7.8.4 EE which
contain OpenSSL 1.0.1m.&lt;&#x2F;p&gt;

&lt;p&gt;For installations from source we advise you to upgrade your openssl version using the OS package manager.
If openssl was compiled from source we advise you to compile the new version.&lt;&#x2F;p&gt;



&lt;p&gt;Versions affected: omnibus-gitlab 7.8.4.omnibus and older, omnibus-gitlab
7.8.4-ee.omnibus and older.&lt;&#x2F;p&gt;

&lt;p&gt;Versions fixed: omnibus-gitlab 7.8.4.omnibus.1, omnibus-gitlab
7.8.4-ee.omnibus.1.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;checking-your-omnibus-gitlab-openssl-version&quot;&gt;Checking your omnibus-gitlab OpenSSL version&lt;&#x2F;h1&gt;

&lt;p&gt;You can check the version of OpenSSL in your omnibus-gitlab installation by
running the following command.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;grep openssl &#x2F;opt&#x2F;gitlab&#x2F;version-manifest.txt
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If the OpenSSL version is 1.0.1j or lower you need to update omnibus-gitlab to
the latest version.&lt;&#x2F;p&gt;

&lt;p&gt;After the update is done, make sure that you restart GitLab so all processes can get the new version of openssl.&lt;&#x2F;p&gt;

&lt;p&gt;You can initiate the restart with &lt;code&gt;sudo gitlab-ctl restart&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;downloads&quot;&gt;Downloads&lt;&#x2F;h1&gt;

&lt;p&gt;Updated omnibus-gitlab packages for &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;GitLab Community
Edition&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;GitLab Enterprise
Edition&lt;&#x2F;a&gt;
are available for download.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security advisory for smtp settings</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/03/17/security-advisory-for-smtp-settings/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/03/17/security-advisory-for-smtp-settings/</id>
<published>2015-03-17T00:00:00+00:00</published>
<updated>2015-03-17T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;In GitLab 7.8.x, smtp settings example file contained the line &lt;code&gt;openssl_verify_mode: &#x27;none&#x27;&lt;&#x2F;code&gt;. This meant that mail server TLS certificate wasn&#x27;t verified by GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Confusion came from assumption that &lt;code&gt;none&lt;&#x2F;code&gt; is the default value when TLS is enabled and that it behaved the same as when the setting is omitted. In contact with Rails team member we&#x27;ve learned omitting &lt;code&gt;openssl_verify_mode&lt;&#x2F;code&gt; defaults to &lt;code&gt;peer&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you have installation from source, smtp enabled, TLS enabled and the above setting we advise you to change the setting to &lt;code&gt;openssl_verify_mode: &#x27;peer&#x27;&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Installations using omnibus packages are not affected.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.8.4 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/03/11/gitlab-7-8-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/03/11/gitlab-7-8-4-released/</id>
<published>2015-03-11T00:00:00+00:00</published>
<updated>2015-03-11T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.8.4 CE, EE and GitLab CI 7.8.4.&lt;&#x2F;p&gt;

&lt;p&gt;You might have noticed that 7.8.3 was not announced. It contained a fix for annotated tags without a message which was required for the Gitorious import on GitLab.com.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.8.4 CE contains:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix for custom issue trackers where &lt;code&gt;issue_tracker_id&lt;&#x2F;code&gt; is being replaced in all links.&lt;&#x2F;li&gt;
  &lt;li&gt;Fix for duplicate paths and names in namespaces.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Enterprise Edition 7.8.4 contains the fixes from 7.8.4 CE.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This upgrade contains a migration that removes and updates records in the database so downtime is required.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;We strongly advise creating a backup before upgrading to 7.8.4.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.8.4 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.8.4 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.8.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/03/04/gitlab-7-8-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/03/04/gitlab-7-8-2-released/</id>
<published>2015-03-04T00:00:00+00:00</published>
<updated>2015-03-04T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.8.2 CE, EE and GitLab CI 7.8.2.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.8.2 CE fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix service migration issue when upgrading from versions prior to 7.3&lt;&#x2F;li&gt;
  &lt;li&gt;Fix setting of the default use project limit via admin UI&lt;&#x2F;li&gt;
  &lt;li&gt;Fix display of already imported projects for GitLab and Gitorious importers&lt;&#x2F;li&gt;
  &lt;li&gt;Fix response of push to repository to return &quot;Not found&quot; if user doesn&#x27;t have access&lt;&#x2F;li&gt;
  &lt;li&gt;Fix check if user is allowed to view the file attachment&lt;&#x2F;li&gt;
  &lt;li&gt;Fix import check for case sensitive namespaces&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;In addition to the fixes in 7.8.2 CE, Enterprise Edition 7.8.2 contains the following fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Check if LDAP admin group exists before querying for user membership&lt;&#x2F;li&gt;
  &lt;li&gt;Remove duplicate settings link in admin section&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab 7.8.2 CI fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix email notifications for build failures&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This upgrade doesn&#x27;t contain database migrations when upgrading from 7.8.1. so it can be done without downtime.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.8.2 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.8.2 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.8.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/02/24/gitlab-7-8-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/02/24/gitlab-7-8-1-released/</id>
<published>2015-02-24T00:00:00+00:00</published>
<updated>2015-02-24T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.8.1 CE, EE and GitLab CI 7.8.1.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.8.1 CE fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix run of custom post receive hooks&lt;&#x2F;li&gt;
  &lt;li&gt;Fix migration that caused issues when upgrading to version 7.8 from versions prior to 7.3&lt;&#x2F;li&gt;
  &lt;li&gt;Fix the warning for LDAP users about need to set password&lt;&#x2F;li&gt;
  &lt;li&gt;Fix avatars which were not shown for non logged in users&lt;&#x2F;li&gt;
  &lt;li&gt;Fix urls for the issues when relative url was enabled&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;In addition to the fixes in 7.8.1 CE, Enterprise Edition 7.8.1 contains the following fix:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix the custom logo and logo upload&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.8.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.8.1 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.8 released with GitLab.com integration, never-lost comments and GitLab Annex for managing large files</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/02/22/gitlab-7-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/02/22/gitlab-7-8-released/</id>
<published>2015-02-22T00:00:00+00:00</published>
<updated>2015-02-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;This is an exciting day. Today we release GitLab 7.8, the biggest release of GitLab ever. This release alone contains over 60 entries in the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;GitLab CE changelog&lt;&#x2F;a&gt;!
We&#x27;re very proud to show you the new features and improvements of GitLab Community Edition (CE) and GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Community edition brings among others, a GitLab.com importer,
new files in an empty repository, never-lost comments and group mentions.
GitLab Enterprise Edition adds to this the GitLab Annex feature to manage your large files with GitLab, improved JIRA integration and a GitHub Enterprise integration.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Hannes Rosenögger.
Hannes took stale or old merge requests, fixed them up and contributed them to GitLab.
This is a great way to contribute and we&#x27;re excited for him to join the core team.
Thanks Hannes!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;gitlabcom-integration-login-with-gitlabcom-account-and-import-projects-from-gitlabcom&quot;&gt;GitLab.com integration: login with GitLab.com account and import projects from GitLab.com&lt;&#x2F;h2&gt;

&lt;p&gt;Moving from GitLab.com to your own GitLab instance? It just became a lot easier!&lt;&#x2F;p&gt;

&lt;p&gt;You can login with your GitLab.com account to your instance and quickly import projects from GitLab.com.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-file-in-empty-repository&quot;&gt;New file in Empty Repository&lt;&#x2F;h2&gt;

&lt;p&gt;Don&#x27;t like to switch to your commandline just to bootstrap a new GitLab project?
It&#x27;s no longer necessary! You can now create a file in an empty repository without leaving GitLab:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;new_file.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;new_file.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;commit-calendar&quot;&gt;Commit calendar&lt;&#x2F;h2&gt;

&lt;p&gt;See when you made the most commits in a single glance with the commit calendar.
Try to fill an entire year of beautiful commits!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;commit_calendar.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;commit_calendar.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;never-lose-unsaved-comments&quot;&gt;Never lose unsaved comments!&lt;&#x2F;h2&gt;

&lt;p&gt;You&#x27;re going to love this one. From now on, unsaved comments are automatically restored when you reload the page.
It&#x27;s like magic and prevents you from ever losing comments again.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;project-avatars&quot;&gt;Project avatars&lt;&#x2F;h2&gt;

&lt;p&gt;Give your project a face with its own avatar:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;project_avatar.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;project_avatar.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mention-groups&quot;&gt;Mention groups&lt;&#x2F;h2&gt;

&lt;p&gt;Another killer feature: you can now mention entire groups at once.
Have something awesome to share with your group &lt;code&gt;awesome-people&lt;&#x2F;code&gt;? Just mention them in the comment,
issue or merge request with &lt;code&gt;@awesome-people&lt;&#x2F;code&gt; and everyone will get notified.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;mention_groups.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;mention_groups.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;select-email-for-notifications&quot;&gt;Select email for notifications&lt;&#x2F;h2&gt;

&lt;p&gt;For some time you&#x27;ve been able to add multiple email addresses to GitLab.
Now you can actually select which address you want to receive notifications on.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;set_notification_mail.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;set_notification_mail.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;manage-large-files-in-git-with-gitlab-annex-ee-only-feature&quot;&gt;Manage large files in Git with GitLab Annex (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;Organisations are struggling with handling big files in their Git repositories.
Git-annex came to the rescue, but wasn&#x27;t supported by any Git hosting solution,
making permission management of large files impossible. Until now.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Annex allows you to easily include large files in your git
repository, managed just as any other commit in GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We already &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;02&#x2F;17&#x2F;gitlab-annex-solves-the-problem-of-versioning-large-binaries-with-git&#x2F;&quot;&gt;blogged&lt;&#x2F;a&gt;
about GitLab Annex, as we&#x27;re very excited about it.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;git_annex.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;git_annex.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-jira-integration-ee-only-feature&quot;&gt;Improved JIRA integration (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;We improved our JIRA in a big way! Closing a JIRA ticket with a commit is now reported
back to JIRA with a nice description and link.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;jira_service_close_issue.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;jira_service_close_issue.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;On top of that you can now mention your JIRA tickets anywhere in GitLab and
we&#x27;ll put a comment on the issue in JIRA, so everything is linked together neatly!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;jira_issue_reference.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;jira_issue_reference.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-enterprise-importer-ee-only-feature&quot;&gt;GitHub Enterprise Importer (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;Moving from GitHub Enterprise to GitLab Enterprise Edition? Easy!
You can quickly migrate entire repositories and issues in a single click
with the new GitHub Enterprise importer.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_8&#x2F;gh_import.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_8&#x2F;gh_import.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, including security fixes, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-8-stable&#x2F;CHANGELOG&quot;&gt;the (MASSIVE) Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gitlab-ci-versioning&quot;&gt;GitLab CI versioning&lt;&#x2F;h2&gt;

&lt;p&gt;From version 7.8 we have decided to change the versioning of GitLab CI and had its version bumped from 5.4.x to 7.8. The reason for this change is to make releasing as quick and easy as possible. Previously, GitLab CI was not packaged with the omnibus-gitlab package and GitLab CI version was a separate entity not related to GitLab. However, since GitLab CI got packaged having different versions made our release process cumbersome.
It also caused various misunderstandings in which CI goes with which version of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;By having the same version for GitLab and GitLab CI, this problem is resolved.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;This is a regular upgrade. It contains several migrations,
none of which particularly scary.&lt;&#x2F;p&gt;

&lt;p&gt;For installations from source, you will have to update your NGINX configuration. We&#x27;ve added a route change for &#x2F;uploads&#x2F;.
See the new config for &#x2F;uploads&#x2F; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;8ae3112b3f303c897c70952dd162589b1c394221&#x2F;lib&#x2F;support&#x2F;nginx&#x2F;gitlab#L60&quot;&gt;here for http&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;8ae3112b3f303c897c70952dd162589b1c394221&#x2F;lib&#x2F;support&#x2F;nginx&#x2F;gitlab-ssl#L105&quot;&gt;here for https&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to &lt;strong&gt;&lt;em&gt;2.5.3&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.7-to-7.8.md#3-update-gitlab-shell&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.7-to-7.8.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h1&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.7.2 and GitLab CI 5.4.2 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/01/30/gitlab-7-7-2-and-gitlab-ci-5-4-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/01/30/gitlab-7-7-2-and-gitlab-ci-5-4-2-released/</id>
<published>2015-01-30T00:00:00+00:00</published>
<updated>2015-01-30T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.7.2 (CE and EE) and GitLab CI 5.4.2.&lt;&#x2F;p&gt;

&lt;p&gt;This release contains two security fixes. We recommend everyone that
uses protected branches, GitLab CI or LDAP to upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.7.2 fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Security fix: Fix a bug where developers can push to a protected branch&lt;&#x2F;li&gt;
  &lt;li&gt;Fix an issue where a LDAP user can&#x27;t login with an existing GitLab account&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab CI 5.4.2 contains a single security fix:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Security fix: Fix a bug where a CI user can get the CI project token
even if the user does not have access to the project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.7.2 and GitLab CI 5.4.2 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.7.2 and GitLab CI 5.4.2 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.7.1 and GitLab CI 5.4.1 Released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/01/23/gitlab-7-7-1-and-gitlab-ci-5-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/01/23/gitlab-7-7-1-and-gitlab-ci-5-4-1-released/</id>
<published>2015-01-23T00:00:00+00:00</published>
<updated>2015-01-23T00:00:00+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.7.1 (both CE and EE) and GitLab CI 5.4.1.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.7.1 brings three fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Improve @mention autocomplete performance&lt;&#x2F;li&gt;
  &lt;li&gt;Show setup instructions for GitHub import if it is disabled&lt;&#x2F;li&gt;
  &lt;li&gt;Allow use of http for OAuth applications&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab CI 5.4.1 fixes several bugs:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix 500 on builds page if a build has no jobs&lt;&#x2F;li&gt;
  &lt;li&gt;Truncate project token from build trace&lt;&#x2F;li&gt;
  &lt;li&gt;Allow users with access to a project see the build trace&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.7.1 and GitLab CI 5.4.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.7.1 and GitLab CI 5.4.1 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.7 and GitLab CI 5.4 with GitHub importer and OAuth authorization</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/01/22/gitlab-7-7-and-ci-5-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/01/22/gitlab-7-7-and-ci-5-4-released/</id>
<published>2015-01-22T00:00:00+00:00</published>
<updated>2015-01-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;GitLab is Version Control on your Server. It&#x27;s like GitHub but Open Source.&lt;&#x2F;p&gt;

&lt;p&gt;Today we announce the release of a new version of GitLab Community Edition (CE)
and GitLab Enterprise Edition (EE), and GitLab Continuous Integration (CI)
with new features, usability and performance improvements, and bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;Also we are happy to announce our new &lt;strong&gt;free Continuous Integration (CI) service: &lt;a href=&quot;https:&#x2F;&#x2F;ci.gitlab.com&quot;&gt;ci.gitlab.com&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;



&lt;h1 id=&quot;gitlab-77&quot;&gt;GitLab 7.7&lt;&#x2F;h1&gt;

&lt;p&gt;The biggest new features in GitLab Community Edition are the &lt;strong&gt;GitHub importer&lt;&#x2F;strong&gt; and &lt;strong&gt;OAuth support&lt;&#x2F;strong&gt;.
In addition to the updates from Community Edition,
GitLab Enterprise Edition has gained some performance improvements and the ability to change the header logo.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Ciro Santilli
for sending over 200 merge requests to improve the GitLab code base.
Thanks Ciro!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;redesigned-navigation&quot;&gt;Redesigned navigation&lt;&#x2F;h2&gt;

&lt;p&gt;This had been on our minds for a while but we finally decided to
redesign the GitLab navigation! We worked closely with our awesome community
and hope you love it.&lt;&#x2F;p&gt;

&lt;p&gt;Check it out:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_7&#x2F;design.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_7&#x2F;design.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Have a look at the &lt;a href=&quot;&#x2F;blog&#x2F;2015&#x2F;01&#x2F;16&#x2F;pragmatic-redesign-for-gitlab&#x2F;&quot;&gt;article&lt;&#x2F;a&gt;
we wrote about the redesign to get a better understanding of why we did it.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;github-importer&quot;&gt;GitHub importer&lt;&#x2F;h2&gt;

&lt;p&gt;You can now super quickly import your GitHub projects, issues and all!
A single click is all it takes:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_7&#x2F;import.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_7&#x2F;import.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Find the importer when creating a new project.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mention-notification-level&quot;&gt;Mention notification level&lt;&#x2F;h2&gt;

&lt;p&gt;Getting too much email? Just select the &#x27;Mention&#x27; notification level and you
will only receive notification emails when people mention you.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_7&#x2F;mention.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_7&#x2F;mention.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;oauth&quot;&gt;OAuth!&lt;&#x2F;h2&gt;

&lt;p&gt;Services like Facebook, Twitter, and Google allow you to sign in using
their credentials in 3rd party applications, implemented through &lt;a href=&quot;http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;OAuth&quot;&gt;OAuth&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;From now on, GitLab is also an OAuth resource server. This means that you can
create 3rd party applications and use your GitLab credentials for authentication!&lt;&#x2F;p&gt;

&lt;p&gt;We can&#x27;t wait to hear what you&#x27;ll use it for.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_7&#x2F;oauth.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_7&#x2F;oauth.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;configure-gitlab-on-the-fly-through-the-ui&quot;&gt;Configure GitLab on the fly through the UI&lt;&#x2F;h2&gt;

&lt;p&gt;Finally GitLab admins can change the application settings on the fly
without any downtime through our new settings page:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_7&#x2F;settings.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_7&#x2F;settings.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;When you start GitLab 7.7 the first time it will import your settings from gitlab.yml.
After this initial import the settings in gitlab.yml are ignored.&lt;&#x2F;p&gt;

&lt;p&gt;In the future we&#x27;ll add more settings to this page, making configuring
GitLab even easier.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;dont-want-to-run-your-own-use-gitlabcom&quot;&gt;Don&#x27;t want to run your own? Use GitLab.com!&lt;&#x2F;h1&gt;

&lt;p&gt;You&#x27;d rather live in the cloud? Use GitLab.com! It&#x27;s a completely free
GitLab instance hosted and managed by us. It offers (private) repositories,
issue tracking, wiki’s and continuous integration. Free!&lt;&#x2F;p&gt;

&lt;p&gt;You don’t have to install anything, just &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;users&#x2F;sign_up&quot;&gt;sign up for a free account&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;gitlab-ci-54&quot;&gt;GitLab CI 5.4&lt;&#x2F;h1&gt;

&lt;p&gt;On top of all the new feature for GitLab, we&#x27;re releasing a bunch more for
GitLab CI. These features will make testing your code more powerful and more
flexible.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;oauth-authorization&quot;&gt;OAuth authorization&lt;&#x2F;h2&gt;

&lt;p&gt;With GitLab as OAuth resource server, you can now easily link GitLab CI to
your GitLab instance, so you don&#x27;t need to authenticate when switching to CI
anymore. Of course, this also works if you&#x27;ve set up LDAP &#x2F; AD with GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;You can even use this if you authenticated with GitLab through another OAuth
provider, such as Twitter or GitHub. This means that it&#x27;s now much faster
and easier to use CI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5_4&#x2F;login.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_4&#x2F;login.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;runners-for-everyone&quot;&gt;Runners for everyone!&lt;&#x2F;h2&gt;

&lt;p&gt;Want to add a Runner that runs your tests and scripts to a project?
Now you don&#x27;t need to be an admin to do this anymore. Just install
the GitLab Runner package on any machine and use the project token
to register the Runner in your instance.&lt;&#x2F;p&gt;

&lt;p&gt;If only we&#x27;d be offering some credits to give this a try…(hint: Keep reading!)&lt;&#x2F;p&gt;

&lt;h2 id=&quot;labels-for-runners-and-jobs&quot;&gt;Labels for Runners and jobs&lt;&#x2F;h2&gt;

&lt;p&gt;Now that you can easily add a group of Runners to your CI instance, we thought
it would be very cool to be able to easily run different environments per job.&lt;&#x2F;p&gt;

&lt;p&gt;Now you can add labels to jobs. Only a Runner with that (those) label(s) will pick up
up the matching jobs. This way you can run different environments per job, easily.&lt;&#x2F;p&gt;

&lt;p&gt;Project jobs:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5_4&#x2F;ci-job-labels.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_4&#x2F;ci-job-labels.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Project runners:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5_4&#x2F;ci-runner-labels.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_4&#x2F;ci-runner-labels.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;omnibus-packages-for-gitlab-runner&quot;&gt;Omnibus packages for GitLab Runner&lt;&#x2F;h2&gt;

&lt;p&gt;We now &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab-runner&#x2F;tree&#x2F;master&#x2F;doc&#x2F;install&quot;&gt;offer Omnibus
packages&lt;&#x2F;a&gt;
for GitLab Runner. No need to download and compile Ruby anymore each time you
set up a runner!&lt;&#x2F;p&gt;

&lt;p&gt;The installation instructions for the Runner packages only cover Ubuntu 12.04
and 14.04 at the moment. To be continued!&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;continuous-integration-ci-for-free&quot;&gt;Continuous Integration (CI) for free&lt;&#x2F;h1&gt;

&lt;p&gt;We are happy to offer free CI for private repositories if you bring your own Runner!&lt;&#x2F;p&gt;

&lt;p&gt;Simply add your projects from GitLab.com on ci.gitlab.com and configure the builds script(s).
You can use the parallel build feature of GitLab CI and
we&#x27;ll store the build logs and configuration for you.&lt;&#x2F;p&gt;

&lt;p&gt;To run your tests you need to install GitLab Runner on one or more of your instances.
Don&#x27;t have any instances yet? No problem:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;In total, we&#x27;re giving away up to $520,000.- in cloud hosting for people to host their Runner!&lt;&#x2F;strong&gt;
This is a collaboration with Google Compute Engine and Digital Ocean, we&#x27;re very grateful for their offer.
Did you know they both also offer one-click-installs of GitLab?
To claim your credit please see the instructions below.&lt;&#x2F;p&gt;

&lt;p&gt;The credit is a limited time offering but the free CI for private projects on ci.gitlab.com is permanent.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;claim-google-cloud-platform-credit&quot;&gt;Claim Google Cloud Platform credit&lt;&#x2F;h1&gt;

&lt;p&gt;Google Cloud Platform offers $500 in credit for the first 1000 users.
To get started, follow the three steps below:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Go to &lt;a href=&quot;http:&#x2F;&#x2F;cloud.google.com&#x2F;startercredit&quot;&gt;http:&#x2F;&#x2F;cloud.google.com&#x2F;startercredit&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Click Apply Now&lt;&#x2F;li&gt;
  &lt;li&gt;Complete the form with code: gitlab&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;With Cloud Platform you can access application, compute, storage and big data services.
You’re now building on the same infrastructure that powers Google.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;claim-digital-ocean-credit&quot;&gt;Claim Digital Ocean credit&lt;&#x2F;h1&gt;

&lt;p&gt;DigitalOcean offers $40 in credit for the first 500 users.
This is valid only for new DigitalOcean accounts, not for existing users.
The offer is valid for two weeks and you can claim up to one promo per person.
You need to set up a project on GitLab.com and add it to ci.gitlab.com before you can claim it.&lt;&#x2F;p&gt;

&lt;p&gt;To claim it please fill out &lt;a href=&quot;https:&#x2F;&#x2F;docs.google.com&#x2F;a&#x2F;gitlab.com&#x2F;forms&#x2F;d&#x2F;1YXTRwDz2C8o4DqNrFCT78UQf_iHnN1Ekrt4p8yv6fd4&#x2F;viewform&quot;&gt;this form&lt;&#x2F;a&gt; with your name, email or handle and project url.
Once submitted, the GitLab team will email you your unique promo code.
If you have any questions about this promotion, please contact the GitLab support team via &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;custom-header-logo-ee-only&quot;&gt;Custom header logo (EE only)&lt;&#x2F;h1&gt;

&lt;p&gt;For GitLab Enterprise Edition Drew Blessing contributed customer header logo support.
There also were fixes for the preview and performance improvements for selectboxes.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;open-sign-up-by-default&quot;&gt;Open sign-up by default&lt;&#x2F;h1&gt;

&lt;p&gt;From this version on user self-signup is enabled by default.
You can still disable this behaviour in the new applications settings page.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h1&gt;

&lt;p&gt;This release has more improvements, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-7-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h1&gt;

&lt;p&gt;There are migrations in this update but they do not take considerable time and should be quick.&lt;&#x2F;p&gt;

&lt;p&gt;If you don&#x27;t want users to sign up themselves and you have not set this up in gitlab.yml you must ensure this behaviour stays the same.
You can do it by adding it to gitlab.rb (Omnibus package) or gitlab.yml (source installation) or the easiest way is to use the new application settings page to do this.&lt;&#x2F;p&gt;

&lt;p&gt;After you upgraded and tested GitLab consider removing the settings that are now in the application settings page from gitlab.rb (Omnibus packages) or gitlab.yml (source installation) to prevent confusion.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to 2.4.1 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;X.x-to-x.x.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.6-to-7.7.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h1&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles you to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;7_7&#x2F;bg.jpeg&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Patch releases for GitLab 7.2, 7.3 and 7.4 CE &amp; EE</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/01/20/patch-releases-for-7-dot-2/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/01/20/patch-releases-for-7-dot-2/</id>
<published>2015-01-20T00:00:00+00:00</published>
<updated>2015-01-20T00:00:00+00:00</updated>
<author>
<name>Patricio, Job</name>
</author>
<content type='html'>&lt;p&gt;Today we are releasing a patch release for three previous GitLab CE and GitLab EE versions.&lt;&#x2F;p&gt;

&lt;p&gt;The patch releases fix a bug found in the &lt;code&gt;rugged&lt;&#x2F;code&gt; gem that could cause a segmentation fault when accessing a repository.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.2 and 7.3 will now use &lt;code&gt;gitlab_git&lt;&#x2F;code&gt; v6.2.2 and 7.4 will use &lt;code&gt;gitlab_git&lt;&#x2F;code&gt; v.7.0.0.rc12,
which depend on rugged.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;The new Omnibus-gitlab packages for GitLab 7.2.3, 7.3.3 and 7.4.5 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.2.3, 7.3.3 and 7.4.5 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Omnibus packages for GitLab 7.6.2 and 7.6.3-ee</title>
<release></release>
<link href='https://about.gitlab.com/releases/2015/01/08/omnibus-packages-for-gitlab-7-6-2-and-7-6-3-ee/' rel='alternate' />
<id>https://about.gitlab.com/releases/2015/01/08/omnibus-packages-for-gitlab-7-6-2-and-7-6-3-ee/</id>
<published>2015-01-08T10:28:58+00:00</published>
<updated>2015-01-08T10:28:58+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;Today we have released updated versions of GitLab Omnibus packages for the existing GitLab 7.6.2 Community Edition and GitLab 7.6.3
Enterprise Edition.&lt;&#x2F;p&gt;



&lt;p&gt;These updated packages contain a fix for a problem that affected limited amount of installations.
The problem was caused by a wrongly linked Kerberos library which caused issues on GitLab installations with Kerberos authentication enabled.&lt;&#x2F;p&gt;

&lt;p&gt;If you recently updated your Omnibus GitLab installation to 7.6.2 CE or 7.6.3 EE and encountered issues with Kerberos library, this package will only update the library. Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you haven&#x27;t experienced any issues or are not using Kerberos authentication there is no need to update the packages.&lt;&#x2F;p&gt;

&lt;p&gt;This problem is not affecting installations from source.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.6.2 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/12/31/gitlab-7-6-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/12/31/gitlab-7-6-2-released/</id>
<published>2014-12-31T00:00:00+00:00</published>
<updated>2014-12-31T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;On the last day of 2014, we release GitLab 7.6.2 CE and 7.6.3 EE.&lt;&#x2F;p&gt;

&lt;p&gt;This release fixes the services that were broken with the release
of 7.6, including Slack and Hipchat integrations.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.6.2 (including GitLab CI 5.3.0) are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.6.3 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab update for Git vulnerability</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/12/24/gitlab-update-for-git-vulnerability/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/12/24/gitlab-update-for-git-vulnerability/</id>
<published>2014-12-24T16:26:51+00:00</published>
<updated>2014-12-24T16:26:51+00:00</updated>
<author>
<name>Patricio Cano</name>
</author>
<content type='html'>&lt;p&gt;Today we have released updated versions of our Omnibus packages for the existing GitLab 7.6.1 Community Edition and GitLab 7.6.2
Enterprise Edition. These updated packages contain an updated Git binary (2.0.5) that resolves the recent [Git vulnerability]
(&#x2F;blog&#x2F;2014&#x2F;12&#x2F;19&#x2F;gitlab-not-affected-by-CVE-2014-9390-git-vulnerability&#x2F;).&lt;&#x2F;p&gt;

&lt;p&gt;This server side fix blocks incoming Git repositories that contain a malicious tree, so no exploits can be triggered
using these updated GitLab versions. GitLab.com has already been updated.&lt;&#x2F;p&gt;

&lt;p&gt;If you recently updated your Omnibus GitLab installation to 7.6.1 CE or 7.6.2 EE, these packages will only update the
Git binary. It is a painless upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;If you are running GitLab on a manual installation, you can manually update the Git client on the server and run the
following command: &lt;code&gt;sudo git config --system receive.fsckObjects true&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We encourage our users to update their GitLab installations, specially if they allow sign-ups and have public projects.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.6.1 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/12/23/gitlab-7-6-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/12/23/gitlab-7-6-1-released/</id>
<published>2014-12-23T00:00:00+00:00</published>
<updated>2014-12-23T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.6.1 CE and 7.6.2 EE.&lt;&#x2F;p&gt;

&lt;p&gt;This release fixes a problem with the LDAP migrations and MySQL when upgrading.
If you&#x27;ve already upgraded to GitLab 7.6 without problems, there is no need
to upgrade to 7.6.1 CE or 7.6.2 EE.&lt;&#x2F;p&gt;

&lt;p&gt;If you&#x27;ve experienced a failed migration you can run this release to correct it.
If it exists you will have to manually remove the &lt;code&gt;identities&lt;&#x2F;code&gt; database table before upgrading.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.6.1 (including GitLab CI 5.3.0) are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;em&gt;Note: we skipped GitLab EE 7.6.1. If you&#x27;ve upgraded to 7.6.0 EE without issues,
there is no need to update to 7.6.2 EE.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.6.2 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.6 and GitLab CI 5.3 released with Audit log, Rebasing and more authentication options</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/12/22/gitlab-7-6-and-ci-5-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/12/22/gitlab-7-6-and-ci-5-3-released/</id>
<published>2014-12-22T00:00:00+00:00</published>
<updated>2014-12-22T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Community Edition now supports multiple Omniauth providers for a single user,
meaning you can link your accounts from Google, Twitter and others.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to the updates from Community Edition, GitLab Enterprise Edition has gained &lt;strong&gt;Audit Log&lt;&#x2F;strong&gt;, &lt;strong&gt;Rebasing&lt;&#x2F;strong&gt; before a merge request and &lt;strong&gt;Kerberos support&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Ben Bodenmiller. Ben sweats the small stuff, which adds much appreciated polish to GitLab. Thanks Ben!&lt;&#x2F;p&gt;



&lt;h3 id=&quot;link-your-social-accounts&quot;&gt;Link your social accounts&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab now support multiple Omniauth providers for a single user. That means
you can easily link your Google, Twitter and GitHub accounts and use them
to log into your GitLab instance.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_6&#x2F;omniauth.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_6&#x2F;omniauth.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;better-mobile-ui&quot;&gt;Better Mobile UI&lt;&#x2F;h3&gt;

&lt;p&gt;We improved GitLab for small screens, so it&#x27;s easier to merge while
on the road!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_6&#x2F;small.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_6&#x2F;small.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;fork-to-group&quot;&gt;Fork to Group&lt;&#x2F;h3&gt;

&lt;p&gt;You can now fork a project to a group of your choosing.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_6&#x2F;fork.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_6&#x2F;fork.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;rebase-before-merge-ee-only&quot;&gt;Rebase before Merge (EE only)&lt;&#x2F;h3&gt;

&lt;p&gt;Do you want to rebase your branch before merging?
GitLab can now do this for you!
This will ensure that you have a linear git history on master, making it easier to reason about it.&lt;&#x2F;p&gt;

&lt;p&gt;Simply turn on the feature for the project that you want to use this for
and check the box on merge.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_6&#x2F;rebase.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_6&#x2F;rebase.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;audit-log-ee-only&quot;&gt;Audit log (EE only)&lt;&#x2F;h3&gt;

&lt;p&gt;From 7.6 EE on, GitLab will automatically track member changes in the audit log for each project and group.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_6&#x2F;audit.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_6&#x2F;audit.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;kerberos-support-ee-only&quot;&gt;Kerberos support (EE only)&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab 7.6 introduces support for authentication with Kerberos, in addition
to the various OAuth providers, LDAP and Active Directory authentication.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h3&gt;

&lt;p&gt;This release has more improvements, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-6-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h3&gt;

&lt;p&gt;This is a straightforward upgrade, coming from 7.5.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h2&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to &lt;strong&gt;&lt;em&gt;2.4.0&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.5-to-7.6.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.5-to-7.6.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.5.3 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/12/05/gitlab-7-5-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/12/05/gitlab-7-5-3-released/</id>
<published>2014-12-05T00:00:00+00:00</published>
<updated>2014-12-05T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.5.3 CE and EE.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.5.3 updates Rugged to 0.21.2 to solve &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;libgit2&#x2F;rugged&#x2F;issues&#x2F;431&quot;&gt;issues&lt;&#x2F;a&gt; with &#x27;finding too many commits&#x27;.
This issue could cause the PostReceive job triggered by a &lt;code&gt;git push&lt;&#x2F;code&gt; to take a very long time and consume a lot of memory.&lt;&#x2F;p&gt;

&lt;p&gt;For GitLab Enterprise Edition, 7.5.3 additionally fixes &#x27;Redis::InheritedError&#x27;,
which caused problems when creating new groups or projects in GitLab 7.5.0-7.5.2 Enterprise Edition.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.5.3 (including GitLab CI 5.2.1) are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.5.3 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.5.2 and GitLab CI 5.2.1 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/12/03/gitlab-7-5-2-and-gitlab-ci-5-2-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/12/03/gitlab-7-5-2-and-gitlab-ci-5-2-1-released/</id>
<published>2014-12-03T00:00:00+00:00</published>
<updated>2014-12-03T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Today we release GitLab 7.5.2 (both CE and EE) and GitLab CI 5.2.1.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 7.5.2 brings two fixes:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Sidekiq arguments are no longer being logged. This prevents password reset tokens from appearing in the &lt;code&gt;sidekiq.log&lt;&#x2F;code&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed a bug with restoring the backup of a wiki&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab CI 5.2.1 fixes several bugs:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;500 error on &#x2F;admin&#x2F;builds&lt;&#x2F;li&gt;
  &lt;li&gt;Build API Request giving 400 &#x2F; CSRF token authenticity error&lt;&#x2F;li&gt;
  &lt;li&gt;Build script info not being displayed well after update&lt;&#x2F;li&gt;
  &lt;li&gt;Problems with adding a project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.5.2 and GitLab CI 5.2.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now available&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab installation from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade a GitLab CI installation from source, please use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus packages for GitLab Enterprise Edition 7.5.2 and GitLab CI 5.2.1 are available for subscribers &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;here&lt;&#x2F;a&gt;. For installations from source, use &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;this guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Interested in GitLab Enterprise Edition?
For an overview of feature exclusive to GitLab Enterprise Edition please have a look at the &lt;a href=&quot;&#x2F;features&#x2F;#enterprise&quot;&gt;features exclusive to GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.5 and GitLab CI 5.2 released with new and custom git hooks and parallel builds</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/11/21/gitlab-7-5-and-ci-5-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/11/21/gitlab-7-5-and-ci-5-2-released/</id>
<published>2014-11-21T00:00:00+00:00</published>
<updated>2014-11-21T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
In addition we are releasing GitLab CI 5.2.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Community Edition 7.5 brings custom git hooks, various performance improvements, API extensions and better GitLab CI support.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to the updates from Community Edition, GitLab Enterprise Edition has gained automatic daily LDAP sync and git hooks to restrict commit authors.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Martijn van Bemmel.
Martijn is a very productive designer, having created the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gitlab-artwork&#x2F;blob&#x2F;master&#x2F;flyer&#x2F;flyer_biker.png&quot;&gt;cool&lt;&#x2F;a&gt; &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;gitlab-artwork&#x2F;blob&#x2F;master&#x2F;flyer&#x2F;flyer_scar.png&quot;&gt;graphics&lt;&#x2F;a&gt; for GitLab 7.0,
the &lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP Badge&lt;&#x2F;a&gt;, the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-com&#x2F;www-gitlab-com&#x2F;merge_requests&#x2F;318#note_296648&quot;&gt;Golden Gear medal&lt;&#x2F;a&gt; and the &lt;a href=&quot;&#x2F;community&#x2F;&quot;&gt;various&lt;&#x2F;a&gt; &lt;a href=&quot;&#x2F;features&#x2F;&quot;&gt;graphics&lt;&#x2F;a&gt; on our site.
We really appreciate his enthusiastic contributions, Thanks Martijn!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;custom-git-hooks&quot;&gt;Custom Git Hooks&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab now supports custom Git Hooks! This means that you can run anything you want
on pre&#x2F;post-receive and update actions. Please see &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;hooks&#x2F;custom_hooks.html&quot;&gt;our documentation&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;p&gt;This has been a much requested feature and has been contributed by Drew Blessing and Jose Kahan.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Drew and Jose!&lt;&#x2F;p&gt;

&lt;h2 id=&quot;api-improvements&quot;&gt;API Improvements&lt;&#x2F;h2&gt;

&lt;p&gt;The API has been extended and improved in several points:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Project events API will expose the username (sponsored by O&#x27;Reilly Media)&lt;&#x2F;li&gt;
  &lt;li&gt;Deleting a branch will return valid JSON&lt;&#x2F;li&gt;
  &lt;li&gt;Annotated tags API improved (contributed by Sean Edge)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;atlassian-bamboo-ci-service&quot;&gt;Atlassian Bamboo CI Service&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to the contribution of Drew Blessing, GitLab now integrates with Atlassian Bamboo CI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_5&#x2F;bamboo.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_5&#x2F;bamboo.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;git-hooks-to-check-author-and-filename-ee-only-feature&quot;&gt;Git Hooks to check author and filename (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve added some cool new Git Hooks:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Check whether the author of a commit is a member of the GitLab instance&lt;&#x2F;li&gt;
  &lt;li&gt;Restrict commit authors to a given regular expression&lt;&#x2F;li&gt;
  &lt;li&gt;Restrict commits by filenames to a given regular expression&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_5&#x2F;githooks.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_5&#x2F;githooks.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt; &lt;strong&gt;&lt;em&gt;Our complete list of Git Hooks in GitLab EE 7.5&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;automatic-daily-ldap-sync-ee-only-feature&quot;&gt;Automatic Daily LDAP Sync (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab Enterprise Edition will now automatically sync all LDAP members on a daily basis. You can configure the time that it happens.&lt;&#x2F;p&gt;

&lt;p&gt;LDAP group synchronization in GitLab Enterprise Edition works by GitLab periodically updating the group memberships of &lt;em&gt;active&lt;&#x2F;em&gt; GitLab users.
If a GitLab user becomes &lt;em&gt;inactive&lt;&#x2F;em&gt; however, their group memberships in GitLab can start to lag behind the LDAP server group memberships.
Starting with GitLab 7.5 Enterprise Edition, GitLab will also update the LDAP group memberships of inactive users, by doing a daily LDAP check for &lt;em&gt;all&lt;&#x2F;em&gt; GitLab users.&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Example:
John Doe leaves the company and is removed from the LDAP server.
At this point he can no longer log in to GitLab 7.4 EE.
But because he is no longer active on the GitLab EE server (he cannot log in!), his LDAP group memberships in GitLab no longer get updated, and he stays listed as a group member on the GitLab server.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;blockquote&gt;
  &lt;p&gt;Now with GitLab 7.5 Enterprise Edition, within 24 hours of John being removed from the LDAP server, his user will also stop being listed as a member of any GitLab groups.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-5-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;Upgrading GitLab from 7.4 to 7.5 is an easy upgrade.&lt;&#x2F;p&gt;

&lt;p&gt;If you are using GitLab CI 5.1 or earlier then you need to upgrade your GitLab CI installation to 5.2 at the same time as you upgrade GitLab to 7.5.
GitLab 7.5 is incompatible with GitLab CI 5.1 and earlier.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;gitlab-ci-52&quot;&gt;GitLab CI 5.2&lt;&#x2F;h1&gt;

&lt;p&gt;We&#x27;re proud to release GitLab CI 5.2 together with GitLab 7.5.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab CI 5.2 requires GitLab 7.5.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;parallel-builds&quot;&gt;Parallel builds&lt;&#x2F;h2&gt;

&lt;p&gt;You can now run parallel builds on GitLab CI. For instance, if you have two or more test suites, you are able to run them at the same time. This can significantly reduce buildtime and therefore speed up your CI process.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_5&#x2F;pa_build.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_5&#x2F;pa_build.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab CI is &lt;a href=&quot;&#x2F;blog&#x2F;2014&#x2F;11&#x2F;06&#x2F;gitlab-omnibus-packages-now-include-gitlab-ci&#x2F;&quot;&gt;now bundled with GitLab&lt;&#x2F;a&gt;!
If you prefer to install GitLab CI manually, please see the &lt;a href=&quot;https:&#x2F;&#x2F;docs.gitlab.com&#x2F;ee&#x2F;ci&#x2F;quick_start&#x2F;&quot;&gt;documentation&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To run your tests, you need to set up one or more GitLab CI Runners.
Runners are quick and easy to set up, please see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-runner&#x2F;blob&#x2F;master&#x2F;README.md&quot;&gt;runner repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to &lt;strong&gt;&lt;em&gt;2.2.0&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.4-to-7.5.md#3-update-gitlab-shell&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.4-to-7.5.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating-gitlab-ci&quot;&gt;Updating GitLab CI&lt;&#x2F;h1&gt;

&lt;p&gt;Use the omnibus package which includes the latest GitLab CI version or see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;5.1-to-5.2.md&quot;&gt;update guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h1&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.4.4 and 7.4.5-ee security releases</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/11/20/gitlab-7-4-4-and-7-4-5-ee-security-releases/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/11/20/gitlab-7-4-4-and-7-4-5-ee-security-releases/</id>
<published>2014-11-20T00:00:00+00:00</published>
<updated>2014-11-20T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released GitLab Community Edition 7.4.4 and GitLab Enterprise Edition 7.4.5 (7.4.5-ee).
These releases fix two cross-site scripting (XSS) vulnerabilities.
In addition to the security fixes, GitLab Enterprise Edition 7.4.5 also fixes an LDAP group synchronization regression.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;xss-vulnerabilities-via-merge-request-and-commit-attributes&quot;&gt;XSS vulnerabilities via merge request and commit attributes&lt;&#x2F;h2&gt;

&lt;p&gt;An attacker with commit access to GitLab can inject malicious Javascript code into pages that show commits or merge requests.
This Javascript code would then be executed in the context of another user viewing the page on the GitLab server.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;affected-versions&quot;&gt;Affected versions&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab Community Edition 7.4.3 and earlier.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Enterprise Edition 7.4.4 and earlier.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unaffected-versions&quot;&gt;Unaffected versions&lt;&#x2F;h3&gt;

&lt;p&gt;None.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;fixes&quot;&gt;Fixes&lt;&#x2F;h3&gt;

&lt;p&gt;The two XSS issues have been fixed in GitLab Community Edition 7.4.4 and GitLab
Enterprise Edition 7.4.5.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;acknowledgments&quot;&gt;Acknowledgments&lt;&#x2F;h3&gt;

&lt;p&gt;We would like to thank Hugh Davenport for their responsible disclosure of the XSS issues.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;ldap-group-synchronization-regression&quot;&gt;LDAP group synchronization regression&lt;&#x2F;h2&gt;

&lt;p&gt;Due to an oversight a bug fix for a regression in GitLab 7.4 Enterprise Edition found right before the 7.4 release did not get shipped.
Affected users would see an &lt;code&gt;Missing setting &#x27;active_directory&#x27; in &lt;&#x2F;code&gt; error message.
GitLab Enterprise Edition 7.4.5 includes the fix for this error.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.4.4 and 7.4.5-ee are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.4.4 EE Patch Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/11/10/gitlab-7-4-4-ee-patch-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/11/10/gitlab-7-4-4-ee-patch-release/</id>
<published>2014-11-10T08:45:00+00:00</published>
<updated>2014-11-10T08:45:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab Enterprise Edition 7.4.4 that fixes a bug which causes a failing migration when updating from versions &amp;lt; 7.3.&lt;&#x2F;p&gt;

&lt;p&gt;We have also released new packages for Ubuntu 12.04, 14.04, Debian 7, CentOS 6 and CentOS 7.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Enterprise Edition packages can be found in the subscribers repository.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;
&lt;p&gt;Omnibus-gitlab packages for GitLab 7.4.4 EE are &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;now
available for subscribers.&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.4.3 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/30/gitlab-7-4-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/30/gitlab-7-4-3-released/</id>
<published>2014-10-30T00:00:00+00:00</published>
<updated>2014-10-30T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;Today we released GitLab Community Edition 7.4.3 and GitLab Enterprise Edition
7.4.3. This is a security release which fixes a groups API vulnerability.
Snippet raw view and buildbox integration are fixed with this release as well.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 2014-11-03 10:02 CEST:&lt;&#x2F;em&gt; The groups API vulnerability has been assigned the CVE identifier CVE-2014-8540.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;affected-versions&quot;&gt;Affected versions&lt;&#x2F;h2&gt;

&lt;p&gt;The groups API vulnerability affects GitLab 6.0 and up.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h2&gt;

&lt;p&gt;The vulnerability patched by this release allows a guest user to delete the owner of a group and to assign any other member as owner through the groups API.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;
&lt;p&gt;Omnibus-gitlab packages for GitLab 7.4.3 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.4.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/24/gitlab-7-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/24/gitlab-7-4-1-released/</id>
<published>2014-10-24T00:00:00+00:00</published>
<updated>2014-10-24T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;Update: Since 7.4.0 the title of newly created internal snippets is exposed to people who are not logged in.
The contents of internal snippets is not exposed, and private snippets are not affected.
We will fix this in 7.4.2 which will release today, October 24.&lt;&#x2F;p&gt;

&lt;p&gt;Today we released GitLab Community Edition 7.4.1 and GitLab Enterprise Edition
7.4.1. This is a patch release which fixes the following things:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;allow unauthenticated access to public snippets&lt;&#x2F;li&gt;
  &lt;li&gt;fix Git HTTP access with LDAP credentials&lt;&#x2F;li&gt;
  &lt;li&gt;fix LDAP security checks for logged in users after updating to the new LDAP configuration syntax&lt;&#x2F;li&gt;
  &lt;li&gt;fix 500 error on projects with nested submodules&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;
&lt;p&gt;Omnibus-gitlab packages for GitLab 7.4.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.4.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/24/gitlab-7-4-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/24/gitlab-7-4-2-released/</id>
<published>2014-10-24T00:00:00+00:00</published>
<updated>2014-10-24T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;Today we released GitLab Community Edition 7.4.2 and GitLab Enterprise Edition
7.4.2. This is a patch release which fixes the exposure of the title of newly created internal snippets.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;
&lt;p&gt;Omnibus-gitlab packages for GitLab 7.4.2 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 5.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/22/gitlab-ci-5-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/22/gitlab-ci-5-dot-1-released/</id>
<published>2014-10-22T13:54:59+00:00</published>
<updated>2014-10-22T13:54:59+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we&#x27;ve released version 5.1 of our continuous integration server GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;This version contains many cool, new features.&lt;&#x2F;p&gt;

&lt;p&gt;We&#x27;ve created a new admin page which shows all builds.&lt;&#x2F;p&gt;

&lt;p&gt;In addition, GitLab CI can now parse coverage information from builds and will show this on Merge Requests in GitLab and on the build page.&lt;&#x2F;p&gt;

&lt;p&gt;You don&#x27;t always want to trigger a CI build with every push. With GitLab CI 5.1, it&#x27;s now possible to define a list of branches that should be ignored by GitLab CI.&lt;&#x2F;p&gt;



&lt;p&gt;You can find a more detailed list of changes &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;5-1-stable&#x2F;CHANGELOG&quot;&gt;here&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;builds-page&quot;&gt;Builds page.&lt;&#x2F;h2&gt;

&lt;p&gt;You can now get an overall picture of the runners, which is useful if you have to make decisions on the amount of runners you might need.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;builds_page.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;builds_page.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;coverage-parsing&quot;&gt;Coverage parsing.&lt;&#x2F;h2&gt;

&lt;p&gt;With Coverage parsing, you will be able to track your test coverage. This feature enables you to determine which change led to a change in coverage, allowing you to take appropriate action.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;coverage_index.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;coverage_index.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;coverage_show.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;coverage_show.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;setting_coverage_parsing.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5_1&#x2F;setting_coverage_parsing.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-process&quot;&gt;Update process&lt;&#x2F;h2&gt;

&lt;p&gt;If you already use GitLab CI you need to follow our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;5.0-to-5.1.md&quot;&gt;Update guide&lt;&#x2F;a&gt; for Coordinator and update all your Runners to version 5.
You can find the Runner update guide &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-runner&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update-from-v4-to-v5.md&quot;&gt;here&lt;&#x2F;a&gt;. Also check the build scripts of your projects to make sure they are compatible with the new behavior.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-setup&quot;&gt;New setup&lt;&#x2F;h2&gt;

&lt;p&gt;You can set up a new GitLab CI instance using &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;installation guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;support&quot;&gt;Support&lt;&#x2F;h2&gt;

&lt;p&gt;If you are looking for paid support for GitLab CI, please &lt;a href=&quot;&#x2F;sales&#x2F;&quot;&gt;contact sales&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.4 released with task lists and multiple LDAP servers support</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/22/gitlab-7-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/22/gitlab-7-4-released/</id>
<published>2014-10-22T00:00:00+00:00</published>
<updated>2014-10-22T00:00:00+00:00</updated>
<author>
<name>Valery Sizov</name>
</author>
<content type='html'>&lt;p&gt;Update: Since 7.4.0 the title of newly created internal snippets is exposed to people who are not logged in.
The contents of internal snippets is not exposed, and private snippets are not affected.
We will fix this in 7.4.2 which will release today, October 24.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
The biggest new feature in Community Edition is task lists.
In addition to all the new features from Community Edition, GitLab Enterprise Edition gained support for multiple LDAP servers.&lt;&#x2F;p&gt;

&lt;p&gt;Other changes include reworked snippet access (now public, internal or private) and a README tab on the project home page for quick access. This version also includes a lot of bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (&lt;a href=&quot;&#x2F;community&#x2F;mvp&#x2F;&quot;&gt;MVP&lt;&#x2F;a&gt;) is Vinnie Okada. He added cross-project references to the markdown parser, task lists to issue and merge request descriptions and improved event note display.
Thanks Vinnie!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;task-lists&quot;&gt;Task lists.&lt;&#x2F;h2&gt;

&lt;p&gt;You can define task list directly at the issue page by using special syntax &lt;code&gt;- [ ] title&lt;&#x2F;code&gt;. Check the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;markdown&#x2F;markdown.html#task-lists&quot;&gt;markdown tasks documentation&lt;&#x2F;a&gt; for details. When description has markdown tasks, issue will list progress on the issues index for &lt;a href=&quot;&#x2F;images&#x2F;7_4&#x2F;quick_task_overview.png&quot;&gt;quick overview&lt;&#x2F;a&gt;. This feature makes the GitLab issue tracker more flexible.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_4&#x2F;task-list.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_4&#x2F;task-list.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;the-readme-tab-on-project-show-page&quot;&gt;The README tab on project show page.&lt;&#x2F;h2&gt;

&lt;p&gt;This tab allows you to see readme page directly at the project main page. If a user selects the README tab, GitLab will remember this preference in the session. This means other projects will also directly show the README tab on the project main page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_4&#x2F;project-readme.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_4&#x2F;project-readme.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;snippets-can-be-public-internal-or-private&quot;&gt;Snippets can be public, internal or private.&lt;&#x2F;h2&gt;

&lt;p&gt;You can now create snippets with various visibility levels. A public snippet is visible for everyone, even people that are not signed into your GitLab instance. Internal snippets are only visible to authorized users and private snippets are only visible to those with explicit access.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_4&#x2F;new-snippet.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_4&#x2F;new-snippet.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;support-for-multiple-ldap-servers-ee-only-feature&quot;&gt;Support for multiple LDAP servers (EE only feature).&lt;&#x2F;h2&gt;

&lt;p&gt;You can now hook up GitLab to multiple LDAP servers! When syncing LDAP groups, you can select the LDAP server. This way, a single GitLab instance can easily be used in very large enterprises.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_4&#x2F;ldap.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_4&#x2F;ldap.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cross-project-references&quot;&gt;Cross project references&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab will enable linking to commits, merge requests and issues in other projects by prepending a namespaced project path to the reference. What this means is that you can mention an issue from another project by using the special syntax:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;code&gt;namespace&#x2F;project#123&lt;&#x2F;code&gt; : for issues&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;code&gt;namespace&#x2F;project!123&lt;&#x2F;code&gt; : for merge requests&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;code&gt;namespace&#x2F;project@1234567&lt;&#x2F;code&gt; : for commits&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;See &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;markdown&#x2F;markdown.html#special-gitlab-references&quot;&gt;special GitLab references documentation&lt;&#x2F;a&gt; for more details.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has more improvements, please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-4-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the all named changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;cookbook-gitlab-is-being-deprecated&quot;&gt;Cookbook GitLab is being deprecated&lt;&#x2F;h2&gt;

&lt;p&gt;In the last few months the &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;Omnibus GitLab packages&lt;&#x2F;a&gt; have improved to the point where they have the same functionality as Cookbook GitLab. They allow much easier and faster installation than the cookbook.&lt;&#x2F;p&gt;

&lt;p&gt;Since the packages are more popular, keeping them up to date is a priority and any bugs are quickly found and solved.&lt;&#x2F;p&gt;

&lt;p&gt;For development environments we now recommend the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-development-kit&#x2F;blob&#x2F;master&#x2F;README.md&quot;&gt;GitLab Development Kit&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;It is hard for us to justify updating the cookbook in addition to the packages.
For that reason, version 0.7.4 will be the last version of Cookbook GitLab updated by GitLab B.V.&lt;&#x2F;p&gt;

&lt;p&gt;We recognize that this will cause a difficult upgrade for the people currently using the cookbook but we think that it will be better in the long term.&lt;&#x2F;p&gt;

&lt;p&gt;For Chef environments we now offer &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;cookbook-omnibus-gitlab&quot;&gt;cookbook-omnibus-gitlab&lt;&#x2F;a&gt; which will install and manage omnibus-gitlab package with Chef. We welcome any improvements and contributions.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.3-to-7.4.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.
There is an optional guide with &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-4-stable&#x2F;doc&#x2F;update&#x2F;7.3-to-7.4.md#7-optional-optimizations-for-gitlab-setups-with-mysql-databases&quot;&gt;optimizations for GitLab setups with MySQL databases&lt;&#x2F;a&gt; to bring MySQL installations that have been around for a while up to the latest standards.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h1&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Cookbook-omnibus-gitlab 0.1.2 security release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/08/cookbook-omnibus-gitlab-0-1-2-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/08/cookbook-omnibus-gitlab-0-1-2-security-release/</id>
<published>2014-10-08T00:00:00+00:00</published>
<updated>2014-10-08T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we released cookbook-omnibus-gitlab 0.1.2 to address an issue where
encrypted secrets were stored in plaintext on the Chef Server.&lt;&#x2F;p&gt;



&lt;p&gt;&lt;em&gt;Update 2014-10-09:&lt;&#x2F;em&gt; fix incorrect post date.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;cookbook-omnibus-gitlab&quot;&gt;Cookbook-omnibus-gitlab&lt;&#x2F;a&gt;
is a Chef cookbook to install GitLab using Omnibus packages.&lt;&#x2F;p&gt;

&lt;p&gt;Cookbook-omnibus-gitlab allows you to keep secret Omnibus-gitLab settings
(passwords, keys) in an encrypted data bag. These secrets then get decrypted
during the Chef client run on your GitLab server. Due to a programming error,
the cookbook-omnibus-gitlab would then send the plaintext secrets back to the
Chef server to be stored in the node&#x27;s database record. This defeats one of the
purposes of using encrypted data bags, namely to keep plaintext secrets off of
the Chef server.&lt;&#x2F;p&gt;

&lt;p&gt;In version 0.1.2 we make sure that the secrets stored in the encrypted data bag
do not get sent back to the server.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;affected-versions&quot;&gt;Affected versions&lt;&#x2F;h2&gt;

&lt;p&gt;Cookbook-omnibus-gitlab 0.1.1 and older.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;fixed-versions&quot;&gt;Fixed versions&lt;&#x2F;h2&gt;

&lt;p&gt;Cookbook-omnibus-gitlab 0.1.2 and newer.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;diagnosis-and-fixes&quot;&gt;Diagnosis and fixes&lt;&#x2F;h2&gt;

&lt;p&gt;If you have been using cookbook-omnibus-gitlab with an encrypted data bag you
should upgrade to cookbook-omnibus-gitlab 0.1.2 or newer and inspect your
GitLab nodes to look for secrets:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;knife node show gitlab.example.com --format json
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If some of your cookbook-omnibus-gitlab secrets got uploaded to the Chef server
you can delete them from the node object using &lt;code&gt;knife node edit
gitlab.example.com&lt;&#x2F;code&gt; &lt;strong&gt;after&lt;&#x2F;strong&gt; you upgrade cookbook-omnibus-gitlab to 0.1.2 or
newer.&lt;&#x2F;p&gt;

&lt;p&gt;As an additional measure you may want to consider changing the affected
passwords and keys.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.3.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/10/01/gitlab-7-dot-3-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/10/01/gitlab-7-dot-3-dot-2-released/</id>
<published>2014-10-01T11:30:15+00:00</published>
<updated>2014-10-01T11:30:15+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab Community Edition 7.3.2 that fixes two issues:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fix bug when changes to post-receive worker was not dumped properly&lt;&#x2F;li&gt;
  &lt;li&gt;Fix creating new file via web editor&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab Enterprise Edition 7.3.2 also includes the above mentioned fixes.&lt;&#x2F;p&gt;



&lt;p&gt;Packages for GitLab Community Edition 7.3.2 have been released for Ubuntu 12.04, Ubuntu 14.04, Debian 7, CentOS 6.5, CentOS 7.
GitLab Enterprise Edition packages can be found in the subscribers repository.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.3.2 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;.
Be sure to do &#x27;sudo gitlab-ctl stop nginx&#x27; before upgrading from 7.3.0.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Gitlab installations from source are affected by Bash CVE-2014-7169</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/09/25/gitlab-shell-and-bash-cve-2014-7169/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/09/25/gitlab-shell-and-bash-cve-2014-7169/</id>
<published>2014-09-25T12:00:00+00:00</published>
<updated>2014-09-25T12:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;A &lt;a href=&quot;http:&#x2F;&#x2F;www.openwall.com&#x2F;lists&#x2F;oss-security&#x2F;2014&#x2F;09&#x2F;24&#x2F;32&quot;&gt;new vulnerability in Bash
(CVE-2014-7169)&lt;&#x2F;a&gt; has
come to light in the aftermath of CVE-2014-6271. This new vulnerability can be
exploited by a malicious GitLab user to perform a denial of service attack
against the Git SSH access provided by GitLab on server where GitLab was
installed from source.&lt;&#x2F;p&gt;

&lt;p&gt;If the attacker does not have an account with an SSH key on your GitLab server
then they cannot exploit Bash CVE-2014-7169 via GitLab.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;affected-versions&quot;&gt;Affected versions&lt;&#x2F;h2&gt;

&lt;p&gt;Bash vulnerability CVE-2014-7169 can be exploited against GitLab installations
where the default shell for &lt;code&gt;git&lt;&#x2F;code&gt; is Bash (or &lt;code&gt;sh&lt;&#x2F;code&gt; symlinked to Bash) AND the
&lt;code&gt;&#x2F;home&#x2F;git&#x2F;gitlab-shell&#x2F;bin&#x2F;gitlab-shell&lt;&#x2F;code&gt; executable is writable for the &lt;code&gt;git&lt;&#x2F;code&gt;
user.&lt;&#x2F;p&gt;

&lt;p&gt;Omnibus-gitlab installations are not affected because there the &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt;
executable is owned by &lt;code&gt;root&lt;&#x2F;code&gt; instead of &lt;code&gt;git&lt;&#x2F;code&gt;. Installations from source (e.g.
using the installation guide or cookbook-gitlab) may be affected if they expose
an unsafe version of Bash.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h2&gt;

&lt;p&gt;CVE-2014-7169 lets an attacker trick the Bash parser into interpreting
&lt;code&gt;command1 command2&lt;&#x2F;code&gt; as &lt;code&gt;command2 &amp;gt; command1&lt;&#x2F;code&gt;. When a malicious GitLab user
initiates an SSH connection with a GitLab server on which their SSH key is
installed they can trigger the command reordering, but they cannot choose the
command that gets executed because that is determined in &lt;code&gt;authorized_keys&lt;&#x2F;code&gt; by
an OpenSSH &lt;code&gt;command=&quot;...&quot;&lt;&#x2F;code&gt; directive.&lt;&#x2F;p&gt;

&lt;p&gt;Normally when a GitLab user connects to &lt;code&gt;git@gitlab.example.com&lt;&#x2F;code&gt;, the following
hard-coded command would be executed by OpenSSH:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;&#x2F;path&#x2F;to&#x2F;gitlab-shell key-123
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The number 123 would be the database ID that GitLab associated with the SSH
key.&lt;&#x2F;p&gt;

&lt;p&gt;Because of CVE-2014-7169, a malicious user can turn the intended command into
&lt;code&gt;key-123 &amp;gt; &#x2F;path&#x2F;to&#x2F;gitlab-shell&lt;&#x2F;code&gt;. This will give an error because there most
likely is no executable in the PATH named &lt;code&gt;key-123&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;On omnibus-gitlab installations the command will also give a second error
because the &lt;code&gt;git&lt;&#x2F;code&gt; user is not allowed to write to the &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt; executable
file, and no harm is done.&lt;&#x2F;p&gt;

&lt;p&gt;On installations from source however, the &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt; script is owned by the
&lt;code&gt;git&lt;&#x2F;code&gt; user. That means that in this situation the &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt; script gets
truncated to 0 bytes. Now that the &lt;code&gt;gitlab-shell&lt;&#x2F;code&gt; executable is corrupted,
nobody can connect to &lt;code&gt;git@gitlab.example.com&lt;&#x2F;code&gt; for &lt;code&gt;git clone&lt;&#x2F;code&gt;, &lt;code&gt;git push&lt;&#x2F;code&gt; etc
anymore: we have a denial of service.&lt;&#x2F;p&gt;

&lt;p&gt;For clarity, we would like to repeat that this vulnerability can only be
exploited against GitLab by attackers with a GitLab user account and an SSH key
on your GitLab server.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;mitigation&quot;&gt;Mitigation&lt;&#x2F;h2&gt;

&lt;p&gt;Until a new version of Bash is released you should &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;09&#x2F;24&#x2F;gitlab-shell-and-bash-cve-2014-6271&#x2F;#workarounds&quot;&gt;make sure the git user uses
a safer shell than Bash&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;detection&quot;&gt;Detection&lt;&#x2F;h2&gt;

&lt;p&gt;To see if your GitLab server is affected, first check the shell used by the &lt;code&gt;git&lt;&#x2F;code&gt; user:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;ls -l $(getent passwd git | awk -F: &#x27;{print $7}&#x27;)
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you see &lt;code&gt;bash&lt;&#x2F;code&gt;, you may be affected. You can test for the presence of the
Bash vulnerability as follows.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;mkdir test-CVE-2014-7169
cd test-CVE-2014-7169
env X=&#x27;() { (a)=&amp;gt;\&#x27; bash -c &#x27;echo date&#x27;
# If this prints the current date you are affected. If it says
# &#x27;cat: echo: No such file or directory&#x27; you are not affected.
cat echo
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;recovery&quot;&gt;Recovery&lt;&#x2F;h2&gt;

&lt;p&gt;You can check and recover the gitlab-shell executable on the GitLab server as
follows in case somebody used this vulnerability against your server.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo su - git
cd &#x2F;home&#x2F;git&#x2F;gitlab-shell

# Check if bin&#x2F;gitlab-shell was modified
git status

# Restore bin&#x2F;gitlab-shell if necessary
git checkout -- bin&#x2F;gitlab-shell
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Gitlab-shell is affected by Bash CVE-2014-6271</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/09/24/gitlab-shell-and-bash-cve-2014-6271/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/09/24/gitlab-shell-and-bash-cve-2014-6271/</id>
<published>2014-09-24T17:00:00+00:00</published>
<updated>2014-09-24T17:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today a security vulnerability in Bash (CVE-2014-6271) &lt;a href=&quot;http:&#x2F;&#x2F;www.openwall.com&#x2F;lists&#x2F;oss-security&#x2F;2014&#x2F;09&#x2F;24&#x2F;12&quot;&gt;was
announced&lt;&#x2F;a&gt; that can
be exploited against the OpenSSH daemon. On GitLab servers where the default
shell of the &lt;code&gt;git&lt;&#x2F;code&gt; user is Bash (or Bash masquerading as &lt;code&gt;sh&lt;&#x2F;code&gt;) this allows for
remote code execution as the &lt;code&gt;git&lt;&#x2F;code&gt; user for attackers who have uploaded their
SSH key to GitLab via the GitLab web interface.&lt;&#x2F;p&gt;

&lt;p&gt;If the attacker does not have an account with an SSH key on your GitLab server
then they cannot exploit Bash CVE-2014-6271 via GitLab.&lt;&#x2F;p&gt;



&lt;p&gt;&lt;em&gt;Update 19:09 CEST:&lt;&#x2F;em&gt; Added a mailing list link with details about the Bash
vulnerability.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 19:33 CEST:&lt;&#x2F;em&gt; Explain that attackers need a GitLab account.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 2014-09-25 9:40 CEST:&lt;&#x2F;em&gt; Emphasize that updating Bash is the solution.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 2014-09-25 15:00 CEST:&lt;&#x2F;em&gt; Updated for CVE-2014-7169.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;detection&quot;&gt;Detection&lt;&#x2F;h2&gt;

&lt;p&gt;Asssuming your SSH key is in GitLab, you can test for this vulnerability with
the following command:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;ssh  git@gitlab.example.com &#x27;() { ignored; }; &#x2F;usr&#x2F;bin&#x2F;id&#x27;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;On affected GitLab servers, the output will look like this:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;uid=1001(git) gid=1001(git) groups=1001(git)
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you see &lt;code&gt;Not allowed command&lt;&#x2F;code&gt; instead, your GitLab server is not affected by
this vulnerability.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;updates&quot;&gt;Updates&lt;&#x2F;h2&gt;

&lt;p&gt;To address this vulnerability you need to update Bash to a safe version on your
system.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# Debian&#x2F;Ubuntu http:&#x2F;&#x2F;www.ubuntu.com&#x2F;usn&#x2F;usn-2362-1&#x2F;
sudo apt-get update
sudo apt-get install bash

# Centos https:&#x2F;&#x2F;access.redhat.com&#x2F;node&#x2F;1207723
sudo yum update bash
sudo &#x2F;sbin&#x2F;ldconfig
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Note that your &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;09&#x2F;25&#x2F;gitlab-shell-and-bash-cve-2014-7169&#x2F;&quot;&gt;GitLab server may still be affected by Bash
CVE-2014-7169&lt;&#x2F;a&gt; until new Bash
packages get released by your OS distribution; consider making sure the &lt;code&gt;git&lt;&#x2F;code&gt;
user does not use Bash as described below.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a name=&quot;workarounds&quot;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;h2 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h2&gt;

&lt;p&gt;If it is not possible to update Bash to a safe version on your GitLab server
you can change the shell of the &lt;code&gt;git&lt;&#x2F;code&gt; user to &lt;code&gt;csh&lt;&#x2F;code&gt;. Dash, which is installed
on Debian&#x2F;Ubuntu by default, is also an option. Please note that updating the
shell of the &lt;code&gt;git&lt;&#x2F;code&gt; user protects GitLab, but not the rest of your system.&lt;&#x2F;p&gt;

&lt;p&gt;You can check which shell is used by the &lt;code&gt;git&lt;&#x2F;code&gt; user as follows:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;$ ls -l $(getent passwd git | awk -F: &#x27;{print $7}&#x27;)
lrwxrwxrwx 1 root root 4 Sep 24 18:08 &#x2F;bin&#x2F;sh -&amp;gt; bash
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Note that in the example above, the &lt;code&gt;git&lt;&#x2F;code&gt; user is at risk because their shell
is Bash.&lt;&#x2F;p&gt;

&lt;p&gt;As a workaround, we can make Csh the default shell for the &lt;code&gt;git&lt;&#x2F;code&gt; user.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# Debian&#x2F;Ubuntu
sudo apt-get install csh

# Centos
sudo yum install csh
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you are using omnibus-gitlab, add the following line to
&lt;code&gt;&#x2F;etc&#x2F;gitlab&#x2F;gitlab.rb&lt;&#x2F;code&gt; and run &lt;code&gt;sudo gitlab-ctl reconfigure&lt;&#x2F;code&gt;:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;user[&#x27;shell&#x27;] = &#x27;&#x2F;bin&#x2F;csh&#x27;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you are using an installation from source you can change the shell for the
git user with the following command:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo chsh -s &#x2F;bin&#x2F;csh git
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;Now test if you are no longer vulnerable with the command listed above under
&#x27;Detection&#x27;.&lt;&#x2F;p&gt;

&lt;p&gt;If changing the shell of the Git user is not an option for some reason you can
also defend against this vulnerability by adding &lt;code&gt;git&lt;&#x2F;code&gt; to the &lt;code&gt;DenyUsers&lt;&#x2F;code&gt; in
&lt;code&gt;&#x2F;etc&#x2F;ssh&#x2F;sshd_config&lt;&#x2F;code&gt; and restarting SSH. Note that this will disable Git
push&#x2F;pull access via SSH to your GitLab server.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;DenyUsers git
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.3.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/09/24/gitlab-7-dot-3-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/09/24/gitlab-7-dot-3-dot-1-released/</id>
<published>2014-09-24T09:30:15+00:00</published>
<updated>2014-09-24T09:30:15+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab Community Edition 7.3.1 that fixes several issues:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;pushing to protected branches&lt;&#x2F;li&gt;
  &lt;li&gt;viewing diffs of files with changed permissions no longer gives a 500 error&lt;&#x2F;li&gt;
  &lt;li&gt;comments with new commits in merge requests now only show the relevant commits&lt;&#x2F;li&gt;
  &lt;li&gt;searching descriptions with relative links no longer causes 500 errors&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;GitLab Enterprise Edition 7.3.1 also includes the above mentioned fixes.&lt;&#x2F;p&gt;



&lt;p&gt;Packages for GitLab Community Edition 7.3.1 have been released for Ubuntu 12.04, Ubuntu 14.04, Debian 7, CentOS 6.5, CentOS 7.
GitLab Enterprise Edition packages can be found in the subscribers repository.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.3.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;.
Be sure to do &#x27;sudo gitlab-ctl stop nginx&#x27; before upgrading from 7.3.0.&lt;&#x2F;p&gt;

&lt;p&gt;To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.3 released with performance improvements</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/09/22/gitlab-7-dot-3-released-with-performance-improvements/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/09/22/gitlab-7-dot-3-released-with-performance-improvements/</id>
<published>2014-09-22T10:50:22+00:00</published>
<updated>2014-09-22T10:50:22+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
The biggest new feature in Community Edition is the improved performance with large pushes.
Other changes include the ability to edit a file in fullscreen (zen) mode, &#x27;comment and close&#x27; button, wiki and snippets search and several API improvements.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to the updates from Community Edition, GitLab Enterprise Edition allows assigning multiple LDAP groups to a single GitLab group.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (MVP) is Robert Schilling for contributing zen mode, keyboard shortcuts and helping out on the issue tracker.
Thanks Robert!&lt;&#x2F;p&gt;



&lt;p&gt;&lt;em&gt;Updated 2014-09-23 10:00 CEST:&lt;&#x2F;em&gt; Added a paragraph about omnibus-gitlab changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-performance-on-large-pushes&quot;&gt;Improved performance on large pushes&lt;&#x2F;h2&gt;

&lt;p&gt;Previously on a push that contained 1 thousand branches GitLab would create 1 thousand workers.&lt;&#x2F;p&gt;

&lt;p&gt;That would take some time to process during which other background tasks would be queued.&lt;&#x2F;p&gt;

&lt;p&gt;With the changes introduced in GitLab 7.3, a single push will only create a single worker which will handle all branches.&lt;&#x2F;p&gt;

&lt;p&gt;This allows other workers to be ready for new jobs and any long running workers can
easily be stopped if necessary and making it less likely that GitLab slows down due to large pushes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;keyboard-shortcuts&quot;&gt;Keyboard shortcuts&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to the contribution by Robert Schilling, keyboard shortcuts have been further improved with multiple shortcuts added. Navigation in GitLab just got easier!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_3&#x2F;keyboard.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_3&#x2F;keyboard.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;comment-and-close-button&quot;&gt;Comment and close button&lt;&#x2F;h2&gt;

&lt;p&gt;When commenting in an issue or merge request you can now easily close an issue while leaving the comment.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_3&#x2F;comment_and_close.gif&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_3&#x2F;comment_and_close.gif&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;zen-fullscreen-mode&quot;&gt;Zen (fullscreen) mode&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to the contribution by Robert Schilling, you can now switch into a fullscreen mode to have more room to edit your issue, merge request or a comment.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_3&#x2F;zen.gif&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_3&#x2F;zen.gif&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-commits-linked-in-merge-request&quot;&gt;New commits linked in Merge Request&lt;&#x2F;h2&gt;

&lt;p&gt;When new commits are pushed to the existing Merge Request, they will be shown in the Merge Request timeline.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_3&#x2F;linked_commits.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_3&#x2F;linked_commits.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-api-features&quot;&gt;New API features&lt;&#x2F;h2&gt;

&lt;p&gt;Users can now filter issues by state and labels when interacting with the API.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to sponsoring by O&#x27;Reilly Media it is now possible to sort merge requests in ascending or descending order for updated_at and created_at fields.&lt;&#x2F;p&gt;

&lt;p&gt;In addition you can also get more detailed information about merge requests and comments.
You can read more about the GitLab API at &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;README.html&quot;&gt;doc.gitlab.com&#x2F;ce&#x2F;api&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;assigning-multiple-ldap-groups-to-a-gitlab-group-ee-only-feature&quot;&gt;Assigning multiple LDAP groups to a GitLab group (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;Synchronizing with more than one LDAP group is now possible with GitLab 7.3 EE.
You can link multiple LDAP groups to a single GitLab group and give them different permissions.&lt;&#x2F;p&gt;

&lt;p&gt;This makes our LDAP integration much more powerful and flexible.&lt;&#x2F;p&gt;

&lt;p&gt;Check the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;ldap.html#synchronizing-with-more-than-one-ldap-group-gitlab-ee-7.3-and-newer&quot;&gt;documentation&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_3&#x2F;multiple_ldap_groups.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_3&#x2F;multiple_ldap_groups.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;security-connect-to-redis-via-sockets&quot;&gt;Security: connect to Redis via sockets&lt;&#x2F;h2&gt;

&lt;p&gt;Redis is an in-memory database used by GitLab for asynchronous inter-process communication, cache storage and session storage.
A standard Redis installation trusts all local TCP connections.
This means that an attacker who can create a TCP connection originating on the GitLab server could be able to modify or read user session data.
As a security measure against this risk we are changing the default settings for GitLab to connect to Redis via Unix domain sockets.
This allows system administrators to limit Redis access to the &lt;code&gt;git&lt;&#x2F;code&gt; user using file&#x2F;directory permissions.&lt;&#x2F;p&gt;

&lt;p&gt;What do you need to do to switch to Redis via sockets?&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Omnibus-gitlab users switch to sockets automatically when they upgrade to 7.3.
Tip: if you changed your Redis port in gitlab.rb with &lt;code&gt;redis[&#x27;port&#x27;] = xxxx&lt;&#x2F;code&gt; to avoid port conflicts, you can remove that line now.&lt;&#x2F;li&gt;
  &lt;li&gt;The required configuration changes for manual installations are &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.2-to-7.3.md&quot;&gt;described in the 7.3 upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
  &lt;li&gt;Instructions for cookbook-gitlab are still a &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;cookbook-gitlab&#x2F;issues&#x2F;68&quot;&gt;work in progress&lt;&#x2F;a&gt;.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Unix domain sockets only work for connections between local processes.
If your Redis instance is running on another machine consider adding the firewall rules below.
Alternatively, you could create an encrypted connection between the GitLab server and the Redis server using &lt;a href=&quot;http:&#x2F;&#x2F;www.tarsnap.com&#x2F;spiped.html&quot;&gt;spiped&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# Iptables example for GitLab installations which cannot use sockets
# We assume the Redis server is listening at 192.168.99.1:6379

# Allow outgoing connections to 192.168.99.1:6379 for the git user.
# Disallow outgoing connections to 192.168.99.1:6379 for everybody else.
# Note: the order of these rules matters.
iptables -A OUTPUT -m owner --uid-owner git -p tcp -d 192.168.99.1 --dport 6379 -j ACCEPT
iptables -A OUTPUT -p tcp -d 192.168.99.1 --dport 6379 -j REJECT
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;We would like to thank Wyatt J. Brown for their responsible disclosure of this issue.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;omnibus-gitlab-now-supports-non-bundled-web-servers&quot;&gt;Omnibus-gitlab now supports non-bundled web servers&lt;&#x2F;h2&gt;

&lt;p&gt;The omnibus-gitlab packages provide a bundled NGINX web server which acts as a reverse proxy for GitLab, and which also serves static files such as Javascript, CSS files and user uploads.
Prior to omnibus-gitlab 7.3 it was not supported to use a web server other than the bundled NGINX, because the omnibus-gitlab directory layout prevented access to user uploads in the interest of security.
In omnibus-gitlab 7.3 we have changed the omnibus-gitlab directory layout and permissions to allow for non-bundled web servers.
As a side benefit, we now have a stronger privilege separation between NGINX and the GitLab Rails application.&lt;&#x2F;p&gt;

&lt;p&gt;To implement this change, omnibus-gitlab now creates a &lt;code&gt;gitlab-www&lt;&#x2F;code&gt; user which is intended to have read-only access to user uploads and read-write access to the Unicorn socket.
For practical reasons, the socket used for communication between NGINX and Unicorn was moved from &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;gitlab-rails&#x2F;tmp&#x2F;sockets&lt;&#x2F;code&gt; to &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;gitlab-rails&#x2F;sockets&lt;&#x2F;code&gt;.
For more information about using a non-bundled web server with omnibus-gitlab, please see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;7-3-stable&#x2F;README.md#use-non-bundled-web-server&quot;&gt;omnibus-gitlab README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to the changes above, we changed the NGINX directory layout to avoid directories like &lt;code&gt;&#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;proxy_temp&lt;&#x2F;code&gt; being created by NGINX.
These temporary directories now get created in &lt;code&gt;&#x2F;var&#x2F;opt&#x2F;gitlab&#x2F;nginx&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;Check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-3-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see these and additional changes.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrade-barometer&quot;&gt;Upgrade barometer&lt;&#x2F;h2&gt;

&lt;p&gt;When upgrading to 7.3 there will be more time needed for migrations since there has been an important update to the GitLab structure, more specifically git hooks.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to the hooks update there is a migration for the serialization of project services which loops through a lot of data. On installation with more than 10000 projects this migration alone took about 3 minutes.&lt;&#x2F;p&gt;

&lt;p&gt;** NOTE ** Users with large number of repositories (more than 1000) can expect prolonged downtime(up to 100 minutes depending on number or repositories) if upgrading from versions &amp;lt;= 7.2.1 . For that reason, we advise
first upgrading to version 7.2.2, see &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;09&#x2F;19&#x2F;gitlab-7-dot-2-2-security-release&#x2F;#hooks-migration-script&quot;&gt;this blogpost for detailed information&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Users with smaller number of repositories (less than 1000) can safely upgrade directly to 7.3 expecting downtime similar to previous upgrades.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-news&quot;&gt;Other news&lt;&#x2F;h2&gt;
&lt;p&gt;We just &lt;a href=&quot;&#x2F;blog&#x2F;2014&#x2F;09&#x2F;22&#x2F;wandisco-integrates-gitlab-enterprise-edition-in-their-git-multisite-offering&#x2F;&quot;&gt;announced&lt;&#x2F;a&gt; that WANdisco will incorporate GitLab in their globally distributed git product.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to 2.0.0 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.2-to-7.3.md#3-update-gitlab-shell&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.2-to-7.3.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h1&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.2.2 Security Release and hooks migration</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/09/19/gitlab-7-dot-2-2-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/09/19/gitlab-7-dot-2-2-security-release/</id>
<published>2014-09-19T00:00:00+00:00</published>
<updated>2014-09-19T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we released GitLab 7.2.2. This release addresses a security issue in the
&lt;code&gt;.deb&lt;&#x2F;code&gt; packages for GitLab 7.2.x. In addition, the 7.2.2 release includes a
&lt;a href=&quot;#hooks-migration-script&quot;&gt;hooks migration script&lt;&#x2F;a&gt; that can be used to avoid
long downtime during the upgrade to 7.3 for GitLab installations with many (&amp;gt;
1000) repositories.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;insecure-file-permissions-in-omnibus-gitlab-72x-deb-packages&quot;&gt;Insecure file permissions in omnibus-gitlab 7.2.x .deb packages&lt;&#x2F;h2&gt;

&lt;p&gt;Due to a &lt;a href=&quot;https:&#x2F;&#x2F;www.getchef.com&#x2F;blog&#x2F;2014&#x2F;09&#x2F;19&#x2F;security-releases-omnibus-2-0-2-and-3-2-2-insecure-file-ownership-in-omnibus-built-debian-and-ubuntu-packages&#x2F;&quot;&gt;regression in
omnibus-ruby&lt;&#x2F;a&gt;,
the omnibus-gitlab &lt;code&gt;.deb&lt;&#x2F;code&gt; packages for GitLab 7.2.x Community Edition and
Enterprise Edition install files with insecure permissions. We advise all users
who installed omnibus-gitlab 7.2.x on Ubuntu 12.04, Ubuntu 14.04 or Debian 7 to
run the workaround commands below and upgrade to GitLab 7.2.2 as soon as
possible. Centos 6 and Centos 7 are not affected by this security
vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;affected-versions&quot;&gt;Affected versions&lt;&#x2F;h3&gt;

&lt;p&gt;Omnibus-gitlab 7.2.0 CE (Community Edition), omnibus-gitlab 7.2.0 EE
(Enterprise Edition), omnibus-gitlab 7.2.1 CE, omnibus-gitlab 7.2.1 EE on
&lt;strong&gt;Ubuntu 12.04&lt;&#x2F;strong&gt;, &lt;strong&gt;Ubuntu 14.04&lt;&#x2F;strong&gt; and &lt;strong&gt;Debian 7&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;unaffected-versions&quot;&gt;Unaffected versions&lt;&#x2F;h3&gt;

&lt;p&gt;Installations from source or with cookbook-gitlab and omnibus-gitlab packages
for Centos 6 and Centos 7 are not affected by this vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;

&lt;p&gt;Omnibus-gitlab 7.2.0 and newer use omnibus-ruby 3.2.1. Due to a regression,
&lt;code&gt;.deb&lt;&#x2F;code&gt; packages (the format used by Debian and Ubuntu) built by omnibus-ruby
3.2.1 use insecure defaults when extracting the package contents causing the
files created on the target system to be owned by the numeric uid&#x2F;gid of the
build user on the server the omnibus package was built on, instead of the files
being owned by 0&#x2F;0 (root). This could (theoretically) be exploited by an
attacker with the ability to write arbitrary files on your system.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;detection&quot;&gt;Detection&lt;&#x2F;h3&gt;

&lt;p&gt;You can check whether your omnibus-gitlab installation is affected with the
following command:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;ls -lnd &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;service&#x2F;gem&#x2F;ruby&#x2F;2.1.0&#x2F;gems&#x2F;rugged-0.21.0&#x2F; &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;bin&#x2F;ruby
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The output should look like:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;-rwxr-xr-x 1 0 0 11991 Sep 18 15:02 &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;bin&#x2F;ruby
drwxrwxr-x 5 0 0  4096 Sep 18 16:04 &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;service&#x2F;gem&#x2F;ruby&#x2F;2.1.0&#x2F;gems&#x2F;rugged-0.21.0&#x2F;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If you see &lt;code&gt;1001 1001&lt;&#x2F;code&gt; (or another non-zero number) instead of &lt;code&gt;0 0&lt;&#x2F;code&gt;, your
omnibus-gitlab installation is affected by this vulnerability.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;mitigation&quot;&gt;Mitigation&lt;&#x2F;h3&gt;

&lt;p&gt;All users who installed omnibus-gitlab 7.2.0 or omnibus-gitlab 7.2.1 &lt;strong&gt;on
Ubuntu or Debian&lt;&#x2F;strong&gt; should &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;upgrade to omnibus-gitlab 7.2.2&lt;&#x2F;a&gt; &lt;em&gt;and&lt;&#x2F;em&gt;
run the following two commands.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# Change ownership of all omnibus-gitlab packaged files to root:root
sudo sh -c &#x27;dpkg-query -L gitlab | while read f; do chown root:root &quot;$f&quot;; done&#x27;

# Restore gitlab-specific permissions
sudo gitlab-ctl reconfigure
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;The two commands above can also be used as a workaround for users who cannot
upgrade immediately.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a name=&quot;hooks-migration-script&quot;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;h2 id=&quot;hooks-migration-script&quot;&gt;Hooks migration script&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 7.3 we are changing the git repository hooks that GitLab creates in
each Git repository to improve performance for Git pushes with many branches.
To achieve this change, the set of migrations for GitLab 7.3 contains one
migration that will loop through all Git repositories managed by GitLab and
update the &lt;code&gt;hooks&lt;&#x2F;code&gt; directory to become a symlink to gitlab-shell&#x27;s &lt;code&gt;hooks&lt;&#x2F;code&gt;
directory. On GitLab servers with many repositories this may take a long time.&lt;&#x2F;p&gt;

&lt;p&gt;To avoid long downtime on very large GitLab installations, we came up with a
workaround to perform the hooks migration without downtime prior to upgrading
to GitLab 7.3. This workaround is optional; if you skip it your hooks will get
upgraded automatically when you upgrade to 7.3. &lt;em&gt;If your GitLab server has less
than 1000 repositories the steps below are not worth the hassle.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;p&gt;After upgrading to 7.2.2 (and on Ubuntu&#x2F;Debian, running the two commands
above), you can perform the hooks migration online with the following rake
task.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;# Omnibus installations: note that you will be prompted to do a cp command
sudo gitlab-rake gitlab:migrate:shell_hooks

# Installations from source &#x2F; cookbook-gitlab:
cd &#x2F;home&#x2F;git&#x2F;gitlab
sudo -u git -H bundle exec rake gitlab:migrate:shell_hooks RAILS_ENV=production
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.2.2 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 2014-09-22 13:57 CEST:&lt;&#x2F;em&gt; added link to Chef blog post.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.2.1 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/08/28/gitlab-7-dot-2-1-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/08/28/gitlab-7-dot-2-1-security-release/</id>
<published>2014-08-28T00:00:00+00:00</published>
<updated>2014-08-28T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we released GitLab Community Edition 7.2.1 and GitLab Enterprise Edition
7.2.1. This is a security release which remedies an XSS vulnerability in
GitLab. In addition to this 7.2.1 makes the tag-to-label migration for users
upgrading from GitLab 7.1 and earlier more
robust.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;affected-versions&quot;&gt;Affected versions&lt;&#x2F;h2&gt;

&lt;p&gt;This XSS vulnerability affects GitLab 7.2.0 and earlier.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h2&gt;

&lt;p&gt;The vulnerability patched by this release allows an attacker to carry out a
cross-site scripting (XSS) attack against users with a session on an affected
GitLab server. In order to exploit this vulnerability, the attacker needs to
have commit access to a repository on the affected GitLab server.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;upgrading&quot;&gt;Upgrading&lt;&#x2F;h2&gt;

&lt;p&gt;Omnibus-gitlab packages for GitLab 7.2.1 are &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;now
available&lt;&#x2F;a&gt;. To upgrade an installation
from source please use the
&lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;upgrader.html&quot;&gt;upgrader&lt;&#x2F;a&gt; or the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;patch_versions.html&quot;&gt;patch update
guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;acknowledgments&quot;&gt;Acknowledgments&lt;&#x2F;h2&gt;

&lt;p&gt;We would like to thank &lt;a href=&quot;http:&#x2F;&#x2F;zoczus.blogspot.com&#x2F;&quot;&gt;Jakub Zoczek&lt;&#x2F;a&gt; for his
responsible disclosure of this issue to us.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 2014-08-28 18:02 CEST:&lt;&#x2F;em&gt; Add affected version and acknowledgments.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update 2014-08-28 18:07 CEST:&lt;&#x2F;em&gt; Add link to GitHub issue for the label migration.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.2 released with better labels</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/08/22/gitlab-7-dot-2-released-with-better-labels/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/08/22/gitlab-7-dot-2-released-with-better-labels/</id>
<published>2014-08-22T10:50:22+00:00</published>
<updated>2014-08-22T10:50:22+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
The biggest new feature in Community Edition is new and improved labels.
In addition to the updates from Community Edition, GitLab Enterprise Edition allows administrator to send emails to users through the admin interface.&lt;&#x2F;p&gt;

&lt;p&gt;Other changes include the ability to star a project, an explore page for public projects and groups, an API for labels, improvements for diffs and various bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person (MVP) is Robert Schilling for helping out on the issue tracker, with merge requests, writing code and fixing the website.
Thanks Robert!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;improved-labels&quot;&gt;Improved labels&lt;&#x2F;h2&gt;

&lt;p&gt;You can now edit and delete labels and give them a (custom) color.&lt;&#x2F;p&gt;

&lt;p&gt;The characters &#x27;?&#x27;, &#x27;&amp;amp;&#x27; and &#x27;,&#x27; are no longer allowed however, so those will be removed from your tags during the database migrations for GitLab 7.2.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;labels1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;labels1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;labels2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;labels2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;star-project&quot;&gt;Star project&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to the contribution by Ciro Santilli, projects can now be starred. Most starred projects can be viewed on the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;explore&#x2F;projects&#x2F;starred&quot;&gt;public page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;star.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;star.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;explore-page&quot;&gt;Explore page&lt;&#x2F;h2&gt;

&lt;p&gt;The Public Projects page has been redesigned. Popular projects are featured and it&#x27;s easier to view all public groups and projects.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;explore1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;explore1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;explore2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;explore2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;unfold-the-diff&quot;&gt;Unfold the diff&lt;&#x2F;h2&gt;

&lt;p&gt;You can now unfold hidden parts of the diff easily.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;unfold.gif&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;unfold.gif&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;renewed-google-authentication&quot;&gt;Renewed Google Authentication&lt;&#x2F;h2&gt;

&lt;p&gt;If you are making use of Google Authentication you will need to enable Contacts API and Google+ API in the developer console of Google. This is because Google is deprecating some APIs September 1st.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;send-administrator-emails-to-users-ee-only-feature&quot;&gt;Send administrator emails to users (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;Administrator can now send emails to all GitLab users or specific groups or projects. This is particularly convenient to quickly send a message to a group of people.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_2&#x2F;admin_email.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_2&#x2F;admin_email.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;Check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-2-stable&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see these and additional changes.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to 1.9.7 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.1-to-7.2.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.
Cmake and pkg-config are an added dependencies, please install them before upgrading with the upgrader.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.1-to-7.2.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise-edition&quot;&gt;Enterprise Edition&lt;&#x2F;h1&gt;

&lt;p&gt;The mentioned EE only features and things like LDAP group support can be found in GitLab Enterprise Edition.
For a complete overview please have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab EE&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.
No time to upgrade GitLab yourself?
A subscription also entitles to our upgrade and installation services.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/07/22/gitlab-7-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/07/22/gitlab-7-dot-1-released/</id>
<published>2014-07-22T10:06:50+00:00</published>
<updated>2014-07-22T10:06:50+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
With this release we introduce Group Milestones. Group Milestones allow you to see a grouped list of milestones from all projects in a group. This makes working with multiple projects much easier.
Also new are @all mentions in comments and improved code highlighting.
In addition to the updates from Community Edition, GitLab Enterprise Edition received various bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;This release&#x27;s most valuable person (MVP) is Jeroen van Baarsen for his work as a merge marshal on the issue trackers, thanks Jeroen!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;group-milestones&quot;&gt;Group milestones&lt;&#x2F;h2&gt;

&lt;p&gt;This feature allows you to see all milestones in a group, grouped by title. This makes it much easier to release software when working with multiple projects.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_1&#x2F;group_milestone.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_1&#x2F;group_milestone.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The milestone page shows you all issues from all projects that have the same milestone name.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_1&#x2F;group_milestone_show.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_1&#x2F;group_milestone_show.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;show-version-file-in-sidebar&quot;&gt;Show VERSION file in sidebar&lt;&#x2F;h2&gt;

&lt;p&gt;If your repository has VERSION file - it will be rendered on the project sidebar. For instance, if you need to check the version of a library, this can save you some time.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_1&#x2F;version.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_1&#x2F;version.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-login-page&quot;&gt;New login page&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab Enterprise Edition we&#x27;ve previously changed the sign in page to implement customization.
In order to reduce the difference between CE and EE we&#x27;ve ported the new look to CE.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_1&#x2F;login.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_1&#x2F;login.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-discussions&quot;&gt;Improved discussions&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve put some effort into improving discussion.
Now, outdated comments will be hidden under the cut.
If you still want to see these, you can easily expand the outdated comments.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_1&#x2F;discussion.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_1&#x2F;discussion.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;contributors-api&quot;&gt;Contributors API&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to sponsoring by &lt;a href=&quot;https:&#x2F;&#x2F;mobbr.com&quot;&gt;Mobbr&lt;&#x2F;a&gt;, it is now possible to get all repository contributors with a single API call.
&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7-1-stable&#x2F;CHANGELOG#L18&quot;&gt;Changelog entry&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;fetch-ssh-keys-from-ldap-account-ee-only-feature&quot;&gt;Fetch SSH keys from LDAP account (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;It is possible to configure GitLab Enterprise Edition so that users have their SSH public keys synchronised with an attribute that contains their key in their LDAP object.
Existing SSH public keys that are manually managed in GitLab are not affected by this feature.
To enable LDAP SSH key synchronization you need to &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;ldap.html#synchronising-user-ssh-keys-with-ldap&quot;&gt;tell GitLab which LDAP attribute holds the SSH keys&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;synchronize-ldap-enabled-gitlab-administrators-with-an-ldap-group-ee-only-feature&quot;&gt;Synchronize LDAP-enabled GitLab administrators with an LDAP group (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;A group on the LDAP server can be given GitLab administrator access.
This ensures that the list of administrators in GitLab is always up to date.
The LDAP Common Name of the group that holds your administrators needs to be &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ee&#x2F;integration&#x2F;ldap.html#define-gitlab-admin-status-via-ldap&quot;&gt;configured on your GitLab server&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 7.0.0 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to &lt;strong&gt;&lt;em&gt;1.9.6&lt;&#x2F;em&gt;&lt;&#x2F;strong&gt; manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.0-to-7.1.md#4-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;7.0-to-7.1.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise&quot;&gt;Enterprise&lt;&#x2F;h1&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself?
GitLab B.V. also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.0.1 EE Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/07/18/gitlab-7-0-1-ee-patch-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/07/18/gitlab-7-0-1-ee-patch-release/</id>
<published>2014-07-18T00:00:00+00:00</published>
<updated>2014-07-18T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab Enterprise Edition 7.0.1 that fixes a bug in sharing a project with a group. The upcoming release of GitLab 7.1.0 on July 22 will also contain this fix.&lt;&#x2F;p&gt;

&lt;p&gt;We have also released new packages for Ubuntu 12.04, 14.04 and Debian. The Enterprise Linux package will follow. GitLab Enterprise Edition packages can be found in the subscribers repository.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 7.0 released with drag and drop images and performance improvements</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/06/22/gitlab-7-dot-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/06/22/gitlab-7-dot-0-released/</id>
<published>2014-06-22T13:18:54+00:00</published>
<updated>2014-06-22T13:18:54+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Community Edition (CE) and GitLab Enterprise Edition (EE), with new features, usability and performance improvements, and bug fixes.
The biggest new feature in Community Edition is the ability to drag and drop an image with automatic upload in every markdown-area.
Other changes include drag and drop between columns in milestones for issues and merge requests, use of identicons when user doesn&#x27;t have an avatar set and various performance and UI updates.
In addition to the updates from Community Edition, GitLab Enterprise Edition received various bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Persons (MVP) are Earle Randolph Bunao and Neil Francis Calabroso for implementing drag and drop upload of image in every markdown-area.
Thanks Earle Randolph Bunao and Neil Francis Calabroso!&lt;&#x2F;p&gt;



&lt;p&gt;GitLab has seen enormous progress since version 6.0 was released in August 2013.
Throughout the past ten months GitLab became more stable, simpler to install and easier to upgrade.
The most important factor in improving GitLab&#x27;s stability was the launch of the Enterprise Edition in 6.0.
Introducing a commercial product allowed us to finance the expansion of the GitLab B.V. team and focus on doing more testing and fixing.
The Omnibus packages made GitLab easier to install than ever before. What used to be a 10-page manual of copy-paste is now a simple OS package installation.
Both the Omnibus packages and the upgrader script for manual installations introduced in GitLab 6.4 made GitLab much easier to upgrade.
Of course, most of the improvements in GitLab came not from the highlights above, but from all other contributions totaling 3554 commits from hundreds of contributors!
This caused GitLab usage to grow by leaps and bounds during the 6.x time-frame. GitLab is now used in over 100.000 organizations, a fourfold increase from the 25.000 when 6.0 launched.
We would like to thank everyone that contributed for helping to make GitLab the most installed software to collaborate on code.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;attach-images-jpg-png-gif-by-dragging--dropping-or-selecting-them&quot;&gt;Attach images (JPG, PNG, GIF) by dragging &amp;amp; dropping or selecting them&lt;&#x2F;h2&gt;

&lt;p&gt;Now you can easily attach several images to issue description or comment using drag &amp;amp; drop feature.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_0&#x2F;upload.gif&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_0&#x2F;upload.gif&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;permissions-changes&quot;&gt;Permissions changes&lt;&#x2F;h2&gt;

&lt;p&gt;We indroduced some changes to permissions model:&lt;&#x2F;p&gt;

&lt;p&gt;Developers:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;can remove branch via UI and push&lt;&#x2F;li&gt;
  &lt;li&gt;can not remove or owerwrite git tags&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Masters:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;can not remove or force push to branch if it is protected&lt;&#x2F;li&gt;
  &lt;li&gt;can create projects in group (only if master is a group access level)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;drag--drop-issues-inside-milestone&quot;&gt;Drag &amp;amp; drop issues inside milestone&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to sponsoring by Codethink it is now possible to drag and drop issues and merge requests between the columns in milestones. This should make milestones even more user friendly and should make organizing milestones even easier. &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7be80fd89954a248527ca9be4bb9d9c320390811&#x2F;CHANGELOG#L28&quot;&gt;changelog entry&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;7_0&#x2F;milestone.gif&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;7_0&#x2F;milestone.gif&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;improved-performance&quot;&gt;Improved performance&lt;&#x2F;h2&gt;

&lt;p&gt;Application is much faster now.&lt;&#x2F;p&gt;

&lt;p&gt;We have improved the performance of projects that have a large number of members.&lt;&#x2F;p&gt;

&lt;p&gt;When browsing files of a project that has large amount of files and directories, commit messages would take a lot of time to load and could potentially fail to load.
With the improvements introduced in 7.0, commit messages are loaded only for visible part of the screen which increases the load speed dramatically.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;deprecations&quot;&gt;Deprecations&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 7.0 is dropping support for ruby 1.9.3. Starting with version 7.0 we recommend using latest ruby which is now supported, ruby 2.1.&lt;&#x2F;p&gt;

&lt;p&gt;We are also removing Wall from projects because we feel that the time needed for developing and keeping bug free is not justified if compared to the usefulness of the feature.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h2&gt;

&lt;p&gt;This release has many improvements, it includes more than 550 commits!
Please check out &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;7be80fd89954a248527ca9be4bb9d9c320390811&#x2F;CHANGELOG&quot;&gt;the Changelog&lt;&#x2F;a&gt; to see the 40 named changes.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;installation&quot;&gt;Installation&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation please see the &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;installing GitLab page&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;updating&quot;&gt;Updating&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrading to this major release from 6.x should be relatively easy since there are no major changes in the architecture of GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;You can&#x27;t use the upgrader, you&#x27;ll have to upgrade manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.9-to-7.0.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise&quot;&gt;Enterprise&lt;&#x2F;h1&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself?
GitLab B.V. also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Omnibus-gitlab security release: bundled Postgres trusts all local connections</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/06/19/omnibus-gitlab-postgres-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/06/19/omnibus-gitlab-postgres-security-release/</id>
<published>2014-06-19T00:00:00+00:00</published>
<updated>2014-06-19T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Due to a configuration error, the PostgreSQL server that is bundled into omnibus-gitlab trusts all connections originating from the server omnibus-gitlab is running on.
This has been rectified in omnibus-gitlab &lt;code&gt;6.9.2.omnibus.2&lt;&#x2F;code&gt; (GitLab Community Edition) and &lt;code&gt;6.9.4-ee.omnibus.1&lt;&#x2F;code&gt; (GitLab Enterprise Edition).
We advise all users of omnibus-gitlab to update to the latest release.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Affected versions:&lt;&#x2F;strong&gt; all versions of omnibus-gitlab up to and including omnibus-gitlab &lt;code&gt;6.9.2.omnibus.1&lt;&#x2F;code&gt; (GitLab Community Edition) and &lt;code&gt;6.9.4-ee.omnibus&lt;&#x2F;code&gt; (GitLab Enterprise Edition).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Not affected:&lt;&#x2F;strong&gt; Source and cookbook installations of GitLab (e.g. not using .deb or .rpm packages). Omnibus-gitlab installations which use an external DBMS are also not affected.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Fixed versions:&lt;&#x2F;strong&gt; omnibus-gitlab &lt;code&gt;6.9.2.omnibus.2&lt;&#x2F;code&gt; (GitLab Community Edition) and &lt;code&gt;6.9.4-ee.omnibus.1&lt;&#x2F;code&gt; (GitLab Enterprise Edition).&lt;&#x2F;p&gt;

&lt;h1 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h1&gt;
&lt;p&gt;You can download the latest version of &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;omnibus-gitlab for GitLab Community Edition&lt;&#x2F;a&gt; or &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;omnibus-gitlab for GitLab Enterprise Edition&lt;&#x2F;a&gt; and follow the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;update instructions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h1&gt;
&lt;p&gt;An attacker who can execute code on the server omnibus-gitlab runs on can get full superuser access to the bundled Postgres database which holds all GitLab metadata.&lt;&#x2F;p&gt;

&lt;p&gt;To see if your omnibus-gitlab installation is affected you can run the following command on your GitLab server.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo -u root &#x2F;opt&#x2F;gitlab&#x2F;embedded&#x2F;bin&#x2F;psql -U gitlab-psql -d template1 -c &#x27;\echo connected to an insecure Postgres instance&#x27;
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If the command echoes &lt;code&gt;connected to an insecure Postgres instance&lt;&#x2F;code&gt; your omnibus-gitlab installation is affected by this issue.
If you receive an error message &lt;code&gt;psql: FATAL:  Peer authentication failed for user &quot;gitlab-psql&quot;&lt;&#x2F;code&gt;, your bundled Postgres service is secured.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Omnibus-gitlab OpenSSL 1.0.1h security release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/06/06/omnibus-gitlab-openssl-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/06/06/omnibus-gitlab-openssl-security-release/</id>
<published>2014-06-06T00:00:00+00:00</published>
<updated>2014-06-06T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;The OpenSSL developers released a &lt;a href=&quot;https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;secadv_20140605.txt&quot;&gt;security
advisory&lt;&#x2F;a&gt; yesterday advising
all users of OpenSSL 1.0.1 to upgrade to version 1.0.1h in light of
vulnerabilities CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-0198,
CVE-2010-5298and CVE-2010-5298. This affects users of omnibus-gitlab because
omnibus-gitlab packages contain their own copy of OpenSSL 1.0.1. Today we are
releasing new omnibus packages for GitLab 6.9.2 CE and GitLab 6.9.3 EE which
contain OpenSSL 1.0.1h.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: omnibus-gitlab 6.9.2.omnibus and older, omnibus-gitlab
6.9.3-ee.omnibus and older.&lt;&#x2F;p&gt;

&lt;p&gt;Versions fixed: omnibus-gitlab 6.9.2.omnibus.1, omnibus-gitlab
6.9.3-ee.omnibus.1.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;checking-your-omnibus-gitlab-openssl-version&quot;&gt;Checking your omnibus-gitlab OpenSSL version&lt;&#x2F;h2&gt;

&lt;p&gt;You can check the version of OpenSSL in your omnibus-gitlab installation by
running the following command.&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;grep openssl &#x2F;opt&#x2F;gitlab&#x2F;version-manifest.txt
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If the OpenSSL version is 1.0.1g or lower you need to update omnibus-gitlab to
the latest version.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;downloads&quot;&gt;Downloads&lt;&#x2F;h2&gt;

&lt;p&gt;Updated omnibus-gitlab packages for &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;downloads&quot;&gt;GitLab Community
Edition&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;GitLab Enterprise
Edition&lt;&#x2F;a&gt;
are available for download.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 6.9.2 LDAP user filter fix and omnibus-gitlab SSH key fix</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/05/30/gitlab-6-9-2/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/05/30/gitlab-6-9-2/</id>
<published>2014-05-30T00:00:00+00:00</published>
<updated>2014-05-30T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab 6.9.2 and new Omnibus packages for GitLab EE 6.8.1 to
address issues with the management of SSH keys in Omnibus packages and the
LDAP user filter.&lt;&#x2F;p&gt;

&lt;p&gt;We advise all omnibus-gitlab users to upgrade to the latest package and rebuild
their &lt;code&gt;authorized_keys&lt;&#x2F;code&gt; file. Users of the LDAP user filter feature should
avoid GitLab 6.9.0 and GitLab 6.9.1, and use GitLab 6.9.2 instead.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;ssh-keys-in-omnibus-packages&quot;&gt;SSH keys in Omnibus packages&lt;&#x2F;h1&gt;

&lt;p&gt;In the Omnibus packages for GitLab EE 6.8, GitLab EE 6.9 and GitLab CE 6.9 the
management of SSH keys via gitlab-shell is broken. We advise all users to
update to the latest package and run the following additional command to
rebuild the &lt;code&gt;authorized_keys&lt;&#x2F;code&gt; file:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo gitlab-rake gitlab:shell:setup
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;This problem is specific to the omnibus packages; users who installed manually
or using the Chef cookbook are not affected by this issue.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;ldap-user-filter&quot;&gt;LDAP user filter&lt;&#x2F;h1&gt;

&lt;p&gt;In GitLab 6.9.0 and 6.9.1 (both CE and EE) the LDAP user filter feature is
broken. An LDAP user filter query that works in GitLab 6.8 and earlier will
prevent all LDAP users from signing in. This issue has been resolved in GitLab
CE 6.9.2 and GitLab EE 6.9.2.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 6.9 EE and CE released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/05/22/gitlab-6-9-ee-and-ce-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/05/22/gitlab-6-9-ee-and-ce-release/</id>
<published>2014-05-22T00:00:00+00:00</published>
<updated>2014-05-22T00:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;p&gt;GitLab is open source software to collaborate on code.
Today we announce the release of a new version of GitLab Enterprise Edition (EE) and GitLab Community Edition (CE), with new features, usability and performance improvements, and bug fixes.
The main new feature of CE release is a two step creation process for merge requests.
In addition to the updates from Community Edition, GitLab Enterprise Edition can now integrate Jenkins CI.&lt;&#x2F;p&gt;

&lt;p&gt;Other changes include improvements in how comments are loaded and markdown is previewed during editing. Additionally, several new API features have been added.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person is Evgeniy Sokovikov for contributing preview when editing a markdown file in the web editor.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks Evgeniy!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;two-step-merge-request-process&quot;&gt;Two step Merge Request process&lt;&#x2F;h2&gt;

&lt;p&gt;We have reworked Merge Request creation process to make the workflow more natural.&lt;&#x2F;p&gt;

&lt;p&gt;When creating a new merge request in GitLab 6.9, you are shown a comparison of the branches before actually creating the MR.
By comparing the branches before creating the MR, a &quot;nothing to merge&quot; situation is prevented. When there are differences between the two branches, MR title will be pre-filled with source branch name, you can enter a description of the MR and assign a user&#x2F;milestone before submitting the MR.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;mr1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;mr1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;mr2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;mr2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;markdown-preview-or-diff-when-using-web-editor&quot;&gt;Markdown preview or diff when using web editor&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to the contribution by Evgeniy Sokovikov, editing files via the web editor is now more convenient.&lt;&#x2F;p&gt;

&lt;p&gt;When editing a file you can now view the diff before committing the changes.
If the file is a markdown file, you can preview the changes before committing.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;edit1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;edit1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;edit2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;edit2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-labels&quot;&gt;Merge Request labels&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to contribution by Drew Blessing we can add labels to merge request.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;mr_labels.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;mr_labels.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;email-threading&quot;&gt;Email threading&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to contribution by Philip Blatter GitLab now supports email threading.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-api-features&quot;&gt;New API features&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to sponsoring by O&#x27;Reilly Media it is now possible to accept &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;6-9-stable&#x2F;CHANGELOG#L18&quot;&gt;Merge Requests through the API&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;You can read more about the GitLab API at &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;README.html&quot;&gt;doc.gitlab.com&#x2F;ce&#x2F;api&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;jenkins-ci-integration-ee-only-feature&quot;&gt;Jenkins CI integration (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab 6.9 EE can be configured to interact with Jenkins CI.&lt;&#x2F;p&gt;

&lt;p&gt;Jenkins builds can be triggered by pushes to a repository and the build status can be shown on merge requests.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;jenkins.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;jenkins.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;interacting-with-jira-ee-only-feature&quot;&gt;Interacting with Jira (EE only feature)&lt;&#x2F;h2&gt;

&lt;p&gt;Before GitLab 6.9, GitLab could be configured to use external issue trackers like Jira. This meant that Issues would link to Jira.&lt;&#x2F;p&gt;

&lt;p&gt;In GitLab 6.9 EE, GitLab goes one step further in integrating Jira by allowing tickets to be closed by commit messages and merge request mentions.&lt;&#x2F;p&gt;

&lt;p&gt;For example, commit message &quot;New feature. Fixes JIRA-123&quot; would create a comment in ticket JIRA-123 with a link to the commit and would close the ticket in Jira.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_9&#x2F;jira.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_9&#x2F;jira.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;install&quot;&gt;Install&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;6-9-stable&#x2F;README.md#installation&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update&quot;&gt;Update&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
You have to update GitLab Shell to 1.9.4 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.8-to-6.9.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.8-to-6.9.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise&quot;&gt;Enterprise&lt;&#x2F;h1&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 5.0.1 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/05/16/gitlab-ci-5-0-1-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/05/16/gitlab-ci-5-0-1-security-release/</id>
<published>2014-05-16T00:00:00+00:00</published>
<updated>2014-05-16T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab CI 5.0.1 because of the recent Rails security vulnerability &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2014&#x2F;5&#x2F;6&#x2F;Rails_3_2_18_4_0_5_and_4_1_1_have_been_released&#x2F;&quot;&gt;CVE-2014-0130&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend everyone to upgrade their GitLab CI installation to the latest version using our &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ci&#x2F;update&#x2F;patch_versions.html&quot;&gt;upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 6.8.2-CE &amp; 6.8.1-EE Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/05/12/gitlab-6-8-2-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/05/12/gitlab-6-8-2-security-release/</id>
<published>2014-05-12T00:00:00+00:00</published>
<updated>2014-05-12T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;We have released GitLab Community Edition 6.8.2 and GitLab Enterprise Edition 6.8.1 in light of the Rails security vulnerability &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2014&#x2F;5&#x2F;6&#x2F;Rails_3_2_18_4_0_5_and_4_1_1_have_been_released&#x2F;&quot;&gt;CVE-2014-0130&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend everyone to upgrade their GitLab installation to the latest version using our &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;update&#x2F;README.html&quot;&gt;upgrade guides&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;We have also released new packages for Ubuntu, Enterprise Linux and Debian. GitLab Enterprise Edition packages can be found in the subscribers repository. GitLab Community Edition packages are found &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;downloads&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 5.0 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/05/06/gitlab-ci-5-dot-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/05/06/gitlab-ci-5-dot-0-released/</id>
<published>2014-05-06T12:55:40+00:00</published>
<updated>2014-05-06T12:55:40+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know GitLab CI is a continuous integration server.
It integrates with your GitLab installation and runs tests for your projects.&lt;&#x2F;p&gt;

&lt;p&gt;Today we release a new version of GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5&#x2F;dash.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5&#x2F;dash.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h2 id=&quot;why-version-5&quot;&gt;Why version 5?&lt;&#x2F;h2&gt;

&lt;p&gt;You may know that GitLab CI contains 2 components: Coordinator (a web application) and Runner.
We are releasing a new version of GitLab CI because of important changes to GitLab CI Runner.&lt;&#x2F;p&gt;

&lt;p&gt;Runner is the component that runs your builds. In this release we have changed the way a build is served.
Before this release, each line in the build script was executed in a separate process. That meant that a command such as &lt;code&gt;cd&lt;&#x2F;code&gt; or an &lt;code&gt;ENV&lt;&#x2F;code&gt; variable was not available on the next line.&lt;&#x2F;p&gt;

&lt;p&gt;With this release, Runner will concatenate all lines in the build script into one file and execute that.
This means that if you change the working directory or environment in one line, it will affect the following lines as well.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5&#x2F;edit.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5&#x2F;edit.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The former releases had some other problems as well:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Aborting running tests from the gitlab-ci didn&#x27;t work (it marked the job as failed, but didn&#x27;t kill the build)&lt;&#x2F;li&gt;
  &lt;li&gt;The runner didn&#x27;t properly handle crashing build scripts (it considered the build seemed to continue running endlessly)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;With this release, Runner creates a single temporary bash script which contains all the commands the build needs. 
The script itself is then executed as a child process in its own session (process group) by the runner. 
This way we can ensure that killing the script also kills all its child processes.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;We would like to thank Corin Langosch for contributing these improvements.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;webhooks&quot;&gt;Webhooks&lt;&#x2F;h2&gt;

&lt;p&gt;In order to build some services based on GitLab CI you may need hooks that send data when the build finishes.
GitLab already has such hooks, but up until now, GitLab CI did not.
With GitLab CI version 5, we have added webhook functionality. We thank Võ Anh Duy for help with this feature.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5&#x2F;hooks.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5&#x2F;hooks.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;screenshots&quot;&gt;Screenshots&lt;&#x2F;h2&gt;

&lt;p&gt;We&#x27;ve also changed the colors a bit for a fresher look.
See screenshots below:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5&#x2F;project.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5&#x2F;project.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_5&#x2F;build.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_5&#x2F;build.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;update-process&quot;&gt;Update process&lt;&#x2F;h2&gt;

&lt;p&gt;If you already use GitLab CI you need to follow our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;4.3-to-5.0.md&quot;&gt;Update guide&lt;&#x2F;a&gt; for Coordinator and update all your Runners to version 5.
You can find the Runner update guide &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci-runner&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update-from-v4-to-v5.md&quot;&gt;here&lt;&#x2F;a&gt;. Also check the build scripts of your projects to make sure they are compatible with the new behavior.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-setup&quot;&gt;New setup&lt;&#x2F;h2&gt;

&lt;p&gt;You can set up new GitLab CI instance using &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;installation guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;support&quot;&gt;Support&lt;&#x2F;h2&gt;

&lt;p&gt;If you are looking for paid support for GitLab CI, please &lt;a href=&quot;&#x2F;sales&#x2F;&quot;&gt;contact sales&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.8 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/04/28/gitlab-ee-6-8-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/04/28/gitlab-ee-6-8-release/</id>
<published>2014-04-28T00:00:00+00:00</published>
<updated>2014-04-28T00:00:00+00:00</updated>
<author>
<name>Job van der Voort</name>
</author>
<content type='html'>&lt;p&gt;Today we&#x27;ve released &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;a&gt; 6.8.0. 
GitLab is an open source code hosting and project management application.
In addition to the &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;04&#x2F;22&#x2F;gitlab-6-dot-8-released&#x2F;&quot;&gt;improvements in GitLab Community Edition 6.8&lt;&#x2F;a&gt;, GitLab Enterprise Edition 6.8.0 contains the following improvements.&lt;&#x2F;p&gt;



&lt;h3 id=&quot;branded-login-page&quot;&gt;Branded Login Page&lt;&#x2F;h3&gt;

&lt;p&gt;You can now customize the sign in page with custom text and a logo of your choice.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_8&#x2F;branded_login.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_8&#x2F;branded_login.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ldap-email-synchronization&quot;&gt;LDAP email synchronization&lt;&#x2F;h3&gt;

&lt;p&gt;Now, the email of LDAP users gets updated automatically on login.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;and-much-more&quot;&gt;And much more!&lt;&#x2F;h3&gt;

&lt;p&gt;This release contains more than 600 commits, including many fixes and performance improvements.&lt;&#x2F;p&gt;

&lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.8 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/04/22/gitlab-6-dot-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/04/22/gitlab-6-dot-8-released/</id>
<published>2014-04-22T09:04:04+00:00</published>
<updated>2014-04-22T09:04:04+00:00</updated>
<author>
<name>Marin Jankovski, Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Gitlab is open source software made for collaborative coding.
Today we announce the release of a new version of GitLab Community Edition (CE), with new features, usability and performance improvements, and bug fixes.
The main new feature of this release is protection against force pushes.
Other changes include improvements to mentioning in comments, Merge Request UI improvements and new API features.&lt;&#x2F;p&gt;

&lt;p&gt;This month&#x27;s Most Valuable Person is Jeroen van Baarsen for contributing many small fixes and helping people on the issue trackers.
Thanks Jeroen!&lt;&#x2F;p&gt;



&lt;h2 id=&quot;force-push-protection&quot;&gt;Force push protection&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab 6.8 we are changing the behavior of protected branches: force pushes to protected branches will be blocked.
This allows users to protect against history rewriting on their protected branches (e.g. &lt;code&gt;master&lt;&#x2F;code&gt;) while preserving developer flexibility in unprotected feature branches.
If you really need to force-push to a protected branch you can temporarily &#x27;unprotect&#x27; the branch.
Steven Thonus helped implement this feature.&lt;&#x2F;p&gt;

&lt;p&gt;Note: you need gitlab-shell 1.9.3 or newer to enable force push protection.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;commenting&quot;&gt;Commenting&lt;&#x2F;h2&gt;

&lt;p&gt;In GitLab comments, issues, merge requests and commit messages you can reference GitLab users using the &lt;code&gt;@username&lt;&#x2F;code&gt; notation, sending them a notification.
This is called &#x27;mentioning a user&#x27;.
Besides notifications, mentioning is also used to address individuals in a larger conversation.
Before GitLab 6.8, you could only mention project members.
In GitLab 6.8, you can also mention issue &lt;em&gt;participants&lt;&#x2F;em&gt; who are not necessarily project members.&lt;&#x2F;p&gt;

&lt;p&gt;In addition to extending the reach of mentions, we have also improved the readability of comments; see the screenshot below.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_8&#x2F;comment_layout.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_8&#x2F;comment_layout.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;merge-request-ui&quot;&gt;Merge Request UI&lt;&#x2F;h2&gt;

&lt;p&gt;We have restyled the widget that contains the build status and &#x27;Accept merge request&#x27; controls.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_8&#x2F;mr_widget.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_8&#x2F;mr_widget.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In addition, it is now also possible to remove a source branch after the merge if you forgot to check the &#x27;Remove source-branch&#x27; checkbox.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_8&#x2F;remove_source_branch.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_8&#x2F;remove_source_branch.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;new-api-features&quot;&gt;New API features&lt;&#x2F;h2&gt;

&lt;p&gt;Thanks to sponsoring by O&#x27;Reilly Media it is now possible to create Git branches through the API.&lt;&#x2F;p&gt;

&lt;p&gt;In addition you can also get more detailed information about merge requests and comments.
You can read more about the GitLab API at &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;api&#x2F;README.html&quot;&gt;doc.gitlab.com&#x2F;ce&#x2F;api&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;oauth-sign-in-flow&quot;&gt;OAuth sign-in flow&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab can be integrated with external authentication providers such as Twitter or Google through OAuth.
When a user signs into GitLab through OAuth for the first time, a GitLab user is created for them based on the OAuth user attributes.
In GitLab 6.8 we no longer assume that all OAuth providers supply an email attribute for the new GitLab user.
Instead, new OAuth users must now enter and confirm an email address after signing into GitLab for the first time.
This change does not apply to GitLab LDAP integration.&lt;&#x2F;p&gt;

&lt;p&gt;Also see the &lt;a href=&quot;http:&#x2F;&#x2F;doc.gitlab.com&#x2F;ce&#x2F;integration&#x2F;omniauth.html&quot;&gt;new OAuth documentation page&lt;&#x2F;a&gt; compiled by Drew Blessing.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;gzipped-assets&quot;&gt;GZipped assets&lt;&#x2F;h2&gt;

&lt;p&gt;Previously, GitLab was not equipped to serve assets with compression.
This increased the load time since the browser had to download all assets.
We&#x27;ve added the option to the example Nginx config to serve the pre-gzipped version of the assets.
Nginx has this module enabled by default in Ubuntu but if you are using the compiled version of Nginx, make sure that you have compiled it with &lt;code&gt;--with-http_gzip_static_module&lt;&#x2F;code&gt; flag.
More information on GZip compression &lt;a href=&quot;http:&#x2F;&#x2F;guides.rubyonrails.org&#x2F;asset_pipeline.html#gzip-compression&quot;&gt;can be found here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;To enable Nginx asset compression you need to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.7-to-6.8.md#5-update-config-files&quot;&gt;edit your configuration files&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;many-many-other-improvements&quot;&gt;Many, many other improvements&lt;&#x2F;h2&gt;

&lt;p&gt;There are over 500 commits in this release, including many small fixes and performance improvements.
Please see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;6-8-stable&#x2F;CHANGELOG&quot;&gt;CHANGELOG&lt;&#x2F;a&gt; for more information.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;install&quot;&gt;Install&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;README.md#installation&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update&quot;&gt;Update&lt;&#x2F;h1&gt;

&lt;p&gt;Upgrade instructions for omnibus-gitlab packages can be found in &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you installed GitLab from source and you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
But you have to update GitLab Shell to 1.9.3 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.7-to-6.8.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.7-to-6.8.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise&quot;&gt;Enterprise&lt;&#x2F;h1&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security Release of omnibus-gitlab due to CVE-2014-0160 (&#x27;Heartbleed&#x27;)</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/04/08/omnibus-packages-patched-against-cve-2014-0160/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/04/08/omnibus-packages-patched-against-cve-2014-0160/</id>
<published>2014-04-08T00:00:00+00:00</published>
<updated>2014-04-08T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Yesterday OpenSSL 1.0.1g was released to address the &lt;a href=&quot;http:&#x2F;&#x2F;heartbleed.com&#x2F;&quot;&gt;&#x27;Heartbleed&#x27; security vulnerability (CVE-2014-0160)&lt;&#x2F;a&gt;.
We have just released new omnibus-gitlab packages that update the version OpenSSL embedded in the package to version 1.0.1g.
We advise all users of omnibus-gitlab to upgrade immediately.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;versions-affected&quot;&gt;Versions affected&lt;&#x2F;h3&gt;

&lt;p&gt;Affected versions: all omnibus-gitlab packages prior to 6.7.3.omnibus.3 or 6.7.2-ee.omnibus.2.&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 6.7.3.omnibus.3 (CE) and 6.7.2-ee.omnibus.2 (EE).&lt;&#x2F;p&gt;

&lt;p&gt;You can check you omnibus-gitlab version by running &lt;code&gt;dpkg-query -W gitlab&lt;&#x2F;code&gt; (Ubuntu) or &lt;code&gt;rpm -q gitlab&lt;&#x2F;code&gt; (CentOS).&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;

&lt;p&gt;OpenSSL is used in the existing packages for omnibus-gitlab to make outgoing connections to remote hosts for e.g. HTTPS resources.
Because omnibus-gitlab uses its own embedded copy of OpenSSL, it is required to update omnibus-gitlab in addition to updating your OS&#x27;s copy of OpenSSL.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h3&gt;

&lt;p&gt;Omnibus-gitlab 6.7.3.omnibus.3 (CE) is available at &lt;a href=&quot;&#x2F;install&#x2F;&quot;&gt;the download page&lt;&#x2F;a&gt;.
Omnibus-gitlab 6.7.2-ee.omnibus.2 is available &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;install&#x2F;packages.md&quot;&gt;for subscribers only&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Upgrade instructions can be found &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;omnibus-gitlab&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update.md&quot;&gt;in the omnibus-gitlab repository&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security Advisory for GitLab related to CVE-2014-2525</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/04/07/security-advisory-for-gitlab-related-to-cve-2014-2525/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/04/07/security-advisory-for-gitlab-related-to-cve-2014-2525/</id>
<published>2014-04-07T11:58:46+00:00</published>
<updated>2014-04-07T11:58:46+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;h1 id=&quot;security-advisory-for-gitlab-related-to-cve-2014-2525&quot;&gt;Security Advisory for GitLab related to CVE-2014-2525&lt;&#x2F;h1&gt;

&lt;p&gt;A recently discovered &lt;a href=&quot;https:&#x2F;&#x2F;www.ruby-lang.org&#x2F;en&#x2F;news&#x2F;2014&#x2F;03&#x2F;29&#x2F;heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525&quot;&gt;vulnerability in ruby&lt;&#x2F;a&gt; allows a specially crafted string to cause a heap overflow which can lead to arbitrary code execution.&lt;&#x2F;p&gt;

&lt;p&gt;We are not aware of this issue affecting GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We recommend keeping your system packages up-to-date.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;version-affected&quot;&gt;Version affected&lt;&#x2F;h3&gt;

&lt;p&gt;All versions of GitLab using ruby 1.9.3-p0 and newer.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;

&lt;p&gt;Because both GitLab and some of its dependencies use libyaml, it is theoretically possible that an attacker can use CVE-2014-2525 to remotely execute code on a server running GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;We are currently not aware of any real-world exploits against GitLab which take advantage of CVE-2014-2525.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;

&lt;p&gt;By keeping libyaml package up to date on your OS this vulnerability is resolved.&lt;&#x2F;p&gt;

&lt;p&gt;For example, on Ubuntu 12.04 run the following commands:&lt;&#x2F;p&gt;

&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight plaintext&quot;&gt;&lt;code&gt;sudo apt-get update
sudo apt-get upgrade
sudo service gitlab reload
&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;&#x2F;div&gt;
&lt;p&gt;If your OS didn&#x27;t release a package update you can compile &lt;a href=&quot;http:&#x2F;&#x2F;pyyaml.org&#x2F;download&#x2F;libyaml&#x2F;yaml-0.1.6.tar.gz&quot;&gt;libyaml 0.1.6&lt;&#x2F;a&gt; from source and then recompile ruby with path to new libyaml: &lt;code&gt;$ .&#x2F;configure --with-yaml-dir=&#x2F;path&#x2F;to&#x2F;libyaml&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For more information see &lt;a href=&quot;https:&#x2F;&#x2F;www.ruby-lang.org&#x2F;en&#x2F;news&#x2F;2014&#x2F;03&#x2F;29&#x2F;heap-overflow-in-yaml-uri-escape-parsing-cve-2014-2525&quot;&gt;ruby security announcement&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.7 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/03/26/gitlab-ee-6-7-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/03/26/gitlab-ee-6-7-release/</id>
<published>2014-03-26T00:00:00+00:00</published>
<updated>2014-03-26T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we announce the release of &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab Enterprise Edition&lt;&#x2F;a&gt; 6.7.0.
GitLab is an open source code hosting and project management application.
In addition to the &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;03&#x2F;21&#x2F;gitlab-6-dot-7-released&#x2F;&quot;&gt;improvements in GitLab Community Edition 6.7&lt;&#x2F;a&gt;, GitLab Enterprise Edition 6.7.0 contains the following improvements.&lt;&#x2F;p&gt;



&lt;h3 id=&quot;git-hooks&quot;&gt;Git hooks&lt;&#x2F;h3&gt;
&lt;p&gt;GitLab EE now lets you define project rules that can block commits from being pushed.
In GitLab EE 6.7 we have added the following rules:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Disallow tag removal via git push (&lt;code&gt;git push origin :mytag&lt;&#x2F;code&gt;)&lt;&#x2F;li&gt;
  &lt;li&gt;Validate commit messages with regular expressions&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_7_ee&#x2F;git_hooks.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_7_ee&#x2F;git_hooks.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Please &lt;a href=&quot;&#x2F;company&#x2F;contact&#x2F;&quot;&gt;contact us&lt;&#x2F;a&gt; if you have a need for different hooks.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ldap-improvements&quot;&gt;LDAP Improvements&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Add support for Active Directory nested LDAP groups:
GitLab&#x27;s LDAP group synchronization now also detects nested members of Active Directory groups.&lt;&#x2F;li&gt;
  &lt;li&gt;Improve LDAP sign-in speed by reusing connections to the LDAP server&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;bug-fixes&quot;&gt;Bug fixes&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Fix the save button in the admin group edit screen&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.7 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update (28 March 2014):&lt;&#x2F;em&gt; We have released GitLab Enterprise Edition 6.7.1 which fixes a bug for some LDAP platforms.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.7 released!</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/03/21/gitlab-6-dot-7-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/03/21/gitlab-6-dot-7-released/</id>
<published>2014-03-21T00:00:00+00:00</published>
<updated>2014-03-21T00:00:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_7&#x2F;public_group_pages.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_7&#x2F;public_group_pages.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Gitlab is open source software made for collaborative coding.
Today we announce the release of a new version of GitLab Community Edition (CE), with new features, usability improvements and bug fixes.
The most notable new feature is the addition of public group profiles (see screenshot above).&lt;&#x2F;p&gt;

&lt;p&gt;This release&#x27;s most valuable person (MVP) is Jason Hollingsworth for contributing the public group profile feature.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;markdown-wiki-links-and-emoji&quot;&gt;Markdown, wiki links and emoji&lt;&#x2F;h2&gt;

&lt;p&gt;GitLab now renders newlines in Markdown text according to the specification, as &lt;a href=&quot;&#x2F;blog&#x2F;2014&#x2F;02&#x2F;21&#x2F;markdown-newline-behaviour&#x2F;&quot;&gt;previously discussed&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Relative links inside wiki pages stay inside the wiki, instead of pointing back to the accompanying repository.&lt;&#x2F;p&gt;

&lt;p&gt;Due to &lt;a href=&quot;http:&#x2F;&#x2F;words.steveklabnik.com&#x2F;emoji-licensing&quot;&gt;licensing reasons&lt;&#x2F;a&gt;, GitLab 6.7 uses a new set of emoji based on the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;steveklabnik&#x2F;emoji&quot;&gt;emoji gem&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;Genshin&#x2F;PhantomOpenEmoji&quot;&gt;PhantomOpenEmoji&lt;&#x2F;a&gt;.
We thank Rei from &lt;a href=&quot;https:&#x2F;&#x2F;www.emojidex.com&#x2F;&quot;&gt;Emojidex&lt;&#x2F;a&gt; for creating freely licensed emoji&#x27;s for GitLab.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;repository-imports&quot;&gt;Repository imports&lt;&#x2F;h2&gt;

&lt;p&gt;In previous versions, a Git repository import could get stuck leaving the user no option but removing the repository from GitLab and recreating it.
In GitLab 6.7, we have added an import timeout so that your import will not get stuck, and we have added a &#x27;Retry&#x27; button in case the import failed due a transient condition.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;technical-changes&quot;&gt;Technical changes&lt;&#x2F;h2&gt;

&lt;p&gt;Due to a rewrite of our Git access authorization system, Git over HTTP now requires that your GitLab server has at least 2 Unicorn workers (which is the default value).
This means that small GitLab instances with only one Unicorn worker will only support SSH Git access going forward.&lt;&#x2F;p&gt;

&lt;p&gt;We advise users are running into the maximum HTTP push size of Nginx to &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;commit&#x2F;6bf5215b2378fdb9cb442a053ddd12570c69d00c&quot;&gt;update their configuration&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For a full list of changes see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CHANGELOG&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;contributing-guide-link-on-the-new-issue-page&quot;&gt;Contributing guide link on the &#x27;New Issue&#x27; page&lt;&#x2F;h1&gt;

&lt;p&gt;When a user creates a new issue in a repository containing a &#x27;CONTRIBUTING&#x27; file, GitLab reminds them to read the contributing guide.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_7&#x2F;contributing_guide.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_7&#x2F;contributing_guide.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h1 id=&quot;merge-request-diff-view-improvements&quot;&gt;Merge Request diff view improvements&lt;&#x2F;h1&gt;

&lt;p&gt;It is now possible to add commits to a branch in a Merge Request using the web editor: just click &#x27;Edit&#x27; in the Merge Request diff view.
In addition, you can now choose to hide diff comments.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_7&#x2F;diff_features.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_7&#x2F;diff_features.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h1 id=&quot;new-integrations-gemnasium-and-slack&quot;&gt;New integrations: Gemnasium and Slack&lt;&#x2F;h1&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_7&#x2F;gemnasium_slack.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_7&#x2F;gemnasium_slack.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;install&quot;&gt;Install&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;README.md#installation&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update&quot;&gt;Update&lt;&#x2F;h1&gt;

&lt;p&gt;If you have version 6.4.2 or higher you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.
But you have to update GitLab Shell to 1.9.1 manually, see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.6-to-6.7.md#3-update-gitlab-shell-and-its-config&quot;&gt;point 3 of the upgrade guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.6-to-6.7.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise&quot;&gt;Enterprise&lt;&#x2F;h1&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 4.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/03/06/gitlab-ci-4-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/03/06/gitlab-ci-4-dot-3-released/</id>
<published>2014-03-06T09:32:53+00:00</published>
<updated>2014-03-06T09:32:53+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know GitLab CI is a continuous integration server.
It integrates with your GitLab installation and runs tests for your projects.&lt;&#x2F;p&gt;

&lt;p&gt;Today we release a new version of GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;The main purpose of this release is to improve the UI&#x2F;UX of the application.
It also includes the latest Rails version with security updates.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;dash.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;dash.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h2 id=&quot;improvements&quot;&gt;Improvements&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;the-build-page-is-improved&quot;&gt;The build page is improved&lt;&#x2F;h3&gt;

&lt;p&gt;The page is not going into a redirect loop any more, so content is now updated properly.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;build.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;build.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-settings-page&quot;&gt;Project settings page&lt;&#x2F;h3&gt;

&lt;p&gt;We restyled the project settings page to make it look much cleaner.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;edit.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;edit.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;edit2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;edit2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;runner-page&quot;&gt;Runner page&lt;&#x2F;h3&gt;

&lt;p&gt;The runner page UI was improved to be more user friendly.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;runner.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_3&#x2F;runner.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;GitLab CI 4.3 requires &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;21&#x2F;gitlab-ce-6-dot-3-released&#x2F;&quot;&gt;GitLab 6.3&lt;&#x2F;a&gt; or higher&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;setup-and-update-links&quot;&gt;Setup and update links:&lt;&#x2F;h1&gt;

&lt;h3 id=&quot;update-from-gitlab-ci-42&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;4.2-to-4.3.md&quot;&gt;Update from GitLab CI 4.2&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;fresh-installation&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;4-3-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Fresh installation&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.6.2 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/02/27/gitlab-ee-6-6-2-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/02/27/gitlab-ee-6-6-2-security-release/</id>
<published>2014-02-27T00:00:00+00:00</published>
<updated>2014-02-27T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released GitLab Enterprise Edition 6.6.2, which fixes an HTML injection vulnerability present in GitLab EE 6.6.0 and 6.6.1.
We advise all users who install GitLab Enterprise Edition 6.6 to  &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;update to 6.6.2-ee immediately&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab Enterprise Edition versions 6.5 and lower are not affected by this HTML injection vulnerability.
Please contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;if you have any questions.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.6 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/02/25/gitlab-ee-6-6-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/02/25/gitlab-ee-6-6-release/</id>
<published>2014-02-25T00:00:00+00:00</published>
<updated>2014-02-25T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we announce the release of GitLab Enterprise Edition 6.6.0. 
GitLab is an open source code hosting and project management application.
In addition to the &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;02&#x2F;21&#x2F;gitlab-6-dot-6-released&#x2F;&quot;&gt;improvements in GitLab Community Edition 6.6&lt;&#x2F;a&gt;, GitLab Enterprise Edition 6.6.0 contains the following improvements:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Feature: permission reset button for LDAP groups.
For example, if you accidentally gave your entire organization Master access in a GitLab Group, you can now correct that by changing the default access level for the group and pressing the &#x27;Reset access&#x27; button.&lt;&#x2F;li&gt;
  &lt;li&gt;Improvement: better handling of having a very large number of users with access to a single project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Note that GitLab Enterprise Edition 6.6 is the first release under our &lt;a href=&quot;&#x2F;blog&#x2F;2014&#x2F;02&#x2F;11&#x2F;gitlab-ee-license-change&#x2F;&quot;&gt;new license&lt;&#x2F;a&gt;.
Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.6 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Updated 27 February 2014: Refer to the license change.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/02/21/gitlab-6-dot-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/02/21/gitlab-6-dot-6-released/</id>
<published>2014-02-21T11:47:00+00:00</published>
<updated>2014-02-21T11:47:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ce-66-released&quot;&gt;GitLab CE 6.6 released!&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_6&#x2F;dash.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_6&#x2F;dash.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know, Gitlab is open source software made for collaborative coding.
Today we released a new version of GitLab Community Edition (CE), with new features and bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;The MVP of this release is Drew Blessing for his contribution &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;pull&#x2F;6159&quot;&gt;&quot;Mobile UI improvement&quot;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In this release we updated Rails to 4.0.3, which solves some security issues.
For more information see &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2014&#x2F;2&#x2F;18&#x2F;Rails_3_2_17_4_0_3_and_4_1_0_beta2_have_been_released&#x2F;&quot;&gt;rails blog post&lt;&#x2F;a&gt;.
We advise everyone to upgrade.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h2&gt;

&lt;ul&gt;
  &lt;li&gt;Improved performance for large groups (with 100+ members)&lt;&#x2F;li&gt;
  &lt;li&gt;Developers can manage the issue tracker (modify and reassign any issue)&lt;&#x2F;li&gt;
  &lt;li&gt;Links to markdown headers&lt;&#x2F;li&gt;
  &lt;li&gt;Large diffs are handled better&lt;&#x2F;li&gt;
  &lt;li&gt;The user page of a user is now publicly visible if the person is a member of a public project.&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to filter by multiple labels for Issues page&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;For a full list of changes see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CHANGELOG&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;group-avatars&quot;&gt;Group avatars&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_6&#x2F;group.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_6&#x2F;group.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;issue-redesign&quot;&gt;Issue redesign&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_6&#x2F;issue.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_6&#x2F;issue.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;notification-settings-redesign&quot;&gt;Notification settings redesign&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_6&#x2F;notify.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_6&#x2F;notify.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;file-view-highlightjs-and-last-commit-for-file&quot;&gt;File view: Highlight.js and last commit for file&lt;&#x2F;h2&gt;

&lt;p&gt;We moved the file syntax highlighting from the server side to the client side, thanks to this awesome library. http:&#x2F;&#x2F;highlightjs.org&#x2F;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_6&#x2F;last_commit.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_6&#x2F;last_commit.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;nice-violet-theme&quot;&gt;Nice violet theme&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_6&#x2F;violet.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_6&#x2F;violet.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;install&quot;&gt;Install&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;README.md#toc_6&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;update&quot;&gt;Update&lt;&#x2F;h1&gt;

&lt;p&gt;If you have version 6.4.2 or 6.5 you can use the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you still want to do it manually - see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.5-to-6.6.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;enterprise&quot;&gt;Enterprise&lt;&#x2F;h1&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security vulnerability in gitlab (CVE-2013-7316)</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/01/30/xss-vulnerability-in-gitlab/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/01/30/xss-vulnerability-in-gitlab/</id>
<published>2014-01-30T19:00:00+00:00</published>
<updated>2014-01-30T19:00:00+00:00</updated>
<author>
<name>Marin Jankovski</name>
</author>
<content type='html'>&lt;h3 id=&quot;security-vulnerability-in-gitlab-cve-2013-7316&quot;&gt;Security vulnerability in GitLab (CVE-2013-7316)&lt;&#x2F;h3&gt;

&lt;p&gt;We have learned about a XSS vulnerability in GitLab. This issue was fixed in GitLab 6.5.&lt;&#x2F;p&gt;



&lt;h1 id=&quot;cross-site-scripting-xss-vulnerability-in-gitlab&quot;&gt;Cross-site scripting (XSS) vulnerability in GitLab&lt;&#x2F;h1&gt;

&lt;p&gt;A cross-site scripting (XSS) vulnerability in GitLab allows remote attackers to inject arbitrary web script or HTML via a crafted HTML file.
This vulnerability has been assigned the CVE identifier CVE-2013-7316.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 6.4 and earlier&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: Community Edition 6.5.0, Enterprise Edition 6.5.0&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;In affected versions, when adding a README with voluntary extension the file would be rendered with markup. This would allow an attacker to add a script that would be executed on the client side.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was fixed in GitLab 6.5. All users running GitLab 6.4 and earlier versions should upgrade immediately.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h3&gt;
&lt;p&gt;Gitlab 6.5 Community Edition is available from https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce and https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq .
GitLab 6.5 Enterprise Edition is available for subscribers from GitLab Cloud.
Please follow the upgrade guides from your current version to version 6.5.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;credits&quot;&gt;Credits&lt;&#x2F;h3&gt;
&lt;p&gt;Thanks to ChenQin, Network and Information Security Lab @ Tsinghua University for reporting the vulnerability.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 4.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/01/30/gitlab-ci-4-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/01/30/gitlab-ci-4-dot-2-released/</id>
<published>2014-01-30T13:22:00+00:00</published>
<updated>2014-01-30T13:22:00+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ci-version-42-released&quot;&gt;GitLab CI version 4.2 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know GitLab CI is a continuous integration server.
It integrates with your GitLab installation and runs tests for your projects.&lt;&#x2F;p&gt;

&lt;p&gt;Today we release a new version of GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;build.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;build.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h2 id=&quot;improvements&quot;&gt;Improvements&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;responsive-ui&quot;&gt;Responsive UI&lt;&#x2F;h3&gt;

&lt;p&gt;We have upgraded our front-end code to use Twitter Bootstrap 3.
Thanks to this upgrade we now support devices with resolutions of 768x1024 and higher.&lt;&#x2F;p&gt;

&lt;p&gt;Below you can see the result in a desktop screenshot and an iPad screenshot.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;dash.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;dash.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;ipad.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;ipad.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;build-duration-chart&quot;&gt;Build duration chart&lt;&#x2F;h3&gt;

&lt;p&gt;You can now see the build duration of the last 30 builds in one handy chart.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;chart.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_2&#x2F;chart.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;turbolinks&quot;&gt;Turbolinks&lt;&#x2F;h3&gt;

&lt;p&gt;We have added turbolinks support to GitLab CI.
Turbolinks makes following links in your web application faster.
Instead of letting the browser recompile the JavaScript and CSS between each page change, it keeps the current page instance alive and replaces only the body and the title in the head.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;GitLab CI 4.2 requires &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;21&#x2F;gitlab-ce-6-dot-3-released&#x2F;&quot;&gt;GitLab 6.3&lt;&#x2F;a&gt; or higher&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;setup-and-update-links&quot;&gt;Setup and update links:&lt;&#x2F;h1&gt;

&lt;h3 id=&quot;update-from-gitlab-ci-41&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;4.1-to-4.2.md&quot;&gt;Update from GitLab CI 4.1&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;fresh-installation&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ci&#x2F;blob&#x2F;4-2-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Fresh installation&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.5 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/01/28/gitlab-ee-6-5-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/01/28/gitlab-ee-6-5-release/</id>
<published>2014-01-28T00:00:00+00:00</published>
<updated>2014-01-28T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we announce the release of GitLab Enterprise Edition 6.5. 
GitLab is an open source code hosting and project management application.
This release combines all the &lt;a href=&quot;&#x2F;releases&#x2F;2014&#x2F;01&#x2F;21&#x2F;gitlab-ce-6-dot-5-released&#x2F;&quot;&gt;improvements in GitLab Community Edition 6.5&lt;&#x2F;a&gt; with the &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;advanced LDAP and project sharing features of GitLab Enterprise Edition&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.5 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.5 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/01/21/gitlab-ce-6-dot-5-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/01/21/gitlab-ce-6-dot-5-released/</id>
<published>2014-01-21T13:11:00+00:00</published>
<updated>2014-01-21T13:11:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ce-65-released&quot;&gt;GitLab CE 6.5 released!&lt;&#x2F;h3&gt;

&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know GitLab is open source software to collaborate on code.
Today we released a new version of GitLab Community Edition (CE), with new features and bug fixes.&lt;&#x2F;p&gt;

&lt;p&gt;The main change of this release is the upgrade to the &lt;a href=&quot;http:&#x2F;&#x2F;getbootstrap.com&#x2F;&quot;&gt;Twitter Bootstrap 3&lt;&#x2F;a&gt; front-end framework, up from version 2.
This makes the GitLab UI more responsive and it also gives a fresh look for some of the UI controls.&lt;&#x2F;p&gt;

&lt;p&gt;We also improved the comments system: new comments are loaded with AJAX and we have fixed the comment anchor bug.
Jason Blanchard brought us the ability to change the issue assignee and milestone directly from issue page.
He is the MVP of this month.&lt;&#x2F;p&gt;

&lt;p&gt;This release fixes a security issue with Server generated Javascript Responses (&lt;a href=&quot;http:&#x2F;&#x2F;37signals.com&#x2F;svn&#x2F;posts&#x2F;3697-server-generated-javascript-responses&quot;&gt;SJR&lt;&#x2F;a&gt;). We advise everyone to upgrade.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;new-features&quot;&gt;New features:&lt;&#x2F;h2&gt;

&lt;h3 id=&quot;customize-merge-commit-message&quot;&gt;Customize merge commit message&lt;&#x2F;h3&gt;

&lt;p&gt;When you accept a Merge Request in GitLab 6.5 the title and description of the MR will automatically be included in the merge commit.
You can also edit the merge commit if you like.
This feature was sponsored by &lt;a href=&quot;http:&#x2F;&#x2F;www.saymedia.com&#x2F;&quot;&gt;Say Media&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;WARNING:&lt;&#x2F;em&gt; Be careful not to include text that should stay outside your Git commit history in the title or description of a Merge Request.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;merge.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;merge.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;responsive-ui&quot;&gt;Responsive UI&lt;&#x2F;h3&gt;

&lt;p&gt;With Bootstrap 3 we support devices with resolution 768x1024 and higher.&lt;&#x2F;p&gt;

&lt;p&gt;Below are a few screenshots of GitLab 6.5 taken with an iPad 2.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;portrait&quot;&gt;Portrait&lt;&#x2F;h4&gt;
&lt;div class=&quot;inline-images&quot;&gt;
&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad1.png&quot; alt=&quot;screenshot&quot; title=&quot;&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad3.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad3.png&quot; alt=&quot;screenshot&quot; title=&quot;&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;&#x2F;div&gt;

&lt;h4 id=&quot;landscape&quot;&gt;Landscape&lt;&#x2F;h4&gt;
&lt;div class=&quot;inline-images&quot;&gt;
&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad2.png&quot; alt=&quot;screenshot&quot; title=&quot;&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad4.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;ipad4.png&quot; alt=&quot;screenshot&quot; title=&quot;&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;&#x2F;div&gt;

&lt;h3 id=&quot;change-the-assignee-directly-from-the-issue-page&quot;&gt;Change the assignee directly from the issue page&lt;&#x2F;h3&gt;

&lt;p&gt;Dropdown menus on the issue show page for the assignee and milestone allow users to update these fields directly without having to go to the &#x27;Edit Issue&#x27; screen first.
Thank you Jason Blanchard!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;issue.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;issue.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;new-repository-download-formats-tarbz2-zip-tar&quot;&gt;New repository download formats: tar.bz2, zip, tar&lt;&#x2F;h3&gt;

&lt;p&gt;Now you can download repositories in the format you prefer.
Thank you Jason Hollingsworth!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;download.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;download.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;new-filters-assignedauthoredall-for-dashboardissues-and-dashboardmerge_requests&quot;&gt;New filters (assigned&#x2F;authored&#x2F;all) for Dashboard#issues and Dashboard#merge_requests&lt;&#x2F;h3&gt;

&lt;p&gt;We have added new filters to the user&#x27;s Dashboard Issue and Merge Request index.
This feature was sponsored by &lt;a href=&quot;http:&#x2F;&#x2F;www.saymedia.com&#x2F;&quot;&gt;Say Media&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_5&#x2F;filters.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_5&#x2F;filters.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;create-binary-files-via-the-gitlab-api&quot;&gt;Create binary files via the GitLab API&lt;&#x2F;h3&gt;
&lt;p&gt;It is now possible to select Base64 as the encoding when &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;api&#x2F;repositories.md#toc_12&quot;&gt;creating a file through the GitLab API&lt;&#x2F;a&gt;.
This feature was sponsored by &lt;a href=&quot;http:&#x2F;&#x2F;www.oreilly.com&#x2F;&quot;&gt;O&#x27;Reilly Media&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;links&quot;&gt;Links&lt;&#x2F;h1&gt;

&lt;p&gt;For a full list of changes see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;CHANGELOG&quot;&gt;CHANGELOG&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;README.md#toc_6&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For update instructions see the &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;6.4-to-6.5.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;. If you have GitLab 6.4.2 you can try our &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;upgrader.md&quot;&gt;upgrade script&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.
No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.4 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2014/01/06/gitlab-ee-6-4-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2014/01/06/gitlab-ee-6-4-release/</id>
<published>2014-01-06T00:00:00+00:00</published>
<updated>2014-01-06T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we announce the release of GitLab Enterprise Edition 6.4. 
GitLab is an open source code hosting and project management application.
In addition to the improvements found in &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;12&#x2F;21&#x2F;gitlab-ce-6-dot-4-released&#x2F;&quot;&gt;GitLab Community Edition 6.4&lt;&#x2F;a&gt; this release contains the following changes for GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;improvements&quot;&gt;Improvements&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;LDAP group synchronization now respects existing permissions;&lt;&#x2F;li&gt;
  &lt;li&gt;the in-line documentation for LDAP group synchronization settings has been improved.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;bugfixes&quot;&gt;Bugfixes&lt;&#x2F;h3&gt;
&lt;ul&gt;
  &lt;li&gt;We fixed the bug which caused unnecessary &#x27;You were added to group Foo&#x27; email notifications.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.4 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/12/21/gitlab-ce-6-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/12/21/gitlab-ce-6-dot-4-released/</id>
<published>2013-12-21T12:20:00+00:00</published>
<updated>2013-12-21T12:20:00+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ce-64-released&quot;&gt;GitLab CE 6.4 released!&lt;&#x2F;h3&gt;

&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know GitLab is open source software to collaborate on code.
Today we released a new version of GitLab Community Edition (CE), with new features, bug fixes, stability improvements and Rails 4 under the hood.
This month we have 2 MVPs because both of them contributed awesome stuff to GitLab 6.4.
Steven Thonus brought us the side-by-side diff view and the ability to archive old projects.
Jason Hollingsworth contributed the new &#x27;internal projects&#x27; feature.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;internal-projects&quot;&gt;Internal projects&lt;&#x2F;h3&gt;

&lt;p&gt;Internal projects can be cloned and browsed by any logged in user.
It will also be listed on the public access directory for logged in users.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;new-project.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;new-project.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;side-by-side-diff-view&quot;&gt;Side-by-side diff view&lt;&#x2F;h3&gt;

&lt;p&gt;The unified diff view is still the default but you now can also switch to a side-by-side diff view.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;diff.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;diff.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;archive-old-projects&quot;&gt;Archive old projects&lt;&#x2F;h3&gt;

&lt;p&gt;Archiving a project will mark its repository as read-only.
It is hidden from the dashboard and it does not show up in searches.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;arch.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;arch.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Archived projects you have access to will still be listed on your profile page (gitlab.example.com&#x2F;u&#x2F;my_user).&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-webhooks&quot;&gt;Project webhooks&lt;&#x2F;h3&gt;

&lt;p&gt;Project webhooks were extended with new types of events.
Webhooks can now also be triggered when an issue is created or a merge request is closed.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;hook.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;hook.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;awesome-sorting-for-the-issues-page&quot;&gt;Awesome sorting for the Issues page&lt;&#x2F;h3&gt;

&lt;p&gt;Thanks to Jason Blanchard for contributing this very useful feature.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;issues.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;issues.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;readme-link-at-the-project-home-page&quot;&gt;README link at the project home page&lt;&#x2F;h3&gt;

&lt;p&gt;For projects that have a README that is recognized by GitLab you can now go straight to the README from the project home page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;readme.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;readme.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;and-some-good-news-for-people-who-want-easier-upgrades&quot;&gt;And some good news for people who want easier upgrades&lt;&#x2F;h3&gt;

&lt;p&gt;We included an upgrade script with GitLab CE 6.4.
This means you will be able to upgrade to next version (6.5) with just one command.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;upgrade.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;upgrade.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;
&lt;a href=&quot;&#x2F;images&#x2F;6_4&#x2F;upgrade2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_4&#x2F;upgrade2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;links&quot;&gt;Links&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;master&#x2F;README.md#installation&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.
No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 4.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/12/20/gitlab-ci-4-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/12/20/gitlab-ci-4-dot-1-released/</id>
<published>2013-12-20T13:22:00+00:00</published>
<updated>2013-12-20T13:22:00+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ci-version-41-released&quot;&gt;GitLab CI version 4.1 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;As you know GitLab CI is a continuous integration server.
It integrates with your GitLab installation and run tests for your projects.&lt;&#x2F;p&gt;

&lt;p&gt;Today we release a new version of GitLab CI.
The main new feature of this release is the ability to get email notifications.
You can configure a list of email notification recipients per project.
In addition GitLab CI can send emails to the author of the build commit.
You have the choice of receiving notifications for all builds or only for failed builds.&lt;&#x2F;p&gt;

&lt;p&gt;Thanks to Jeroen Knoops for contributing this feature!&lt;&#x2F;p&gt;



&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_1&#x2F;email.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_1&#x2F;email.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;GitLab CI 4.1 requires &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;21&#x2F;gitlab-ce-6-dot-3-released&#x2F;&quot;&gt;GitLab 6.3&lt;&#x2F;a&gt; or higher&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;setup-and-update-links&quot;&gt;Setup and update links:&lt;&#x2F;h1&gt;

&lt;h3 id=&quot;update-from-gitlab-ci-40&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;4.0-to-4.1.md&quot;&gt;Update from GitLab CI 4.0&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;setup&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;blob&#x2F;4-1-stable&#x2F;doc&#x2F;installation.md&quot;&gt;Setup&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 6.3.1 security release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/12/05/gitlab-ce-6-dot-3-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/12/05/gitlab-ce-6-dot-3-dot-1-released/</id>
<published>2013-12-05T00:00:00+00:00</published>
<updated>2013-12-05T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-631-security-release&quot;&gt;GitLab 6.3.1 security release&lt;&#x2F;h3&gt;
&lt;p&gt;We have just released GitLab Community Edition 6.3.1 and GitLab Enterprise Edition 6.3.1 in response to this week&#x27;s &lt;a href=&quot;http:&#x2F;&#x2F;weblog.rubyonrails.org&#x2F;2013&#x2F;12&#x2F;3&#x2F;Rails_3_2_16_and_4_0_2_have_been_released&#x2F;&quot;&gt;Ruby on Rails security update 3.2.16&lt;&#x2F;a&gt;.
We advise all our users to upgrade to GitLab Community Edition 6.3.1 or GitLab Enterprise Edition 6.3.1 immediately.&lt;&#x2F;p&gt;



&lt;p&gt;Ruby on Rails security update 3.2.16 addresses four security issues, including &lt;a href=&quot;https:&#x2F;&#x2F;groups.google.com&#x2F;d&#x2F;msg&#x2F;ruby-security-ann&#x2F;A-ebV4WxzKg&#x2F;KNPTbX8XAQUJ&quot;&gt;denial of service through memory exhaustion&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: all&lt;&#x2F;p&gt;

&lt;p&gt;Versions fixed: GitLab Community Edition 6.3.1, GitLab Enterprise Edition 6.3.1&lt;&#x2F;p&gt;

&lt;h3 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h3&gt;
&lt;p&gt;GitLab Community Edition 6.3.1 is available at &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt; and &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&quot;&gt;GitHub&lt;&#x2F;a&gt;.
GitLab Enterprise Edition 6.3.1 is available for subscribers at &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.
Update instructions can be &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;patch_versions.md&quot;&gt;found&lt;&#x2F;a&gt; &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;here&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;Users who cannot upgrade can address the DoS vulnerability by applying a patch based on the workaround provided by Rails in &lt;code&gt;&#x2F;home&#x2F;git&#x2F;gitlab&lt;&#x2F;code&gt; with &lt;code&gt;git am&lt;&#x2F;code&gt; and restarting GitLab.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.3.1 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/12/05/gitlab-ee-6-3-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/12/05/gitlab-ee-6-3-security-release/</id>
<published>2013-12-05T00:00:00+00:00</published>
<updated>2013-12-05T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we have published a &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;12&#x2F;05&#x2F;gitlab-ce-6-dot-3-dot-1-released&#x2F;&quot;&gt;security advisory and updates&lt;&#x2F;a&gt; for GitLab Community Edition 6.3 and GitLab Enterprise Edition 6.3 in response to a recent security patch for Ruby on Rails.
For more information please see our blog post on &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;12&#x2F;05&#x2F;gitlab-ce-6-dot-3-dot-1-released&#x2F;&quot;&gt;GitLab.org&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Subscribers of GitLab.com can contact us at &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt;for more information.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.3 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/12/02/gitlab-ee-6-3-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/12/02/gitlab-ee-6-3-release/</id>
<published>2013-12-02T00:00:00+00:00</published>
<updated>2013-12-02T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we announce the release of GitLab Enterprise Edition 6.3. 
GitLab is an open source code hosting and project management application.
With GitLab Enterprise Edition 6.3 you benefit both from the &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;12&#x2F;05&#x2F;gitlab-ce-6-dot-3-dot-1-released&#x2F;&quot;&gt;new features, improvements and security fixes in GitLab 6.3 Community Edition&lt;&#x2F;a&gt; and from the &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;advanced LDAP and group sharing features&lt;&#x2F;a&gt; of GitLab Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.3 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 4.0 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/21/gitlab-ci-4-dot-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/21/gitlab-ci-4-dot-0-released/</id>
<published>2013-11-21T14:15:00+00:00</published>
<updated>2013-11-21T14:15:00+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ci-version-40-released&quot;&gt;GitLab CI version 4.0 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we release a new version of GitLab CI.
We have done a lot of work to improve the flexibility of the architecture.
In addition this release contains bug fixes and UI improvements.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;dashboard.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;dashboard.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;these-are-some-of-the-awesome-things-in-gitlab-ci-40&quot;&gt;These are some of the awesome things in GitLab CI 4.0:&lt;&#x2F;h3&gt;

&lt;h4 id=&quot;1-set-up-a-new-project-in-just-one-click&quot;&gt;1. Set up a new project in just one click&lt;&#x2F;h4&gt;

&lt;p&gt;It is no longer necessary to manually copy a token from GitLab CI to the corresponding GitLab instance; GitLab CI will do this for you.
This means that it now only takes one click in GitLab CI to enable builds for your GitLab project!
Just click the &#x27;Add&#x27; button next to your project on the GitLab CI Dashboard and you are ready to set up your build script.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;one-click.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;one-click.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h4 id=&quot;2-administrator-privileges&quot;&gt;2. Administrator privileges&lt;&#x2F;h4&gt;

&lt;p&gt;GitLab CI 4.0 restricts certain privileges to users who have Administrator rights on the corresponding GitLab server.
Only administrators can manage runners now.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;runners.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;runners.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In addition, administrators can list and remove projects.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;admin-projects.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;admin-projects.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h4 id=&quot;3-shared-and-specific-runners&quot;&gt;3. Shared and specific runners&lt;&#x2F;h4&gt;

&lt;p&gt;From now on a runner can be in one of two states: &#x27;shared&#x27; or &#x27;specific&#x27;.
By default every runner is &#x27;shared&#x27; and will run builds for any project.
After a runner is assigned to a project it becomes &#x27;specific&#x27; and it will exclusively run builds for that specific project.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;runner-page.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;runner-page.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h4 id=&quot;4-new-build-page&quot;&gt;4. New build page&lt;&#x2F;h4&gt;

&lt;p&gt;We re-designed the build page a bit to concentrate more on build output, moving all additional information to right-hand side.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;build-page.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;build-page.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h4 id=&quot;5-more-options-for-build-configuration&quot;&gt;5. More options for build configuration&lt;&#x2F;h4&gt;

&lt;p&gt;Now you can choose the method of fetching new code for each repeat build.
Before we used &lt;code&gt;git fetch&lt;&#x2F;code&gt; but if you want to use &lt;code&gt;git clone&lt;&#x2F;code&gt; it is now available as a radio button in the project settings screen.
It can be useful to use &lt;code&gt;git clone&lt;&#x2F;code&gt; if your project directory changes state during the build and you want to have a clean directory for each build.&lt;&#x2F;p&gt;

&lt;h4 id=&quot;6-profile-page&quot;&gt;6. Profile page&lt;&#x2F;h4&gt;

&lt;p&gt;We have also made small improvements to the profile page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;profile.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_4_0&#x2F;profile.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;GitLab CI 4.0 requires &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;21&#x2F;gitlab-ce-6-dot-3-released&#x2F;&quot;&gt;GitLab 6.3&lt;&#x2F;a&gt; or higher&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;setup-and-update-links&quot;&gt;Setup and update links:&lt;&#x2F;h1&gt;

&lt;h3 id=&quot;update-from-gitlab-ci-32&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;blob&#x2F;master&#x2F;doc&#x2F;update&#x2F;3.2-to-4.0.md&quot;&gt;Update from GitLab CI 3.2&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;h3 id=&quot;setup&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;blob&#x2F;4-0-stable&#x2F;doc&#x2F;installation.md&quot;&gt;Setup&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/21/gitlab-ce-6-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/21/gitlab-ce-6-dot-3-released/</id>
<published>2013-11-21T10:19:00+00:00</published>
<updated>2013-11-21T10:19:00+00:00</updated>
<author>
<name>Dmitriy Zaporozhets</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ce-63-released&quot;&gt;GitLab CE 6.3 released!&lt;&#x2F;h3&gt;

&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we released a new version of GitLab Community Edition (CE), with new features, bug fixes, security patches and stability improvements.
GitLab is open source software to collaborate on code.
The main new feature of the 6.3 release is the ability to create and remove files through the web UI.
Because of the security patches we advise everyone to upgrade to this version as soon as possible.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;create-files-from-the-web-interface&quot;&gt;Create files from the web interface&lt;&#x2F;h3&gt;

&lt;p&gt;You can now create new text files directly from the web interface.
To create a new file go to the directory where you want to create the new file and click the &#x27;+&#x27; button next to the directory name.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;new-file-1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;new-file-1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Now you can specify the file name, commit message and content in the form.
The new commit will be added to the branch you were browsing when you clicked &#x27;+&#x27;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;new-file-2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;new-file-2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;remove-files-through-the-web-interface&quot;&gt;Remove files through the web interface&lt;&#x2F;h3&gt;

&lt;p&gt;It is also possible to delete files from the web interface using the new &#x27;remove&#x27; button in the file view.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;remove-file-1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;remove-file-1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Because we are making a new commit we must specify a commit message.
The commit is added to the branch you were viewing the file in.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;remove-file-2.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;remove-file-2.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;broadcast-messages&quot;&gt;Broadcast messages&lt;&#x2F;h3&gt;

&lt;p&gt;Email is not always the best way to inform users about server maintenance.
With the new &#x27;Broadcast Messages&#x27; feature administrators can add messages that will be displayed to all users as a banner during a specific time interval.&lt;&#x2F;p&gt;

&lt;p&gt;To add a broadcast message go to the new &#x27;Messages&#x27; tab in the admin interface and enter a new message, along with start and end times to determine when the message will be visible to your users.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;broadcast.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;broadcast.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;The message will appear to your users as a banner at the top of the screen.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;broadcast-show.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;broadcast-show.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-transfer&quot;&gt;Project transfer&lt;&#x2F;h3&gt;

&lt;p&gt;Administrators can now transfer projects directly from the admin interface, without having to visit the user-facing project settings screen.
This change also allows administrators to move projects to any existing namespace.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;admin-transfer.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;admin-transfer.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;leaving-a-project&quot;&gt;Leaving a project&lt;&#x2F;h3&gt;

&lt;p&gt;Previously the only way to leave a project was to ask the owner to remove you.
Now you can leave projects without owner intervention: just visit the &#x27;Projects&#x27; tab on the main dashboard.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;leave-page.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;leave-page.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;admin-dashboard-improvements&quot;&gt;Admin dashboard improvements&lt;&#x2F;h3&gt;

&lt;p&gt;Want to know which version of gitlab-shell you are using or whether Gravatar is enabled?
You can now see version and configuration information for your GitLab installation on the Admin dashboard.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;admin.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;admin.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;see-which-branches-contain-a-commit&quot;&gt;See which branches contain a commit&lt;&#x2F;h3&gt;

&lt;p&gt;When viewing a commit you now see links to all branches this commit is contained in.
Thanks to Andrew Kumanyaev for contributing this feature!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;commit.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;commit.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;project-home-page&quot;&gt;Project home page&lt;&#x2F;h3&gt;

&lt;p&gt;We have done a minor redesign of the project home page view to improve the flow and balance of the page.
We hope you like it!&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_3&#x2F;project.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_3&#x2F;project.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This release&#x27;s most valuable person (MVP) is __Andrew Kumanyaev __ for contributing the &#x27;which branches contain this commit?&#x27; feature.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h1 id=&quot;links&quot;&gt;Links&lt;&#x2F;h1&gt;

&lt;p&gt;If you are setting up a new GitLab installation see the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;master&#x2F;README.md#installation&quot;&gt;installation section of the README&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.
No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Multiple critical vulnerabilities in GitLab</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/14/multiple-critical-vulnerabilities-in-gitlab/</id>
<published>2013-11-14T15:00:00+00:00</published>
<updated>2013-11-14T15:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;h3 id=&quot;multiple-critical-vulnerabilities-in-gitlab&quot;&gt;Multiple critical vulnerabilities in GitLab&lt;&#x2F;h3&gt;
&lt;p&gt;New critical vulnerabilities recently discovered in GitLab enable unauthenticated API access, remote code execution, local file inclusion and unauthorized access to private repositories. All users should update GitLab and gitlab-shell immediately.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update (18 November 2013): added CVE numbers.&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h3&gt;
&lt;p&gt;GitLab 5.4.2 and GitLab CE 6.2.4 are available from https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce and https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq; update instructions can be found in https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;. For more information about GitLab EE 6.2.1 see &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;2013&#x2F;11&#x2F;14&#x2F;multiple-security-vulnerabilities-in-gitlab&#x2F;&quot;&gt;our blog post on GitLab.com&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Gitlab-shell 1.7.8 is available from https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell and https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-shell . To upgrade gitlab-shell it suffices to run &lt;code&gt;sudo su git -c &#x27;git fetch &amp;amp;&amp;amp; git checkout v1.7.8&#x27;&lt;&#x2F;code&gt; in &#x2F;home&#x2F;git&#x2F;gitlab-shell .&lt;&#x2F;p&gt;

&lt;h3 id=&quot;credits&quot;&gt;Credits&lt;&#x2F;h3&gt;
&lt;p&gt;Thanks to joernchen of &lt;a href=&quot;http:&#x2F;&#x2F;www.phenoelit.org&#x2F;&quot;&gt;Phenoelit&lt;&#x2F;a&gt; for reporting these vulnerabilities to us.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;unauthenticated-api-access-to-gitlab-when-using-mysql&quot;&gt;Unauthenticated API access to GitLab when using MySQL&lt;&#x2F;h1&gt;
&lt;p&gt;There is an unauthenticated API access vulnerability in all version of GitLab. This vulnerability has been assigned CVE identifier CVE-2013-4580.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: all&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 5.4.2, Community Edition 6.2.4, Enterprise Edition 6.2.1&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;On GitLab installations which use MySQL as their database backend it is possible for an attacker to assume the identity of any existing GitLab user in certain API calls. This attack can be performed by unauthenticated users.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been fixed in GitLab 5.4.2, GitLab Community Edition 6.2.4 and GitLab Enterprise Edition 6.2.1.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are unable to upgrade you should apply the following patch and restart GitLab.&lt;&#x2F;p&gt;

&lt;pre&gt;
--- a&#x2F;lib&#x2F;api&#x2F;helpers.rb
+++ b&#x2F;lib&#x2F;api&#x2F;helpers.rb
@@ -6,19 +6,23 @@ module API
     SUDO_PARAM = :sudo
 
     def current_user
-      @current_user ||= User.find_by_authentication_token(params[PRIVATE_TOKEN_PARAM] || env[PRIVATE_TOKEN_HEADER])
+      private_token = (params[PRIVATE_TOKEN_PARAM] || env[PRIVATE_TOKEN_HEADER]).to_s
+      @current_user ||= User.find_by_authentication_token(private_token)
       identifier = sudo_identifier()
&lt;&#x2F;pre&gt;

&lt;h1 id=&quot;remote-code-execution-vulnerability-via-git-ssh-access-in-gitlab&quot;&gt;Remote code execution vulnerability via Git SSH access in GitLab&lt;&#x2F;h1&gt;
&lt;p&gt;There is a remote code execution vulnerability via Git SSH access in GitLab. This vulnerability has been assigned CVE identifier CVE-2013-4581.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 5.0 and newer&lt;&#x2F;p&gt;

&lt;p&gt;Not affected: 4.2 and older&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 5.4.2, Community Edition 6.2.4, Enterprise Edition 6.2.1 (running gitlab-shell 1.7.8)&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact-1&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;In affected versions an attacker can execute arbitrary code on a GitLab server by pushing carefully crafted changes via Git over SSH. This attack requires a GitLab user with an associated SSH key.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been fixed in gitlab-shell 1.7.8, which is known to work with GitLab 5.4 and newer. All users should update gitlab-shell to version 1.7.8 immediately.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds-1&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are unable to upgrade, please apply the following patch in &lt;code&gt;&#x2F;home&#x2F;git&#x2F;gitlab-shell&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;
&lt;pre&gt;
--- a&#x2F;lib&#x2F;gitlab_config.rb
+++ b&#x2F;lib&#x2F;gitlab_config.rb
@@ -48,12 +48,12 @@ class GitlabConfig
     if redis.empty?
       # Default to old method of connecting to redis
       # for users that haven&#x27;t updated their configuration
-      &quot;env -i redis-cli&quot;
+      %W(env -i redis-cli)
     else
       if redis.has_key?(&quot;socket&quot;)
-        &quot;#{redis[&#x27;bin&#x27;]} -s #{redis[&#x27;socket&#x27;]}&quot;
+        %W(#{redis[&#x27;bin&#x27;]} -s #{redis[&#x27;socket&#x27;]})
       else
-        &quot;#{redis[&#x27;bin&#x27;]} -h #{redis[&#x27;host&#x27;]} -p #{redis[&#x27;port&#x27;]}&quot;
+        %W(#{redis[&#x27;bin&#x27;]} -h #{redis[&#x27;host&#x27;]} -p #{redis[&#x27;port&#x27;]})
       end
     end
   end

--- a&#x2F;lib&#x2F;gitlab_update.rb
+++ b&#x2F;lib&#x2F;gitlab_update.rb
@@ -1,5 +1,6 @@
 require_relative &#x27;gitlab_init&#x27;
 require_relative &#x27;gitlab_net&#x27;
+require &#x27;json&#x27;
 
 class GitlabUpdate
   attr_reader :config
@@ -53,7 +54,8 @@ class GitlabUpdate
   end
 
   def update_redis
-    command = &quot;#{config.redis_command} rpush &#x27;#{config.redis_namespace}:queue:post_receive&#x27; &#x27;{\&quot;class\&quot;:\&quot;PostReceive\&quot;,\&quot;args\&quot;:[\&quot;#
-    system(command)
+    queue = &quot;#{config.redis_namespace}:queue:post_receive&quot;
+    msg = JSON.dump({&#x27;class&#x27; =&amp;gt; &#x27;PostReceive&#x27;, &#x27;args&#x27; =&amp;gt; [@repo_path, @oldrev, @newrev, @refname, @key_id]})
+    system(*config.redis_command, &#x27;rpush&#x27;, queue, msg, err: &#x27;&#x2F;dev&#x2F;null&#x27;, out: &#x27;&#x2F;dev&#x2F;null&#x27;)
   end
 end
&lt;&#x2F;pre&gt;

&lt;h1 id=&quot;local-file-inclusion-vulnerability-in-gitlab&quot;&gt;Local file inclusion vulnerability in GitLab&lt;&#x2F;h1&gt;
&lt;p&gt;There is a local file inclusion vulnerability in GitLab. This vulnerability has been assigned CVE identifier CVE-2013-4582.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 5.0 and newer&lt;&#x2F;p&gt;

&lt;p&gt;Not affected: 4.2 and older&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 5.4.2, Community Edition 6.2.4, Enterprise Edition 6.2.1 (running gitlab-shell 1.7.8)&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact-2&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;In affected versions an attacker can include the contents of a local file in the metadata of a Git repository hosted on the server via the GitLab web interface. This vulnerability can only be exploited by authenticated GitLab users.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been fixed in gitlab-shell 1.7.8, which is known to work with GitLab 5.4 and newer. All users should update gitlab-shell to version 1.7.8 immediately.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds-2&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are unable to upgrade you should apply the following patch in &lt;code&gt;&#x2F;home&#x2F;git&#x2F;gitlab-shell&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;pre&gt;
--- a&#x2F;lib&#x2F;gitlab_projects.rb
+++ b&#x2F;lib&#x2F;gitlab_projects.rb
@@ -48,7 +48,7 @@ class GitlabProjects
   def create_branch
     branch_name = ARGV.shift
     ref = ARGV.shift || &quot;HEAD&quot;
-    cmd = %W(git --git-dir=#{full_path} branch #{branch_name} #{ref})
+    cmd = %W(git --git-dir=#{full_path} branch -- #{branch_name} #{ref})
     system(*cmd)
   end
 
@@ -61,7 +61,7 @@ class GitlabProjects
   def create_tag
     tag_name = ARGV.shift
     ref = ARGV.shift || &quot;HEAD&quot;
-    cmd = %W(git --git-dir=#{full_path} tag #{tag_name} #{ref})
+    cmd = %W(git --git-dir=#{full_path} tag -- #{tag_name} #{ref})
     system(*cmd)
   end
 
@@ -94,7 +94,7 @@ class GitlabProjects
   def import_project
     @source = ARGV.shift
     $logger.info &quot;Importing project #{@project_name} from &amp;lt;#{@source}&amp;gt; to &amp;lt;#{full_path}&amp;gt;.&quot;
-    cmd = %W(git clone --bare #{@source} #{full_path})
+    cmd = %W(git clone --bare -- #{@source} #{full_path})
     system(*cmd) &amp;amp;&amp;amp; create_hooks(full_path)
   end
 
@@ -156,7 +156,7 @@ class GitlabProjects
     end
 
     $logger.info &quot;Forking project from &amp;lt;#{full_path}&amp;gt; to &amp;lt;#{full_destination_path}&amp;gt;.&quot;
-    cmd = %W(git clone --bare #{full_path} #{full_destination_path})
+    cmd = %W(git clone --bare -- #{full_path} #{full_destination_path})
     system(*cmd) &amp;amp;&amp;amp; create_hooks(full_destination_path)
   end
 
&lt;&#x2F;pre&gt;

&lt;h1 id=&quot;repository-access-privilege-escalation-vulnerability-in-gitlab&quot;&gt;Repository access privilege escalation vulnerability in GitLab&lt;&#x2F;h1&gt;
&lt;p&gt;There is a repository access privilege escalation vulnerability in GitLab. This vulnerability has been assigned CVE identifier CVE-2013-4583.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 5.0 and newer&lt;&#x2F;p&gt;

&lt;p&gt;Not affected: 4.2 and older&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 5.4.2, Community Edition 6.2.4, Enterprise Edition 6.2.1 (running gitlab-shell 1.7.8)&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact-3&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;In affected versions a GitLab user can escalate their repository access privileges and clone a repository that they should not have access to via Git SSH access. This vulnerability can only be exploited by authenticated GitLab users.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability has been fixed in gitlab-shell 1.7.8, which is known to work with GitLab 5.4 and newer. All users should update gitlab-shell to version 1.7.8 immediately.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds-3&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are unable to upgrade you should apply the following patch in &lt;code&gt;&#x2F;home&#x2F;git&#x2F;gitlab-shell&lt;&#x2F;code&gt;.&lt;&#x2F;p&gt;

&lt;pre&gt;
--- a&#x2F;lib&#x2F;gitlab_shell.rb
+++ b&#x2F;lib&#x2F;gitlab_shell.rb
@@ -43,7 +43,7 @@ class GitlabShell
   def parse_cmd
     args = Shellwords.shellwords(@origin_cmd)
     @git_cmd = args[0]
-    @repo_name = args[1]
+    @repo_name = escape_path(args[1])
   end
 
   def git_cmds
@@ -86,4 +86,12 @@ class GitlabShell
   def log_username
     @config.audit_usernames ? username : &quot;user with key #{@key_id}&quot;
   end
+
+  def escape_path(path)
+    if File.absolute_path(path, repos_path) == File.join(repos_path, path)
+      path
+    else
+      raise &quot;Wrong repository path&quot;
+    end
+  end
 end

&lt;&#x2F;pre&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Multiple security vulnerabilities in GitLab</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/14/multiple-security-vulnerabilities-in-gitlab/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/14/multiple-security-vulnerabilities-in-gitlab/</id>
<published>2013-11-14T00:00:00+00:00</published>
<updated>2013-11-14T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released another &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;14&#x2F;multiple-critical-vulnerabilities-in-gitlab&#x2F;&quot;&gt;security advisory&lt;&#x2F;a&gt; detailing multiple security vulnerabilities in GitLab and gitlab-shell. Users of GitLab Enterprise Edition should update gitlab-shell to version 1.7.8 immediately, and update GitLab to version 6.2.1-ee. If you are unable to update your GitLab EE installation to version 6.2.1-ee you should apply &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;commit&#x2F;919d48db6c3eb3caf293218de412f004152b732e&quot;&gt;this patch&lt;&#x2F;a&gt; (link to private GitLab EE repository).&lt;&#x2F;p&gt;

&lt;p&gt;For more information or if you are running GitLab CE, please see the &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;14&#x2F;multiple-critical-vulnerabilities-in-gitlab&#x2F;&quot;&gt;advisory on blog.gitlab.org&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;em&gt;Update (14 Nov 2013 18:07:37 CET):&lt;&#x2F;em&gt; refer CE users to blog.gitlab.org.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security vulnerability in gitlab-shell (CVE-2013-4546)</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/08/security-vulnerability-in-gitlab-shell/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/08/security-vulnerability-in-gitlab-shell/</id>
<published>2013-11-08T19:00:00+00:00</published>
<updated>2013-11-08T19:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;h1 id=&quot;security-vulnerability-in-gitlab-shell-cve-2013-4546&quot;&gt;Security vulnerability in gitlab-shell (CVE-2013-4546)&lt;&#x2F;h1&gt;

&lt;p&gt;We have learned about a second remote code execution vulnerability in gitlab-shell. This issue was fixed in gitlab-shell 1.7.4, so users who updated gitlab-shell after &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;04&#x2F;gitlab-ce-6-2-and-5-4-security-release&#x2F;&quot;&gt;our recent security announcement&lt;&#x2F;a&gt; are not affected.&lt;&#x2F;p&gt;



&lt;h2 id=&quot;remote-code-execution-vulnerability-in-the-repository-import-feature-of-older-versions-of-gitlab&quot;&gt;Remote code execution vulnerability in the repository import feature of older versions of GitLab&lt;&#x2F;h2&gt;

&lt;p&gt;There is a remote code execution vulnerability in the repository import feature of older versions of GitLab. This vulnerability has been assigned the CVE identifier CVE-2013-4546.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 5.0, 5.1, 5.2, 5.3, 5.4, 6.0, 6.1, 6.2&lt;&#x2F;p&gt;

&lt;p&gt;Not affected: 4.2 and earlier&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 5.4.1, Community Edition 6.2.3, Enterprise Edition 6.2.0 (all using gitlab-shell 1.7.4)&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;When creating a new project a GitLab user can specify that a remote repository should be imported into the new project. In affected versions the import URL text field can be used to execute code on the GitLab server. Only authenticated users can create new projects and import repositories.&lt;&#x2F;p&gt;

&lt;p&gt;This vulnerability was fixed in gitlab-shell 1.7.4. All users running GitLab 5.4 or newer should verify that they are using gitlab-shell 1.7.4 or newer (&lt;code&gt;cat &#x2F;home&#x2F;git&#x2F;gitlab-shell&#x2F;VERSION&lt;&#x2F;code&gt;) and upgrade gitlab-shell immediately if necessary.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h3&gt;
&lt;p&gt;Gitlab-shell 1.7.4 is available from https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-shell and https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-shell . To upgrade gitlab-shell it suffices to run &lt;code&gt;sudo su git -c &#x27;git fetch &amp;amp;&amp;amp; git checkout v1.7.4&#x27;&lt;&#x2F;code&gt; in &#x2F;home&#x2F;git&#x2F;gitlab-shell .&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are unable to upgrade you can disable the repository import functionality in GitLab by deleting the following code block from &lt;code&gt;app&#x2F;contexts&#x2F;projects&#x2F;create_context.rb&lt;&#x2F;code&gt; and restarting GitLab:&lt;&#x2F;p&gt;

&lt;pre&gt;
# Import project from cloneable resource
if @project.valid? &amp;amp;&amp;amp; @project.import_url.present?
  shell = Gitlab::Shell.new
  if shell.import_repository(@project.path_with_namespace, @project.import_url)
    # We should create satellite for imported repo
    @project.satellite.create unless @project.satellite.exists?
    @project.imported = true
    true
  else
    @project.errors.add(:import_url, &#x27;cannot clone repo&#x27;)
  end
end
&lt;&#x2F;pre&gt;

&lt;h3 id=&quot;credits&quot;&gt;Credits&lt;&#x2F;h3&gt;
&lt;p&gt;Thanks to Remy van Elst https:&#x2F;&#x2F;raymii.org&#x2F; for reporting the vulnerability to us.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Security advisory regarding CVE-2013-4546</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/08/security-advisory-cve-2013-4546/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/08/security-advisory-cve-2013-4546/</id>
<published>2013-11-08T00:00:00+00:00</published>
<updated>2013-11-08T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just an advisory about a &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;08&#x2F;security-vulnerability-in-gitlab-shell&#x2F;&quot;&gt;critical security vulnerability affecting older versions of GitLab (CVE-2013-4546)&lt;&#x2F;a&gt;. 
All users of GitLab Enterprise Edition should update gitlab-shell to version 1.7.4 or newer immediately.
For more information please see the &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;08&#x2F;security-vulnerability-in-gitlab-shell&#x2F;&quot;&gt;advisory on blog&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 6.2.3 and 5.4.1 security releases</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/04/gitlab-ce-6-2-and-5-4-security-release/</id>
<published>2013-11-04T19:00:00+00:00</published>
<updated>2013-11-04T19:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ce-62-and-54-security-releases&quot;&gt;GitLab CE 6.2 and 5.4 security releases&lt;&#x2F;h3&gt;

&lt;p&gt;We have just released GitLab CE 6.2.3, CE 5.4.1 and &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;2013&#x2F;11&#x2F;04&#x2F;gitlab-ee-6-2-security-release&#x2F;&quot;&gt;EE 6.2.0&lt;&#x2F;a&gt;. 
These releases fix two critical security issues that allow remote code execution. 
Both remote code injection attacks are only possible if you are logged in as a user on the GitLab server.
We advise everyone to upgrade immediately or apply the two workarounds described below.
When you are on 6.2 you can use the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;universal update guide for patch versions&lt;&#x2F;a&gt; to upgrade.&lt;&#x2F;p&gt;



&lt;h1 id=&quot;remote-code-execution-vulnerability-in-the-code-search-feature-of-gitlab&quot;&gt;Remote code execution vulnerability in the code search feature of GitLab&lt;&#x2F;h1&gt;

&lt;p&gt;There is a remote code execution vulnerability in the code search feature of GitLab. This vulnerability has been assigned the CVE identifier CVE-2013-4489.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 5.2, 5.3, 5.4, 6.0, 6.1, 6.2&lt;&#x2F;p&gt;

&lt;p&gt;Not affected: 5.1 and earlier&lt;&#x2F;p&gt;

&lt;p&gt;Fixed Versions: 5.4.1, 6.2.3&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;The Grit gem which serves as the Git backend for GitLab has an unsafe code path for internal use which allows strings to be evaluated by the Bourne shell. In affected versions, the GitLab code search feature exposes this unsafe code path to user input from the search box. Code search in GitLab is only available for authenticated users.&lt;&#x2F;p&gt;

&lt;p&gt;All users running an affected release should upgrade immediately or disable code search using the workaround below.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;releases&quot;&gt;Releases&lt;&#x2F;h3&gt;
&lt;p&gt;The 5.4.1 and 6.2.3 releases are available from https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq and https:&#x2F;&#x2F;gitlab.com&#x2F;gitlab-org&#x2F;gitlab-ce .&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are unable to upgrade, you can disable code search by deleting the following line from &lt;code&gt;app&#x2F;contexts&#x2F;search_context.rb&lt;&#x2F;code&gt; and restarting GitLab:&lt;&#x2F;p&gt;

&lt;pre&gt;
result[:blobs] = project.repository.search_files(query, params[:repository_ref]) unless project.empty_repo?
&lt;&#x2F;pre&gt;

&lt;h3 id=&quot;credits&quot;&gt;Credits&lt;&#x2F;h3&gt;
&lt;p&gt;Thanks to joernchen of &lt;a href=&quot;http:&#x2F;&#x2F;www.phenoelit.org&#x2F;&quot;&gt;Phenoelit&lt;&#x2F;a&gt; for reporting the vulnerability to us.&lt;&#x2F;p&gt;

&lt;h1 id=&quot;remote-code-execution-vulnerability-in-the-ssh-key-upload-feature-of-gitlab&quot;&gt;Remote code execution vulnerability in the SSH key upload feature of GitLab&lt;&#x2F;h1&gt;

&lt;p&gt;There is a remote code execution vulnerability in the SSH key upload feature of GitLab. This vulnerability has been assigned the CVE identifier CVE-2013-4490.&lt;&#x2F;p&gt;

&lt;p&gt;Versions affected: 5.0, 5.1, 5.2, 5.3, 5.4, 6.0, 6.1, 6.2&lt;&#x2F;p&gt;

&lt;p&gt;Not affected: 4.2 and earlier&lt;&#x2F;p&gt;

&lt;p&gt;Fixed versions: 5.4.1, 6.2.3&lt;&#x2F;p&gt;

&lt;h3 id=&quot;impact-1&quot;&gt;Impact&lt;&#x2F;h3&gt;
&lt;p&gt;The gitlab-shell SSH access endpoint manages the authorized_keys file for the git user. When a user adds a public key using the GitLab web interface a gitlab-shell command is invoked to add the public key to authorized_keys. In affected versions, the public key text entered by the user is exposed to the Bourne shell in a way that can be exploited to achieve code execution as the git user. Only authenticated users can upload an SSH key.&lt;&#x2F;p&gt;

&lt;p&gt;All users running an affected release should upgrade gitlab-shell immediately.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;releases-1&quot;&gt;Releases&lt;&#x2F;h3&gt;
&lt;p&gt;Gitlab-shell 1.7.4, available from https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-shell, fixes the vulnerability and has been tested with GitLab 5.4.1 and GitLab 6.2.3.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;workarounds-1&quot;&gt;Workarounds&lt;&#x2F;h3&gt;
&lt;p&gt;If you are using GitLab 5.0 or newer and you cannot upgrade to GitLab 5.4.1 or GitLab 6.2.3 you should apply the following edit to gitlab-shell.&lt;&#x2F;p&gt;

&lt;pre&gt;
--- a&#x2F;lib&#x2F;gitlab_keys.rb
+++ b&#x2F;lib&#x2F;gitlab_keys.rb
@@ -29,8 +29,7 @@ class GitlabKeys
   def add_key
     $logger.info &quot;Adding key #{@key_id} =&amp;gt; #{@key.inspect}&quot;
     cmd = &quot;command=\&quot;#{ROOT_PATH}&#x2F;bin&#x2F;gitlab-shell #{@key_id}\&quot;,no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty #{@key}&quot;
-    cmd = &quot;echo \&#x27;#{cmd}\&#x27; &amp;gt;&amp;gt; #{auth_file}&quot;
-    system(cmd)
+    open(auth_file, &#x27;a&#x27;) { |file| file.puts(cmd) }
   end
 
   def rm_key
&lt;&#x2F;pre&gt;

&lt;h3 id=&quot;credits-1&quot;&gt;Credits&lt;&#x2F;h3&gt;
&lt;p&gt;Thanks to Nigel Kukard of &lt;a href=&quot;http:&#x2F;&#x2F;www.allworldit.com&#x2F;&quot;&gt;AllWorldIT&lt;&#x2F;a&gt; for reporting the vulnerability to us.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.2 Security Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/11/04/gitlab-ee-6-2-security-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/11/04/gitlab-ee-6-2-security-release/</id>
<published>2013-11-04T00:00:00+00:00</published>
<updated>2013-11-04T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;We have just released GitLab Enterprise Edition 6.2.0.
This release includes &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;04&#x2F;gitlab-ce-6-2-and-5-4-security-release&#x2F;&quot;&gt;critical security fixes&lt;&#x2F;a&gt; that address two remote code execution vulnerabilities present in both GitLab 6.0 EE and 6.1 EE.
We advise all our users to upgrade immediately or apply the &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;11&#x2F;04&#x2F;gitlab-ce-6-2-and-5-4-security-release&#x2F;&quot;&gt;&lt;strong&gt;two&lt;&#x2F;strong&gt; workarounds from the security announcement&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;For an overview of the other improvements in GitLab 6.2 EE please see &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&#x2F;subscribers&#x2F;gitlab-ee&#x2F;blob&#x2F;master&#x2F;CHANGELOG-EE&quot;&gt;the changelog&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CE 6.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/10/17/gitlab-ce-6-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/10/17/gitlab-ce-6-dot-2-released/</id>
<published>2013-10-17T14:50:00+00:00</published>
<updated>2013-10-17T14:50:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ce-62-released&quot;&gt;GitLab CE 6.2 released!&lt;&#x2F;h3&gt;

&lt;p&gt;Hello everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we release a new minor GitLab version, with new features, bug fixes and stability improvements.
GitLab is open source software to collaborate on code.
The main feature of the 6.2 release is fully browsable public projects.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;public-projects&quot;&gt;Public projects&lt;&#x2F;h3&gt;

&lt;p&gt;As of version 6.2 a user can visit public project pages (files, issues, wiki, etc.) without having a GitLab account.
Make sure you do not store private information in a public project wiki or issue tracker. :)&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_2&#x2F;public_project.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_2&#x2F;public_project.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;user-profile&quot;&gt;User profile&lt;&#x2F;h3&gt;

&lt;p&gt;In this version, we have made significant changes to the user&#x27;s profile.&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;You are able to upload your own avatar&lt;&#x2F;li&gt;
  &lt;li&gt;The current password is required when changing your password&lt;&#x2F;li&gt;
  &lt;li&gt;The password settings have moved to a separate page&lt;&#x2F;li&gt;
  &lt;li&gt;In order to change your email address you must confirm it&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_2&#x2F;profile.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_2&#x2F;profile.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;ui-improvements&quot;&gt;UI improvements&lt;&#x2F;h3&gt;

&lt;p&gt;We have a fresh sign-in page for GitLab 6.2. :)&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_2&#x2F;sign-in.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_2&#x2F;sign-in.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Admin page&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;6_2&#x2F;admin.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_2&#x2F;admin.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;and-much-more-just-update-to-gitlab-62-and-enjoy&quot;&gt;And much more. Just update to GitLab 6.2 and enjoy!&lt;&#x2F;h3&gt;

&lt;p&gt;This release&#x27;s most valuable person (MVP) is &lt;strong&gt;Steven Thonus&lt;&#x2F;strong&gt; for contributing the avatar upload feature.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;

&lt;p&gt;Project:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Public projects are visible from the outside&lt;&#x2F;li&gt;
  &lt;li&gt;PivotalTracker integration (Johannes Becker)&lt;&#x2F;li&gt;
  &lt;li&gt;Flowdock integration (Boyan Tabakov)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Profile:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Require current password to change one&lt;&#x2F;li&gt;
  &lt;li&gt;User must confirm his email if signup enabled&lt;&#x2F;li&gt;
  &lt;li&gt;User must confirm changed email&lt;&#x2F;li&gt;
  &lt;li&gt;Avatar upload on profile page with a maximum of 200KB (Steven Thonus)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;API:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Feature: Search for projects by name to api (Izaak Alpert)&lt;&#x2F;li&gt;
  &lt;li&gt;Feature: Remove group&lt;&#x2F;li&gt;
  &lt;li&gt;Feature: Remove project&lt;&#x2F;li&gt;
  &lt;li&gt;Feature: Download repo archive (Izaak Alpert)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Security:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Add more security specs&lt;&#x2F;li&gt;
  &lt;li&gt;Extended User API to expose admin and can_create_group for user creation&#x2F;updating (Boyan Tabakov)&lt;&#x2F;li&gt;
  &lt;li&gt;Store the sessions in Redis instead of the cookie store&lt;&#x2F;li&gt;
  &lt;li&gt;Respect authorization in Repository API&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Misc:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Group owner or admin can remove other group owners&lt;&#x2F;li&gt;
  &lt;li&gt;Make default user theme configurable (Izaak Alpert)&lt;&#x2F;li&gt;
  &lt;li&gt;Update logic for validates_merge_request for tree of MR (Andrew Kumanyaev)&lt;&#x2F;li&gt;
  &lt;li&gt;Rake tasks for webhooks management (Jonhnny Weslley)&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed relative links in markdown&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;If you are setting up a new GitLab installation follow the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;6-2-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.
No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;Updated on October 22 2013 to add the MVP and a description of GitLab in the opening paragraph.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Enterprise Edition 6.1 Release</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/10/15/gitlab-ee-6-1-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/10/15/gitlab-ee-6-1-release/</id>
<published>2013-10-15T00:00:00+00:00</published>
<updated>2013-10-15T00:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;p&gt;Today we announce the release of GitLab Enterprise Edition 6.1. 
GitLab is an open source code hosting and project management application.
In addition to &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;09&#x2F;22&#x2F;gitlab-community-edition-6-dot-1-released&#x2F;&quot;&gt;the improvements in GitLab 6.1 Community Edition&lt;&#x2F;a&gt;, GitLab 6.1 Enterprise Edition brings the following improvements:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;API for sharing Projects with Groups;&lt;&#x2F;li&gt;
  &lt;li&gt;a global LDAP user filter to specify which users in your directory may sign in to your GitLab installation;&lt;&#x2F;li&gt;
  &lt;li&gt;an improved UI for the LDAP group synchronization configuration.&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Our &lt;a href=&quot;https:&#x2F;&#x2F;www.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; can download GitLab 6.1 Enterprise Edition from &lt;a href=&quot;https:&#x2F;&#x2F;gitlab.com&quot;&gt;GitLab Cloud&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab Community Edition 6.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/09/22/gitlab-community-edition-6-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/09/22/gitlab-community-edition-6-dot-1-released/</id>
<published>2013-09-22T18:00:00+00:00</published>
<updated>2013-09-22T18:00:00+00:00</updated>
<author>
<name>Jacob Vosmaer</name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-community-edition-61-released&quot;&gt;GitLab Community Edition 6.1 released!&lt;&#x2F;h3&gt;

&lt;p&gt;Hello everyone!
Today we release a new minor GitLab version, with new features, bug fixes and stability improvements.&lt;&#x2F;p&gt;



&lt;p&gt;With GitLab 6.1 Community Edition you can now automatically close Issues using commit messages, see when an Issue was referenced in a commit or a comment, and add a description to a Merge Request.
Moreover, Issue and Merge Request ID&#x27;s now start at 1 for each Project.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;automatically-close-issues-using-commit-messages&quot;&gt;Automatically close issues using commit messages&lt;&#x2F;h3&gt;
&lt;p&gt;When you create a commit with a message &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;6-1-stable&#x2F;config&#x2F;gitlab.yml.example#L49&quot;&gt;starting with &#x27;Fixes #1&#x27; or &#x27;Closes #1&#x27;&lt;&#x2F;a&gt; and push it to master GitLab will close the issue you referred to.
If you create a Merge Request targeting master with commits in it that will close Issues, GitLab will tell you which Issues will be closed.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_1&#x2F;link-MR-to-Issue.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;see-when-an-issue-was-referenced-in-a-commit-or-a-comment&quot;&gt;See when an Issue was referenced in a commit or a comment&lt;&#x2F;h3&gt;
&lt;p&gt;When you refer to an Issue in a commit message or a comment on a Merge Request or another Issue, GitLab shows you that the issue was referenced.
&lt;img src=&quot;&#x2F;images&#x2F;6_1&#x2F;Issue-mentioned-elsewhere.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;issue-and-merge-request-ids-start-at-1-for-each-project&quot;&gt;Issue and Merge Request ID&#x27;s start at 1 for each Project&lt;&#x2F;h3&gt;
&lt;p&gt;The ID&#x27;s for Issues and Merge Requests now start at 1 for each Project.
This means that bookmarked issue URL&#x27;s will change.
Old issue URL&#x27;s are redirected to the new one if the issue ID is too high for an internal ID.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;add-a-description-to-a-merge-request&quot;&gt;Add a description to a Merge Request&lt;&#x2F;h3&gt;
&lt;p&gt;When you create a new Merge Request you can now add a description to it.
&lt;img src=&quot;&#x2F;images&#x2F;6_1&#x2F;description-for-MR.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;This release&#x27;s most valuable person (MVP) is &lt;strong&gt;Ash Wilson&lt;&#x2F;strong&gt; for contributing the automatic issue closing and issue reference linking features.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;
&lt;p&gt;User Interface&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Project specific IDs for issues, mr, milestones&lt;&#x2F;li&gt;
  &lt;li&gt;Description field added to Merge Request&lt;&#x2F;li&gt;
  &lt;li&gt;Improved commit diff&lt;&#x2F;li&gt;
  &lt;li&gt;Link issues, merge requests, and commits when they reference each other with GFM (Ash Wilson)&lt;&#x2F;li&gt;
  &lt;li&gt;Close issues automatically when pushing commits with a special message&lt;&#x2F;li&gt;
  &lt;li&gt;Improve user removal from admin area&lt;&#x2F;li&gt;
  &lt;li&gt;Add event filter for group and project show pages&lt;&#x2F;li&gt;
  &lt;li&gt;Add links to create branch&#x2F;tag from project home page&lt;&#x2F;li&gt;
  &lt;li&gt;Add public-project? checkbox to new-project view&lt;&#x2F;li&gt;
  &lt;li&gt;Improved compare page. Added link to proceed into Merge Request&lt;&#x2F;li&gt;
  &lt;li&gt;New landing page when you have 0 projects&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;API&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;API: Sudo api calls (Izaak Alpert)&lt;&#x2F;li&gt;
  &lt;li&gt;API: Group membership api (Izaak Alpert)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Other&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Improved large commit handling (Boyan Tabakov)&lt;&#x2F;li&gt;
  &lt;li&gt;Rewrite: Init script now less prone to errors and keeps better track of the service (Rovanion Luckey)&lt;&#x2F;li&gt;
  &lt;li&gt;Invalidate events cache when project was moved&lt;&#x2F;li&gt;
  &lt;li&gt;Remove deprecated classes and rake tasks&lt;&#x2F;li&gt;
  &lt;li&gt;Send email to user when he was added to group&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;If you are setting up a new GitLab installation follow the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;6-1-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see the &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;For LDAP group support and more have a look at the &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;gitlab-ee&#x2F;&quot;&gt;feature list of GitLab Enterprise Edition&lt;&#x2F;a&gt;.
Access to GitLab Enterprise Edition is included with a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt;.
No time to upgrade or maintain Gitlab yourself?
GitLab.com also offers upgrade and installation services as part of a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com subscription&lt;&#x2F;a&gt; or alternatively on a &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;consultancy basis&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Introducing GitLab 6.0 Enterprise Edition</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/08/22/introducing-gitlab-6-0-enterprise-edition/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/08/22/introducing-gitlab-6-0-enterprise-edition/</id>
<published>2013-08-22T00:00:00+00:00</published>
<updated>2013-08-22T00:00:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;The GitLab.com team is working on Dmitriy&#x27;s dream of giving the world great free tools to collaborate. After releasing GitLab 5.0 on March 22 this dream is coming closer every day. Since 5.0 the performance and stability of GitLab are best in class. This helped the community grow from 10.000 to 25.000 organizations using GitLab. We also see growing interest in larger companies with 3 Fortune 100 companies signing up for a &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscription&lt;&#x2F;a&gt; in the last quarter.&lt;&#x2F;p&gt;

&lt;p&gt;Today we make another big step towards realizing Dmitriy&#x27;s vision with the following big news:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;The release of GitLab 6.0 with many improvements&lt;&#x2F;li&gt;
  &lt;li&gt;The introduction of GitLab Enterprise Edition&lt;&#x2F;li&gt;
  &lt;li&gt;The use of an open source license for GitLab Enterprise Edition&lt;&#x2F;li&gt;
  &lt;li&gt;A new pricing model for subscriptions that starts at $398 per year&lt;&#x2F;li&gt;
  &lt;li&gt;The introduction of an educational discount of 50%&lt;&#x2F;li&gt;
  &lt;li&gt;A big credit to thank everyone who donated&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab Cloud gets free unlimited private repos and collaborators&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Today marks the introduction of GitLab 6.0 with many improvements. The most important new feature is that you can now add members to groups of projects. When you add a new project to a group it is shared with all group members and when you add a new group member he or she has access to all projects of the group.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab 6.0 is the first version that will come in two flavors, namely the Community Edition (CE) and the Enterprise Edition (EE). The CE version is available in the same way GitLab has always been. The Enterprise Edition will be made available only to subscribers of GitLab.com. The reason for a paid version is that we need to generate income to pay the full-time developers of GitLab.com. For this we want to depend on the GitLab community and not on &lt;a href=&quot;http:&#x2F;&#x2F;bhorowitz.com&#x2F;2013&#x2F;07&#x2F;16&#x2F;capital-market-climate-change&#x2F;&quot;&gt;the kindness of strangers&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;In the Enterprise Edition we will add features that are useful to large organizations. Most features will continue to be included in both editions. GitLab CE is useful for individuals and small and medium organizations. Larger organizations can also use the Community Edition, or choose to pay a reasonable price for the additional features provided by the Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;The community edition is the heart of GitLab and will remain under development, gaining new functionality in the coming years. No features will ever removed from the Community Edition. For example, the LDAP user functionality will stay in the Community edition. In the enterprise edition functionality for larger organizations will be added. In GitLab EE 6.0 this will be the ability to synchronize GitLab groups with LDAP groups.&lt;&#x2F;p&gt;

&lt;p&gt;We discussed the release of the Enterprise Edition with the rest of the GitLab community and received &lt;a href=&quot;&#x2F;releases&#x2F;2013&#x2F;07&#x2F;22&#x2F;announcing-gitlab-enterprise-edition&#x2F;&quot;&gt;great input about the licensing&lt;&#x2F;a&gt;. The Enterprise Edition will be released under the MIT because we believe in open source and trust the GitLab community. GitLab.com will not put the source code online but everyone in possession of the source is free to do as they please. We kindly ask subscribers not to distribute GitLab EE if they think GitLab.com is doing a good job serving the GitLab community.&lt;&#x2F;p&gt;

&lt;p&gt;The price of GitLab EE will be $1.99 per user per month or $19.90 per user per year in 20 user increments. We think this is great value for money and enables both large and small organizations to enjoy the Enterprise Edition. GitLab Enterprise Edition offers features unmatched by competing software such as adding multiple groups to a collection of repos. At the same time GitLab EE is up to 10 times more affordable than other solutions.&lt;&#x2F;p&gt;

&lt;p&gt;The new user based subscription also includes support and it will replace our old fixed price subscription. We want to thank our existing clients by including GitLab Enterprise Edition with their existing subscription. Fixed price subscriptions will be valid for the rest of the subscription term. After that we are open to discussing grandfathered pricing. For organizations with 20 users the new prices are more than 3 times more affordable. If the new price is better for your organization you can switch to them and we will credit you for the amount you would have saved if you ordered the new price from the beginning of your subscription. We make this offer to show how glad we are that you are already supporting GitLab.&lt;&#x2F;p&gt;

&lt;p&gt;If you were already considering getting a subscription for a large organization the old prices might be lower. During the rest of August it will be possible to order at the old fixed yearly price of $1490,-. It is also possible to request a quotes at this price that will be valid for 60 days.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab is used in a lot of universities and we want to offer affordable support to them too. Therefore any educational institution can get a 50% discount on our new prices.&lt;&#x2F;p&gt;

&lt;p&gt;We also would like to thank the people who donated to GitLab again. Everyone will get a credit towards GitLab Enterprise of 10 times the amount they donated. Please contact support to claim your credit. From now on we will no longer accept donations but rely on subscriptions to support our full-time developers. If you want to support GitLab please convince someone to buy a subscription or help out on the issue tracker.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;GitLab.com&lt;&#x2F;a&gt;  is our &#x27;GitLab as a Service&#x27; and it runs on GitLab CE. It serves as a great way to make people part of the GitLab community. Therefore we want as many people as possible to enjoy it and we have decided to make it completely free. We&#x27;ll completely reimbursed anyone who made a payment for GitLab Cloud. We hope you&#x27;ll enjoy the unlimited private repositories and unlimited collaborators on GitLab Cloud.&lt;&#x2F;p&gt;

&lt;p&gt;GitLab is only possible because of the rest of the GitLab community and we want to thank everyone. We would especially like to thank that Most Valuable Person (MVP) for the GitLab 6.0 release, Izaak Alpert, for contributing the merging between repos functionality.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 6.0 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/08/20/gitlab-6-dot-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/08/20/gitlab-6-dot-0-released/</id>
<published>2013-08-20T19:30:00+00:00</published>
<updated>2013-08-20T19:30:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-60-released&quot;&gt;GitLab 6.0 released!&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we present a new major GitLab version. There are a lot of improvements to make GitLab even more awesome.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;signin.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;first-and-foremost-are-the-improved-groups&quot;&gt;First and foremost are the improved groups.&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;group_members.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;From now on a group is not just a directory for projects. It also allows you to add users. After user is added to group - it automatically get access to all existing and new projects inside group. 
You can also have multiple owners for a group who can manage members&#x2F;projects. With this GitLab becomes more group oriented. That is why we no longer support global namespaces. Project can be part of group or user only.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;merge-requests-are-now-possible-between-a-fork-and-the-original-project&quot;&gt;Merge requests are now possible between a fork and the original project.&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;mr_on_fork_edit.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;mr_on_fork.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Another nice improvement comes from contributor &lt;strong&gt;Izaak Alpert&lt;&#x2F;strong&gt;. 
It allows you to use different workflow depending on your needs.&lt;&#x2F;p&gt;

&lt;p&gt;Still we have more things to present.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;now-you-can-create-or-remove-both-git-branches-and-tags-with-the-gitlab-ui&quot;&gt;Now you can create or remove both git branches and tags with the GitLab UI.&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;branches.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;create-tags.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;It gives you ability to work with the web ui only. For example to create branch, fix something with the web editor and submit a Merge Request.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;also-we-polished-our-ui-and-made-a-lot-of-bug-fixes&quot;&gt;Also we polished our UI and made a lot of bug fixes.&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;6_0&#x2F;Dashboard.png&quot; alt=&quot;gitlab&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Under the hood we refactored a lot of stuff and improved the performance. 
And one last piece of good news. The upgrade to 6.0 is not so complicated as it used to be for major versions. The only big change is that all projects must be part of a group or user. A bit of preparations, few commands - and you are running GitLab 6.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h4 id=&quot;gitlab-60-will-be-the-first-release-that-will-also-be-available-in-an-enterprise-edition-for-more-information-please-see-the-gitlabcom-blog&quot;&gt;GitLab 6.0 will be the first release that will also be available in an Enterprise Edition, for more information please see &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;2013&#x2F;08&#x2F;22&#x2F;introducing-gitlab-6-0-enterprise-edition&#x2F;&quot;&gt;the GitLab.com Blog&lt;&#x2F;a&gt;&lt;&#x2F;h4&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;For new setup follow &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;6-0-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself? GitLab.com offers &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;upgrade consulting services&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;support subscriptions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 5.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/07/22/gitlab-5-dot-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/07/22/gitlab-5-dot-4-released/</id>
<published>2013-07-22T14:21:00+00:00</published>
<updated>2013-07-22T14:21:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-54-released&quot;&gt;GitLab 5.4 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we release GitLab v5.4. There are not many new features because we are getting close to GitLab v6.0 (to be released on August 22). Nevertheless we hope you will enjoy the tracking of participants in Issues, email notifications for mentions and the ability to edit comments!&lt;&#x2F;p&gt;

&lt;h3 id=&quot;the-3-most-important-improvements-in-gitlab-54&quot;&gt;The 3 most important improvements in GitLab 5.4&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Edit Comments&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Show Issue Participants&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_4&#x2F;edit_and_participants.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_4&#x2F;edit_and_participants.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;Notifications for mentioned users&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This release&#x27;s most valuable person (MVP) is &lt;strong&gt;Javier Castro&lt;&#x2F;strong&gt; for contributing the issue participant notification feature. Thanks Javier!&lt;&#x2F;p&gt;



&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;

&lt;p&gt;New Features:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Ability to edit own comments&lt;&#x2F;li&gt;
  &lt;li&gt;Allow project imports via git:&#x2F;&#x2F; URLs&lt;&#x2F;li&gt;
  &lt;li&gt;Show participants on issues, including mentions&lt;&#x2F;li&gt;
  &lt;li&gt;Notify mentioned users with email&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Improvements:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Documentation improvements&lt;&#x2F;li&gt;
  &lt;li&gt;Improve dashboard projects page&lt;&#x2F;li&gt;
  &lt;li&gt;GitLab Markdown help page&lt;&#x2F;li&gt;
  &lt;li&gt;Increase snippet content column size&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Fixed:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fixed nav for empty repos&lt;&#x2F;li&gt;
  &lt;li&gt;Fix PostgreSQL database restoration problem&lt;&#x2F;li&gt;
  &lt;li&gt;Misspelling fixes&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;API:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Added client list to API doc&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Other:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Added support of unicorn and fog gems&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;This release should be an easy upgrade from 5.3. Please use the upgrade guide doc :)&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;For new setup follow &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;5-4-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself? GitLab.com offers &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;upgrade consulting services&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;support subscriptions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing GitLab 6.0 Enterprise Edition</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/07/22/announcing-gitlab-enterprise-edition/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/07/22/announcing-gitlab-enterprise-edition/</id>
<published>2013-07-22T13:01:00+00:00</published>
<updated>2013-07-22T13:01:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;announcing-gitlab-60-enterprise-edition&quot;&gt;Announcing GitLab 6.0 Enterprise Edition&lt;&#x2F;h3&gt;

&lt;p&gt;We are excited to announce that the GitLab 6.0 release on August 22 will come in two editions.
The normal GitLab version will be called GitLab 6.0 CE which stands for Community Edition.
There will also be a GitLab EE (Enterprise Edition) that is available only to &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;subscribers&lt;&#x2F;a&gt; of GitLab.com.&lt;&#x2F;p&gt;

&lt;p&gt;In the Enterprise Edition we will add features that are useful to large organizations.
Most features will continue to be included in both editions.
GitLab CE is useful for individuals and small and medium organizations.
Larger organizations can also use the Community Edition, or choose to pay a reasonable price for the additional features provided by the Enterprise Edition.&lt;&#x2F;p&gt;

&lt;p&gt;The income that we generate with the Enterprise Edition will help us fund the continued development of GitLab.
At GitLab.com we have people working on GitLab full-time and we want to keep giving all of you awesome new releases.&lt;&#x2F;p&gt;

&lt;p&gt;The community edition is the heart of GitLab and will remain under development, gaining new functionality in the coming years.
No features will ever removed from the Community Edition.
For example, the LDAP user functionality will stay in the Community edition.
In the enterprise edition functionality for larger organizations will be added.
In GitLab EE 6.0 this will be the ability to synchronize GitLab groups with LDAP groups.
Of course the community edition will always remain MIT licensed.&lt;&#x2F;p&gt;

&lt;p&gt;This is a big change and we hope to hear from you how you feel and what your concerns are.
GitLab.com tries to serve the needs of the GitLab community as best as we can and we are open to feedback.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Announcing GitLab CI 3.0</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/07/09/announcing-gitlab-ci-3-0/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/07/09/announcing-gitlab-ci-3-0/</id>
<published>2013-07-09T13:01:00+00:00</published>
<updated>2013-07-09T13:01:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;announcing-gitlab-ci-30&quot;&gt;Announcing GitLab CI 3.0&lt;&#x2F;h3&gt;

&lt;p&gt;We are excited to announce the &lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;gitlab&#x2F;status&#x2F;353214946978459648&quot;&gt;release&lt;&#x2F;a&gt; of GitLab CI 3.0, the latest version of our Continuous Integration system that connects with GitLab.
This is a major redesign, reflecting our recent &lt;a href=&quot;&#x2F;blog&#x2F;2013&#x2F;06&#x2F;20&#x2F;integrating-gitlab-ci-with-gitlab&#x2F;&quot;&gt;ideas of what a CI system should look like&lt;&#x2F;a&gt;: a flexible architecture for distributed, isolated builds.
GitLab CI 3.0 consists of two components: the &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&quot;&gt;coordinator&lt;&#x2F;a&gt; and its &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci-runner&quot;&gt;runners&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;



&lt;h3 id=&quot;the-coordinator&quot;&gt;The Coordinator&lt;&#x2F;h3&gt;
&lt;p&gt;The &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&quot;&gt;coordinator&lt;&#x2F;a&gt; is a Rack app that can run on the sames server as your GitLab installation.
It provides a status and management interface for all your builds.
The coordinator manages the build queues for all the projects you have registered with it and assigns the builds to individual runners.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_3_0&#x2F;gitlab_ci_3.0_overview.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_3_0&#x2F;gitlab_ci_3.0_overview.png&quot; alt=&quot;View builds for a CI project&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can associate multiple runners to one CI project.
This would allow you for example to have test suites running for two feature branches at the same time.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_3_0&#x2F;gitlab_ci_3.0_multiple_runners.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_3_0&#x2F;gitlab_ci_3.0_multiple_runners.png&quot; alt=&quot;Multiple runners for one CI project&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;You can also associate secondary CI projects to a single GitLab project. We use this to run the test suite for &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&quot;&gt;gitlabhq&lt;&#x2F;a&gt; on a machine running MySQL (the primary build) and on another one running PostgreSQL (the secondary build).&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;ci_3_0&#x2F;gitlab_ci_3.0_multiple_projects.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_3_0&#x2F;gitlab_ci_3.0_multiple_projects.png&quot; alt=&quot;Attach a CI project as a primary or secondary build&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;the-runners&quot;&gt;The Runners&lt;&#x2F;h3&gt;
&lt;p&gt;A &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci-runner&quot;&gt;runner&lt;&#x2F;a&gt; is a Ruby process that asks its coordinator for build jobs to perform.
You can host a runner on a dedicated build server, a VM, a spare laptop, etc.
One machine may host multiple runners.
For example, you could use two runners on the same machine to build release packages and publish the static company website.
On the other hand, runners can also be isolated.
For instance, a runner that will publish your website may need special credentials.
By isolating this runner in a trusted environment you can restrict access to the publishing credentials.
The runner only needs to have network access to its coordinator and to your GitLab installation.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;this-is-just-the-beginning&quot;&gt;This is just the beginning&lt;&#x2F;h3&gt;
&lt;p&gt;These are just a few of the possible uses and configurations of the new GitLab CI.
We look forward to hearing your stories!&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 5.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/06/20/gitlab-5-dot-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/06/20/gitlab-5-dot-3-released/</id>
<published>2013-06-20T09:28:00+00:00</published>
<updated>2013-06-20T09:28:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-53-released&quot;&gt;GitLab 5.3 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we release GitLab v5.3. We were mostly concentrated on bugs fixes and usability improvements in this version.
But we also added some new features like: Repository Graphs, Campfire&#x2F;HipChat services integration, Code Snippet for users etc.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;the-3-most-important-improvements-in-gitlab-53&quot;&gt;The 3 most important improvements in GitLab 5.3&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Repository Graph&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_3&#x2F;graph.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_3&#x2F;graph.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;HipChat&#x2F;Campfire Services integration with your projects&lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Code Snippets now available for personal use. Create own snippets. Share public snippets with your colleagues&lt;&#x2F;p&gt;

    &lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_3&#x2F;snippets.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_3&#x2F;snippets.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This release most valuable person (MVP) is &lt;strong&gt;Karlo Nicholas T. Soriano&lt;&#x2F;strong&gt; for contributing the Repository Graph feature, thanks Karlo!&lt;&#x2F;p&gt;



&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;

&lt;p&gt;New Features:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Repository Graph&lt;&#x2F;li&gt;
  &lt;li&gt;HipChat&#x2F;Campfire services integration&lt;&#x2F;li&gt;
  &lt;li&gt;Advanced snippets: public&#x2F;private, project&#x2F;personal&lt;&#x2F;li&gt;
  &lt;li&gt;Rename repository&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Security:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Generate the Rails secret token on first run&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Fixed:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Fixed bug with LDAP + git over http&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed bug with google analytics code being ignored&lt;&#x2F;li&gt;
  &lt;li&gt;Respect newlines in wall messages&lt;&#x2F;li&gt;
  &lt;li&gt;Fix project events duplicate on project page&lt;&#x2F;li&gt;
  &lt;li&gt;Fix postgres error when displaying network graph.&lt;&#x2F;li&gt;
  &lt;li&gt;Fix dashboard event filter when navigate via turbolinks&lt;&#x2F;li&gt;
  &lt;li&gt;Fix dashboard lost if comment on commit&lt;&#x2F;li&gt;
  &lt;li&gt;Fix bug with team assignation on project from #4109&lt;&#x2F;li&gt;
  &lt;li&gt;Init.d: remove gitlab.socket on service start&lt;&#x2F;li&gt;
  &lt;li&gt;Fixes issue with –depth option&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;API:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Api: Prevent blob content being escaped&lt;&#x2F;li&gt;
  &lt;li&gt;Api: added teams api&lt;&#x2F;li&gt;
  &lt;li&gt;Api: Smart deploy key add behaviour&lt;&#x2F;li&gt;
  &lt;li&gt;Api: projects&#x2F;owned.json return user owned project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;This release should be an easy upgrade from 5.2. Please use the upgrade guide doc :)&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;For new setup follow &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;5-3-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself? GitLab.com offers &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;upgrade consulting services&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;support subscriptions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;

&lt;p&gt;There is ongoing work to &lt;a href=&quot;&#x2F;blog&#x2F;2013&#x2F;06&#x2F;20&#x2F;integrating-gitlab-ci-with-gitlab&#x2F;&quot;&gt;integrate GitLab CI with GitLab to enable distributed builds&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 5.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/05/22/gitlab-5-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/05/22/gitlab-5-dot-2-released/</id>
<published>2013-05-22T13:04:00+00:00</published>
<updated>2013-05-22T13:04:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-52-released&quot;&gt;GitLab 5.2 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we release GitLab v5.2. We added forks, code search, turbolinks and much more awesome stuff.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;the-4-most-important-improvements-in-gitlab-52&quot;&gt;The 4 most important improvements in GitLab 5.2&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Forking. You can a fork project into its own namespace now.&lt;&#x2F;li&gt;
  &lt;li&gt;Code search. You search inside the project with a search bar on top panel.&lt;&#x2F;li&gt;
  &lt;li&gt;Turbolinks. GitLab is much faster because almost all requests does not reload the page.&lt;&#x2F;li&gt;
  &lt;li&gt;Shared deploy keys. You can use a deploy key for as many projects as you need and one project can use multiple keys.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This release most valuable person (MVP) is &lt;strong&gt;Angus MacArthur&lt;&#x2F;strong&gt; for contributing the forking feature, thanks Angus!&lt;&#x2F;p&gt;



&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;

&lt;p&gt;New Features:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Forks&lt;&#x2F;li&gt;
  &lt;li&gt;Code search&lt;&#x2F;li&gt;
  &lt;li&gt;Turbolinks&lt;&#x2F;li&gt;
  &lt;li&gt;Shared Deploy keys&lt;&#x2F;li&gt;
  &lt;li&gt;Advanced gfm autocomplete&lt;&#x2F;li&gt;
  &lt;li&gt;Extra customization (google analytics, custom text on sign in page)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Security:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Public projects are more accessible for authenticated users(issues, merge requests)&lt;&#x2F;li&gt;
  &lt;li&gt;You can push to git-http with ldap credentials&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Fixed:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Git submodules listing under Files tab&lt;&#x2F;li&gt;
  &lt;li&gt;Commit page error if there is a huge diff&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;This release should be an easy upgrade from 5.1. Please use the upgrade guide doc :)&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;screenshots&quot;&gt;SCREENSHOTS&lt;&#x2F;h3&gt;

&lt;p&gt;Fork:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_2&#x2F;fork.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_2&#x2F;fork.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Search:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_2&#x2F;search_1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_2&#x2F;search_1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Advanced autocomplete:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_2&#x2F;snapshot1.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_2&#x2F;snapshot1.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;For new setup follow &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;5-2-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;update&#x2F;&quot;&gt;Update Guide&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself? GitLab.com offers &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;upgrade consulting services&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;support subscriptions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Gitlab 5.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/04/22/gitlab-5-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/04/22/gitlab-5-dot-1-released/</id>
<published>2013-04-22T11:11:00+00:00</published>
<updated>2013-04-22T11:11:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-51-released&quot;&gt;GitLab 5.1 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we release GitLab v5.1 live from &lt;a href=&quot;http:&#x2F;&#x2F;www.railsberry.com&#x2F;&quot;&gt;Railsberry&lt;&#x2F;a&gt; with 4 major improvements.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;the-4-most-important-improvements-in-gitlab-51&quot;&gt;The 4 most important improvements in GitLab 5.1&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Notification settings. You can choose from 3 levels of notifications for every project.&lt;&#x2F;li&gt;
  &lt;li&gt;Backup functionality was refactored. Now we backup attachments, write hooks in restored projects and update ssh permissions on restore.&lt;&#x2F;li&gt;
  &lt;li&gt;Network graph becomes even cooler. Now with vertical orientation, commit messages and much more.&lt;&#x2F;li&gt;
  &lt;li&gt;Improved performance and reduced memory consumption, among other things by switching the application server from Unicorn to Puma.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This release most valuable person (MVP) is Hiroyuki Sato for contributing the improved Network Graph, thanks Hiroyuki!&lt;&#x2F;p&gt;



&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;

&lt;p&gt;New Features:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Notification settings&lt;&#x2F;li&gt;
  &lt;li&gt;Login with username&lt;&#x2F;li&gt;
  &lt;li&gt;File history now tracks renames&lt;&#x2F;li&gt;
  &lt;li&gt;Show last commit on top of tree view&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Dependencies:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Unicorn replaced with &lt;a href=&quot;http:&#x2F;&#x2F;puma.io&#x2F;&quot;&gt;Puma&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Security:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Admin has access to all projects now&lt;&#x2F;li&gt;
  &lt;li&gt;Several fixes to prevent XSS&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Improved:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Dashboard performance&lt;&#x2F;li&gt;
  &lt;li&gt;Merge Request diff dump&lt;&#x2F;li&gt;
  &lt;li&gt;Backup tools&lt;&#x2F;li&gt;
  &lt;li&gt;Project transfer&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Miscellaneous
Usability &amp;amp; UI improvements and more.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;important-upgrade-note&quot;&gt;Important upgrade note&lt;&#x2F;h3&gt;

&lt;p&gt;We&#x27;ve fixed some bugs in the diff view for merge requests.
Merge requests that were closed before the upgrade will display &quot;Nothing to merge&quot; after the upgrade.
This can&#x27;t be prevented, please make sure you don&#x27;t need to revisit any closed merge requests before upgrading. Open merge requests are not affected, they will display the correct diff view.&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;links&quot;&gt;Links&lt;&#x2F;h3&gt;

&lt;p&gt;For new setup follow &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;5-1-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Setup Guide&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;For update instructions see &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;5-1-stable&#x2F;doc&#x2F;update&#x2F;5.0-to-5.1.md&quot;&gt;Update Guide&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;No time to upgrade or maintain Gitlab yourself? GitLab.com offers &lt;a href=&quot;http:&#x2F;&#x2F;www.gitlab.com&#x2F;consultancy&#x2F;&quot;&gt;upgrade consulting services&lt;&#x2F;a&gt; and &lt;a href=&quot;&#x2F;pricing&#x2F;&quot;&gt;support subscriptions&lt;&#x2F;a&gt;.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 2.2 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/04/09/gitlab-ci-2-dot-2-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/04/09/gitlab-ci-2-dot-2-released/</id>
<published>2013-04-09T16:56:00+00:00</published>
<updated>2013-04-09T16:56:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ci-version-22-released&quot;&gt;GitLab CI version 2.2 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we released new version of GitLab CI. 
We fixed some bugs, updated libraries to recent versions and made some ui improvements.&lt;&#x2F;p&gt;

&lt;p&gt;We strongly recommend to update since this release include security fixes from rails &amp;amp; devise.
Also it should save you additional 50-100MB RAM by replacing unicorn with puma.&lt;&#x2F;p&gt;



&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_2_2&#x2F;gitlab_ci_2_2.png&quot; alt=&quot;Screenshot&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changelog&quot;&gt;CHANGELOG&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;updated rails to 3.2.13&lt;&#x2F;li&gt;
  &lt;li&gt;updated bunch of gems&lt;&#x2F;li&gt;
  &lt;li&gt;added gravatar support&lt;&#x2F;li&gt;
  &lt;li&gt;increased test coverage (85% now)&lt;&#x2F;li&gt;
  &lt;li&gt;fixed bug with timeout in builds&lt;&#x2F;li&gt;
  &lt;li&gt;fixed issue when build left in running status if exception triggered&lt;&#x2F;li&gt;
  &lt;li&gt;build runner is more transactional safe now&lt;&#x2F;li&gt;
  &lt;li&gt;replaced unicorn(web server) with puma&lt;&#x2F;li&gt;
  &lt;li&gt;fixed issue with saving user profile changes&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;update-from-21&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;wiki&#x2F;Migrate-from-2.1-to-2.2&quot;&gt;Update from 2.1&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;

&lt;h3 id=&quot;setup&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;blob&#x2F;2-2-stable&#x2F;doc&#x2F;installation.md&quot;&gt;Setup&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 5.0 release, standing on its own two feet</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/03/22/gitlab-5-dot-0-has-been-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/03/22/gitlab-5-dot-0-has-been-released/</id>
<published>2013-03-22T12:02:00+00:00</published>
<updated>2013-03-22T12:02:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-50-release-standing-on-its-own-two-feet&quot;&gt;GitLab 5.0 release, standing on its own two feet&lt;&#x2F;h3&gt;

&lt;p&gt;Dear fellow GitLab enthusiasts,&lt;&#x2F;p&gt;

&lt;p&gt;Today marks the release of GitLab v5.0. In the last month a lot of work went into making GitLab faster, fully-featured and stable. And we have a lot of awesome changes to celebrate in this release. From now own GitLab is standing firmly on its own two feet with the introduction of GitLab shell.&lt;&#x2F;p&gt;



&lt;p&gt;GitLab is quickly maturing due to commercial support and cloud hosting. Since co-founding GitLab.com Dmitriy has been able to work on GitLab full-time, this means this release has more new features and better tests than ever. The GitLab Cloud service run by GitLab.com has grown to thousands of active users. This meant we had to improve GitLab performance and concurrency and these improvements all made their way into GitLab 5.0.&lt;&#x2F;p&gt;

&lt;p&gt;Before today every GitLab installation also meant installing Gitolite. Gitolite is a fine program but having the server standing on a GitLab foot and a Gitolite foot caused problems. Installing them and keeping the configurations in sync was a constant source of problems for many administrators of GitLab installation. Today Gitolite is replaced with GitLab-shell which will make installing and maintaining GitLab a lot easier.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;the-3-most-important-improvements-in-gitlab-50&quot;&gt;The 3 most important improvements in GitLab 5.0&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;GitLab-shell replaces Gitolite&lt;&#x2F;li&gt;
  &lt;li&gt;Instead of needing &lt;strong&gt;gitlab&lt;&#x2F;strong&gt; &amp;amp; &lt;strong&gt;git&lt;&#x2F;strong&gt; users accounts on the system we now only need &lt;strong&gt;git&lt;&#x2F;strong&gt; user to run GitLab&lt;&#x2F;li&gt;
  &lt;li&gt;The wiki is stored in a git repository using the gollum library.&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;The wiki git repository was &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;pull&#x2F;3183&quot;&gt;contributed&lt;&#x2F;a&gt; by Dan Knox. We want to thank him for the great contribution and name him the Most Valuable Person (MVP) for this release.&lt;&#x2F;p&gt;

&lt;p&gt;At GitLab.com we are seeing that more organizations are interested in our &lt;a href=&quot;http:&#x2F;&#x2F;blog.gitlab.com&#x2F;subscription&#x2F;&quot;&gt;subscription service&lt;&#x2F;a&gt;. The cooperation with these organizations will lead to some cool new features for GitLab 5.1 and beyond.&lt;&#x2F;p&gt;

&lt;p&gt;We tried hard to make this major upgrade as easy as possible. Even before this release &lt;a href=&quot;http:&#x2F;&#x2F;rubygems.org&#x2F;gems&#x2F;gitlab_meta&#x2F;versions&#x2F;5.0&quot;&gt;more than 3.000 installations&lt;&#x2F;a&gt; where already upgraded to 5.0.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changes&quot;&gt;Changes&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Features:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;Import repository&lt;&#x2F;li&gt;
      &lt;li&gt;Wiki on git using Gollum&lt;&#x2F;li&gt;
      &lt;li&gt;Project, Group and Team description added&lt;&#x2F;li&gt;
      &lt;li&gt;External issue tracker support&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Dependencies:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;Gitolite replaced with gitlab-shell&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Security:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;Use protected links for attachments&lt;&#x2F;li&gt;
      &lt;li&gt;Rails, devise and other libraries updated&lt;&#x2F;li&gt;
      &lt;li&gt;Several fixes to prevent XSS&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;Also a lot of usability &amp;amp; UI improvements and much more.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;what-we-removed-in-50&quot;&gt;What we removed in 5.0:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;gitolite support&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;what-should-be-updated-during-migration&quot;&gt;What should be updated during migration:&lt;&#x2F;h3&gt;

&lt;p&gt;Beside moving all stuff from &lt;strong&gt;gitlab&lt;&#x2F;strong&gt; to &lt;strong&gt;git&lt;&#x2F;strong&gt; user you also need to update next:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;gitlab.yml config&lt;&#x2F;li&gt;
  &lt;li&gt;init.d script&lt;&#x2F;li&gt;
  &lt;li&gt;nginx: replace home&#x2F;gitlab with home&#x2F;git&lt;&#x2F;li&gt;
  &lt;li&gt;config&#x2F;unicorn.rb: replace home&#x2F;gitlab with home&#x2F;git&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;screenshots&quot;&gt;SCREENSHOTS&lt;&#x2F;h3&gt;
&lt;p&gt;Dashboard:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_0&#x2F;dashboard.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_0&#x2F;dashboard.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Import repo:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_0&#x2F;import.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_0&#x2F;import.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Project page:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_0&#x2F;project_page.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_0&#x2F;project_page.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Wall behaves like chat now:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_0&#x2F;wall.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_0&#x2F;wall.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Network Graph was improved too:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_0&#x2F;network.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_0&#x2F;network.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;One more theme for code review:&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;images&#x2F;5_0&#x2F;solarized.png&quot;&gt;&lt;img src=&quot;&#x2F;images&#x2F;5_0&#x2F;solarized.png&quot; alt=&quot;screenshot&quot; &#x2F;&gt;&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;guides&quot;&gt;Guides:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-4.2-to-5.0&quot;&gt;Update from 4.2&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;5-0-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;New Setup&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 5.0 was released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/03/22/gitlab-5-0-was-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/03/22/gitlab-5-0-was-released/</id>
<published>2013-03-22T00:00:00+00:00</published>
<updated>2013-03-22T00:00:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Today GitLab 5.0 was released. The &lt;a href=&quot;http:&#x2F;&#x2F;blog.gitlab.org&#x2F;gitlab-5-dot-0-has-been-released&#x2F;&quot;&gt;release announcement &lt;&#x2F;a&gt; has all the details. A lot of the improvements in GitLab where needed for GitLab.com Cloud. These performance and concurrency improvements all made their way into GitLab 5.0. GitLab.com is already running GitLab 5.0 beta and will be upgraded to stable this Sunday.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI version 2.1 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/03/13/gitlab-ci-version-2-dot-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/03/13/gitlab-ci-version-2-dot-1-released/</id>
<published>2013-03-13T15:05:00+00:00</published>
<updated>2013-03-13T15:05:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ci-version-21-released&quot;&gt;GitLab CI version 2.1 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we released new version of GitLab CI. 
We fixed some bugs, added new build status badges and some&lt;&#x2F;p&gt;



&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_2_1&#x2F;gitlab_ci_2_1_stat.png&quot; alt=&quot;Screenshot&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changelog&quot;&gt;CHANGELOG&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;Features:
    &lt;ul&gt;
      &lt;li&gt;Stats page&lt;&#x2F;li&gt;
      &lt;li&gt;Public projects&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Security&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;updated rails to 3.2.12&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Fixes and improvements&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;Removed horizontal scroll for build trace&lt;&#x2F;li&gt;
      &lt;li&gt;new status badges&lt;&#x2F;li&gt;
      &lt;li&gt;Fixed some encoding issues&lt;&#x2F;li&gt;
      &lt;li&gt;added several CI_* env variables&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;update-from-20&quot;&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;wiki&#x2F;Migrate-from-2.0-to-2.1&quot;&gt;Update from 2.0&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;

&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab v4.2 has been released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/02/21/gitlab-v4-dot-2-has-been-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/02/21/gitlab-v4-dot-2-has-been-released/</id>
<published>2013-02-21T16:45:00+00:00</published>
<updated>2013-02-21T16:45:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-42-has-been-released&quot;&gt;GITLAB 4.2 has been released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we released GitLab v4.2&lt;&#x2F;p&gt;

&lt;p&gt;We improved performance, fixed some bugs, added teams, users pages and more&lt;&#x2F;p&gt;



&lt;h3 id=&quot;changelog&quot;&gt;CHANGELOG&lt;&#x2F;h3&gt;

&lt;ol&gt;
  &lt;li&gt;
    &lt;p&gt;Features:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;Teams&lt;&#x2F;li&gt;
      &lt;li&gt;User show page. Via &#x2F;u&#x2F;username&lt;&#x2F;li&gt;
      &lt;li&gt;Projects page. At &#x2F;dashboard&#x2F;projects&lt;&#x2F;li&gt;
      &lt;li&gt;Group edit page for non-admins&lt;&#x2F;li&gt;
      &lt;li&gt;Switchable base branch for network graph&lt;&#x2F;li&gt;
      &lt;li&gt;Groups API added&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Performance:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;Async gitolite calls&lt;&#x2F;li&gt;
      &lt;li&gt;Process webhooks async&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Permissions:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;User can create group or team even if he is not admin.&lt;&#x2F;li&gt;
      &lt;li&gt;Admin can allow&#x2F;deny team or group creation for any user.&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
  &lt;li&gt;
    &lt;p&gt;Misc:&lt;&#x2F;p&gt;

    &lt;ul&gt;
      &lt;li&gt;added satellites logs&lt;&#x2F;li&gt;
      &lt;li&gt;GFM: Fix images escaped inside links&lt;&#x2F;li&gt;
      &lt;li&gt;Fixed project download&lt;&#x2F;li&gt;
      &lt;li&gt;Show help contents on help pages for better navigation&lt;&#x2F;li&gt;
    &lt;&#x2F;ul&gt;
  &lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h3 id=&quot;screenshots&quot;&gt;SCREENSHOTS&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_2&#x2F;dashboard.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_2&#x2F;group_edit.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_2&#x2F;new_team.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_2&#x2F;team_page.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_2&#x2F;profile.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_2&#x2F;projects.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;guides-update-from-41--new-setup&quot;&gt;Guides: &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-4.1-to-4.2&quot;&gt;Update from 4.1&lt;&#x2F;a&gt;,  &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;4-2-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;New Setup&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 4.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/01/22/gitlab-4-1-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/01/22/gitlab-4-1-released/</id>
<published>2013-01-22T17:20:00+00:00</published>
<updated>2013-01-22T17:20:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-41-released&quot;&gt;GITLAB 4.1 Released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we released GitLab v4.1.0.&lt;&#x2F;p&gt;

&lt;p&gt;We improved performance, fixed some bugs, added public repos and more&lt;&#x2F;p&gt;



&lt;h3 id=&quot;good-news&quot;&gt;Good news&lt;&#x2F;h3&gt;

&lt;p&gt;We have some very good news to share. From today onwards, &lt;strong&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;randx&quot;&gt;Dmitriy Zaporozhets&lt;&#x2F;a&gt; will work on GitLab development full time!&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;In the last year, GitLab has grown from a small project to a grown-up solution.
Right now, more than 10.000 organizations have upgraded to GitLab 4.0! &lt;a href=&quot;http:&#x2F;&#x2F;rubygems.org&#x2F;gems&#x2F;gitlab_meta&quot;&gt;link&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Dmitriy wants to give GitLab his full attention and continue giving the community great features each month. 
To do this, we will need your help. If you like GitLab and want to help with the development, please make a donation. &lt;a href=&quot;http:&#x2F;&#x2F;gitlab.org&#x2F;donate&#x2F;&quot;&gt;Donation page&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;replaced-resque-with-sidekiq&quot;&gt;Replaced Resque with Sidekiq:&lt;&#x2F;h3&gt;

&lt;p&gt;We replaced Resque with Sidekiq to process background jobs. 
Sidekiq uses threads instead of forks so it is much more efficient with memory compared to Resque.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;discussions&quot;&gt;Discussions:&lt;&#x2F;h3&gt;

&lt;p&gt;We improved comments system, especially for merge requests. You see it shows a code related to comments&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_1&#x2F;discussion.png&quot; alt=&quot;discussion&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;optional-signup&quot;&gt;Optional SignUp:&lt;&#x2F;h3&gt;

&lt;p&gt;You can enable signup page.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_1&#x2F;signup.png&quot; alt=&quot;signup&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;public-mode&quot;&gt;Public mode:&lt;&#x2F;h3&gt;

&lt;p&gt;GitLab allows you to open selected projects to be accessed publicly.
These projects will be clonable without any authentication.
Also they will be listed on the public access directory&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_1&#x2F;public_dir.png&quot; alt=&quot;signup&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;remember-dashboard-filter-in-cookies&quot;&gt;Remember dashboard filter in cookies:&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_1&#x2F;dashboard.png&quot; alt=&quot;dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;line-numbers-for-git-blame&quot;&gt;Line numbers for git blame:&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_1&#x2F;line-numbers-blame.png&quot; alt=&quot;dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;show-line-diff-stats&quot;&gt;Show line diff stats:&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;4_1&#x2F;gitlab-line-diff.png&quot; alt=&quot;dashboard&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;changelog&quot;&gt;CHANGELOG&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Optional Sign-Up&lt;&#x2F;li&gt;
  &lt;li&gt;Discussions&lt;&#x2F;li&gt;
  &lt;li&gt;Satellites outside of tmp&lt;&#x2F;li&gt;
  &lt;li&gt;Line numbers for blame&lt;&#x2F;li&gt;
  &lt;li&gt;Project public mode&lt;&#x2F;li&gt;
  &lt;li&gt;Public area with unauthorized access&lt;&#x2F;li&gt;
  &lt;li&gt;Load dashboard events with ajax&lt;&#x2F;li&gt;
  &lt;li&gt;Remember dashboard filter in cookies&lt;&#x2F;li&gt;
  &lt;li&gt;Replace resque with sidekiq&lt;&#x2F;li&gt;
  &lt;li&gt;Fix routing issues&lt;&#x2F;li&gt;
  &lt;li&gt;Cleanup rake tasks&lt;&#x2F;li&gt;
  &lt;li&gt;Fix backup&#x2F;restore&lt;&#x2F;li&gt;
  &lt;li&gt;Show preview for note images&lt;&#x2F;li&gt;
  &lt;li&gt;Improved network-graph&lt;&#x2F;li&gt;
  &lt;li&gt;Reduce amount of gitolite calls&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to add user in all group projects&lt;&#x2F;li&gt;
  &lt;li&gt;Remove deprecated configs&lt;&#x2F;li&gt;
  &lt;li&gt;Replaced Korolev font with open font&lt;&#x2F;li&gt;
  &lt;li&gt;Restyled admin&#x2F;dashboard page&lt;&#x2F;li&gt;
  &lt;li&gt;Restyled admin&#x2F;projects page&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;h3 id=&quot;guides-update-from-40--new-setup&quot;&gt;Guides: &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-4.0-to-4.1&quot;&gt;Update from 4.0&lt;&#x2F;a&gt;,  &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;4-1-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;New Setup&lt;&#x2F;a&gt;&lt;&#x2F;h3&gt;
&lt;hr &#x2F;&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab CI 2.0 and other news</title>
<release></release>
<link href='https://about.gitlab.com/releases/2013/01/17/gitlab-ci-2-0/' rel='alternate' />
<id>https://about.gitlab.com/releases/2013/01/17/gitlab-ci-2-0/</id>
<published>2013-01-17T16:20:00+00:00</published>
<updated>2013-01-17T16:20:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-ci-20-and-other-news&quot;&gt;GITLAB CI 2.0 and other news&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today we released new version of GitLab CI.&lt;&#x2F;p&gt;

&lt;p&gt;The most significant change is replacing library for background jobs.
So now instead &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;defunkt&#x2F;resque&quot;&gt;resque&lt;&#x2F;a&gt; we use &lt;strong&gt;&lt;a href=&quot;http:&#x2F;&#x2F;sidekiq.org&#x2F;&quot;&gt;sidekiq&lt;&#x2F;a&gt;&lt;&#x2F;strong&gt;.&lt;&#x2F;p&gt;



&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_2_0&#x2F;sidekiq.png&quot; alt=&quot;Screenshot&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_2_0&#x2F;GitLab-ci-1.png&quot; alt=&quot;Screenshot&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;ci_2_0&#x2F;GitLab-CI-2.png&quot; alt=&quot;Screenshot&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;running-builds&quot;&gt;Running builds:&lt;&#x2F;h3&gt;

&lt;p&gt;Earlier you have one resque worker which run one build at time.
Even if you has 3 projects - only one is running at same time.&lt;&#x2F;p&gt;

&lt;p&gt;With migration to sidekiq we changed logic a bit. 
So now application can run one build per project simultaneously.&lt;&#x2F;p&gt;

&lt;p&gt;If you have more then one projects running with GitLab CI - it will save you a lot of time.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;scheduled-builds&quot;&gt;Scheduled builds:&lt;&#x2F;h3&gt;

&lt;p&gt;Now scheduled builds are triggered by cron task. 
This task starts every hour and check for scheduled builds.&lt;&#x2F;p&gt;

&lt;h3 id=&quot;links&quot;&gt;Links:&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;wiki&#x2F;Migrate-from-1.x-to-2.0&quot;&gt;Update from 1.x to 2.0&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-ci&#x2F;blob&#x2F;2-0-stable&#x2F;doc&#x2F;installation.md&quot;&gt;Setup GitLab CI&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;other-news&quot;&gt;Other news:&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;strong&gt;GitLab v4.1 will be released at Jan 22th.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;We replaced resque with sidekiq in GitLab too. Now push events are processed much faster.
Also we added a Public Area, fixed a lot of bugs and improved performance of application.&lt;&#x2F;p&gt;

&lt;p&gt;According to &lt;a href=&quot;http:&#x2F;&#x2F;rubygems.org&#x2F;gems&#x2F;gitlab_meta&quot;&gt;gitlab_meta&lt;&#x2F;a&gt; gem amount of GitLab v4.0 installations reached  9k. 
It a really good news for us. Thank you for using our software.&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 4.0 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/12/23/gitlab-4-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/12/23/gitlab-4-release/</id>
<published>2012-12-23T14:20:00+00:00</published>
<updated>2012-12-23T14:20:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-40-released&quot;&gt;GITLAB 4.0 released&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Finally we released GITLAB v4.0.0!&lt;&#x2F;p&gt;

&lt;p&gt;There are a lot of changes so we introduce you to the important one&lt;&#x2F;p&gt;



&lt;h3 id=&quot;application-behaviour-changes&quot;&gt;Application behaviour changes:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;New projects will be namespaced (ex. gitlab&#x2F;vagrant )&lt;&#x2F;li&gt;
  &lt;li&gt;Every group got own directory in gitolite&lt;&#x2F;li&gt;
  &lt;li&gt;All projects of group will be moved under group directory ( git remote should be updated )&lt;&#x2F;li&gt;
  &lt;li&gt;Projects w&#x2F;o groups will stay with same remote&lt;&#x2F;li&gt;
  &lt;li&gt;User got username ( For existing users it will be generated based on email )&lt;&#x2F;li&gt;
  &lt;li&gt;User create project under his username ( ex. randx&#x2F;my-project )&lt;&#x2F;li&gt;
  &lt;li&gt;User can change username. All projects under his username will be moved&lt;&#x2F;li&gt;
  &lt;li&gt;Group got owner&lt;&#x2F;li&gt;
  &lt;li&gt;Owner can create projects within group&lt;&#x2F;li&gt;
  &lt;li&gt;Owner can access every project within a group&lt;&#x2F;li&gt;
  &lt;li&gt;Admin can transfer any project from one namespace(group, user, global) to another&lt;&#x2F;li&gt;
  &lt;li&gt;Group or user is a namespace for project. Owner of namespace is an owner of project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;other-changes&quot;&gt;Other changes&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Better PostgreSQL support&lt;&#x2F;li&gt;
  &lt;li&gt;Added email notification on project move&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed email notification on issue close&#x2F;reopen&lt;&#x2F;li&gt;
  &lt;li&gt;Reorganized settings&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed commits compare&lt;&#x2F;li&gt;
  &lt;li&gt;Update the UI to allow downloading Patch or Diff for Commit, MR&lt;&#x2F;li&gt;
  &lt;li&gt;Milestones can be closed now. Milestone stays open unless you close it&lt;&#x2F;li&gt;
  &lt;li&gt;Show comment events on dashboard&lt;&#x2F;li&gt;
  &lt;li&gt;Quick add team members via group#people page&lt;&#x2F;li&gt;
  &lt;li&gt;UI improvements&lt;&#x2F;li&gt;
  &lt;li&gt;In admin area projects, users and groups sorted alphabetically&lt;&#x2F;li&gt;
  &lt;li&gt;Issue management page on dashboard improved&lt;&#x2F;li&gt;
  &lt;li&gt;Better integration with GitLab CI ( requires GitLab CI  v1.1.1 )&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;what-we-removed-in-40&quot;&gt;What we removed in 4.0:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;gitolite 2 support&lt;&#x2F;li&gt;
  &lt;li&gt;SQLite support (I like it but this database got locked when several users use gitlab at once)&lt;&#x2F;li&gt;
  &lt;li&gt;API v2 support (its simply incompatible with namespaced projects)&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;what-should-be-updated-during-migration&quot;&gt;What should be updated during migration:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;gitlab.yml config&lt;&#x2F;li&gt;
  &lt;li&gt;gitolite post-receive hooks&lt;&#x2F;li&gt;
  &lt;li&gt;permissions on &#x2F;home&#x2F;git&#x2F;repositories&#x2F;&lt;&#x2F;li&gt;
  &lt;li&gt;python2 symlink&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h2 id=&quot;screenshots&quot;&gt;Screenshots:&lt;&#x2F;h2&gt;
&lt;p&gt;Dashboard: 
&lt;img src=&quot;&#x2F;images&#x2F;4_0&#x2F;gitlab_dash.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
Merge Request with CI status
&lt;img src=&quot;&#x2F;images&#x2F;4_0&#x2F;gitlab_project_mr.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
Files browsing
&lt;img src=&quot;&#x2F;images&#x2F;4_0&#x2F;gitlab_project_tree.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
Issues
&lt;img src=&quot;&#x2F;images&#x2F;4_0&#x2F;gitlab_project_issues.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h3 id=&quot;how-to-reinstall-gitolite-with-new-version&quot;&gt;How to reinstall gitolite with new version&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;Reinstall-gitolite&quot;&gt;Reinstall gitolite&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;how-to-migrate-from-sqlite&quot;&gt;How to migrate from sqlite&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;Migrate-from-SQLite-to-MySQL&quot;&gt;Follow this guide&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;how-to-install-gitlab-v400&quot;&gt;How to install GitLab v4.0.0&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;4-0-stable&#x2F;doc&#x2F;install&#x2F;installation.md&quot;&gt;Complete Installation guide (Recommended)&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlab-recipes&#x2F;tree&#x2F;master&#x2F;install&#x2F;v4&quot;&gt;One-script installer for ubuntu 12.04 x64&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;how-to-update-a-gitlab-to-v400&quot;&gt;How to update a GitLab to v4.0.0&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-3.1-to-4.0&quot;&gt;Update guide for v3.1&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-3.0-to-4.0&quot;&gt;Update guide for v3.0&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 4.0 release details and schedule</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/12/20/gitlab-4-release-schedule/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/12/20/gitlab-4-release-schedule/</id>
<published>2012-12-20T19:20:00+00:00</published>
<updated>2012-12-20T19:20:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;some-details-of-upcoming-gitlab-40-and-release-date&quot;&gt;Some details of upcoming GitLab 4.0 and release date&lt;&#x2F;h3&gt;

&lt;h3 id=&quot;release-schedule&quot;&gt;Release schedule:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Dec 21..22 - we test 4.0 release candidate&lt;&#x2F;li&gt;
  &lt;li&gt;Dec 22..23 - we will merge master into stable&lt;&#x2F;li&gt;
  &lt;li&gt;Dec 23 - Installation docs is ready. 4.0 is ready for fresh install&lt;&#x2F;li&gt;
  &lt;li&gt;Dec 24 - Updating docs. You will be able to migrate your GitLab instances to 4.0&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;



&lt;h3 id=&quot;important-changes&quot;&gt;Important changes:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;New projects will be namespaced (ex. gitlab&#x2F;vagrant )&lt;&#x2F;li&gt;
  &lt;li&gt;Every group got own directory in gitolite&lt;&#x2F;li&gt;
  &lt;li&gt;All projects of group will be moved under group directory ( git remote should be updated )&lt;&#x2F;li&gt;
  &lt;li&gt;Projects w&#x2F;o groups will stay with same remote&lt;&#x2F;li&gt;
  &lt;li&gt;User got username ( For existing users it will be generated based on email )&lt;&#x2F;li&gt;
  &lt;li&gt;User create project under his username ( ex. randx&#x2F;my-project )&lt;&#x2F;li&gt;
  &lt;li&gt;User can change username. All projects under his username will be moved&lt;&#x2F;li&gt;
  &lt;li&gt;Group got owner&lt;&#x2F;li&gt;
  &lt;li&gt;Owner can create projects within group&lt;&#x2F;li&gt;
  &lt;li&gt;Owner can access every project within a group&lt;&#x2F;li&gt;
  &lt;li&gt;Admin can transfer any project from one namespace(group, user, global) to another&lt;&#x2F;li&gt;
  &lt;li&gt;Group or user is a namespace for project. Owner of namespace is an owner of project&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h3 id=&quot;migration-notes&quot;&gt;Migration notes:&lt;&#x2F;h3&gt;

&lt;ul&gt;
  &lt;li&gt;Required: replace gitolite hooks&lt;&#x2F;li&gt;
  &lt;li&gt;Required: activate namespaces&lt;&#x2F;li&gt;
  &lt;li&gt;Required: update permissions on &#x2F;home&#x2F;git&#x2F;repositories&#x2F;&lt;&#x2F;li&gt;
  &lt;li&gt;Strongly recommended: replace gitlab.yml with new one&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Upgraded to Gitlab 3.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/12/14/upgraded-to-gitlab-3-1/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/12/14/upgraded-to-gitlab-3-1/</id>
<published>2012-12-14T00:00:00+00:00</published>
<updated>2012-12-14T00:00:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Gitlab.com now runs on Gitlab 3.1. Among other things it offers:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;A Web editor&lt;&#x2F;li&gt;
  &lt;li&gt;Improved File Browsing&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of commits is significantly improved&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Hope you enjoy it. Feedback is welcome via &lt;a href=&quot;https:&#x2F;&#x2F;support.gitlab.com&#x2F;&quot;&gt;support.gitlab.com&lt;&#x2F;a&gt; as always.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 3.1 and GitLab CI v1.0.1</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/11/22/gitlab-3-dot-1-release/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/11/22/gitlab-3-dot-1-release/</id>
<published>2012-11-22T15:20:00+00:00</published>
<updated>2012-11-22T15:20:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;todays-releases-gitlab-31-and-gitlab-ci-v101&quot;&gt;Today&#x27;s releases: GitLab 3.1 and GitLab CI v1.0.1&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today is 22th and it means we have released a new version of GitLab today.&lt;&#x2F;p&gt;

&lt;p&gt;Also as a bonus we pushed a v1.0.1 version of GitLab CI&lt;&#x2F;p&gt;



&lt;h2 id=&quot;few-screens&quot;&gt;Few screens:&lt;&#x2F;h2&gt;
&lt;p&gt;Event Filter
&lt;img src=&quot;&#x2F;images&#x2F;3_1&#x2F;1.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
GitLab CI integration for Merge Requests
&lt;img src=&quot;&#x2F;images&#x2F;3_1&#x2F;2.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
Better image compare diff
&lt;img src=&quot;&#x2F;images&#x2F;3_1&#x2F;3.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;links&quot;&gt;Links&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;blob&#x2F;v3.1.0&#x2F;CHANGELOG&quot;&gt;CHANGELOG&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-3.0-to-3.1&quot;&gt;Update from 3.0&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab 3</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/10/22/gitlab-3-dot-0-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/10/22/gitlab-3-dot-0-released/</id>
<published>2012-10-22T18:00:00+00:00</published>
<updated>2012-10-22T18:00:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-version-30-released&quot;&gt;GitLab version 3.0 released&lt;&#x2F;h3&gt;

&lt;p&gt;Good news everyone!&lt;&#x2F;p&gt;

&lt;p&gt;Today is 22th and it means we have a GitLab release today. It is our 13th release. Yippee!&lt;&#x2F;p&gt;

&lt;p&gt;Every month we give you a new version of GitLab and we will try to save this tradition. 
Also we will keep GitLab free and open source product in the future.&lt;&#x2F;p&gt;

&lt;p&gt;&lt;strong&gt;Special thanks to GitLab core team who contribute so much awesome code in GitLab.&lt;&#x2F;strong&gt;&lt;&#x2F;p&gt;

&lt;p&gt;Also thanks to GitLab co-author &amp;amp; core developer Valeriy Sizov. 
He helps me move forward even despite of all difficulties on our way.&lt;&#x2F;p&gt;


&lt;h3 id=&quot;few-quotes-from-core-devs&quot;&gt;Few quotes from core devs:&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;em&gt;Valeriy Sizov:&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;GitLab is developing by developers from different parts of the world. 
You can trust us - we fix critical issues in 24 hours&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;&lt;em&gt;Dmitriy Zaporozhets:&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;blockquote&gt;
  &lt;p&gt;I had a dream about high-quality FOSS product I can admire - my dream come true.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;&lt;em&gt;Valeriy Sizov:&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;blockquote&gt;
  &lt;p&gt;Our will is solid as rock. GitLab 3 is very cool but version 4 will be even better. 
GitLab is not an only software we are going to share with this world. 
We are developers and if miss something - we build it!&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;p&gt;&lt;em&gt;Dmitriy Zaporozhets:&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;

&lt;blockquote&gt;
  &lt;p&gt;We are going to build a best software. GitLab 3 is not an end - it is only a beginning.&lt;&#x2F;p&gt;
&lt;&#x2F;blockquote&gt;

&lt;h3 id=&quot;release-notes&quot;&gt;Release notes:&lt;&#x2F;h3&gt;

&lt;p&gt;Its time to share some information about release (&lt;em&gt;its not a full changelog below - just a list of things I remember we did in past month&lt;&#x2F;em&gt;).&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;300+ commits of awesome code&lt;&#x2F;li&gt;
  &lt;li&gt;Web editor&lt;&#x2F;li&gt;
  &lt;li&gt;Even more API&lt;&#x2F;li&gt;
  &lt;li&gt;Improved File Browsing&lt;&#x2F;li&gt;
  &lt;li&gt;Fixed critical bug with deleting&#x2F;adding ssh keys&lt;&#x2F;li&gt;
  &lt;li&gt;Added unofficial Postgres support&lt;&#x2F;li&gt;
  &lt;li&gt;Project Groups(In case you want to group your projects)&lt;&#x2F;li&gt;
  &lt;li&gt;Performance of Files &amp;amp; Commits significantly improved&lt;&#x2F;li&gt;
  &lt;li&gt;refactoring, code cleanup etc&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;We recommend you to update your GitLab instance :)&lt;&#x2F;p&gt;

&lt;p&gt;I&#x27;d like to thank a community for bug reporting, contributing and patience.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;some-screens&quot;&gt;Some screens&lt;&#x2F;h2&gt;
&lt;h3 id=&quot;dashboard&quot;&gt;Dashboard:&lt;&#x2F;h3&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;3_0&#x2F;gl_0.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;project-group-dashboard&quot;&gt;Project Group dashboard:&lt;&#x2F;h3&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;3_0&#x2F;gl_1.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;files-view&quot;&gt;Files view:&lt;&#x2F;h3&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;3_0&#x2F;gl_2.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h3 id=&quot;web-editor&quot;&gt;Web Editor:&lt;&#x2F;h3&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;3_0&#x2F;gl_3.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;h4&gt;Links&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;a title=&quot;Update from 2.9&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.9-to-3.0&quot;&gt;Update from 2.9&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a title=&quot;Update from 2.6+&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.6-to-3.0&quot;&gt;Update from 2.6+&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a title=&quot;How to Install&quot; href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab v2.9 is released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/09/21/gitlab-2-dot-9-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/09/21/gitlab-2-dot-9-released/</id>
<published>2012-09-21T18:45:00+00:00</published>
<updated>2012-09-21T18:45:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-29-released&quot;&gt;GITLAB 2.9 released&lt;&#x2F;h3&gt;

&lt;p&gt;Good news everyone!
I decided to release GITLAB v2.9 today :)&lt;&#x2F;p&gt;



&lt;p&gt;10 reasons to update:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;over 400 commits of awesome code&lt;&#x2F;li&gt;
  &lt;li&gt;We changed comments order(except wall)&lt;&#x2F;li&gt;
  &lt;li&gt;We added omniauth support(twitter, google…)&lt;&#x2F;li&gt;
  &lt;li&gt;Bunch of stuff fixed&lt;&#x2F;li&gt;
  &lt;li&gt;Refactored a lot of code&lt;&#x2F;li&gt;
  &lt;li&gt;We prepared gitlab for gitolite v3&lt;&#x2F;li&gt;
  &lt;li&gt;Emoji :smile:&lt;&#x2F;li&gt;
  &lt;li&gt;keep LDAP, OAuth setting in one place -&amp;gt; config&#x2F;gitlab.yml&lt;&#x2F;li&gt;
  &lt;li&gt;Profile and Admin area got some new features&lt;&#x2F;li&gt;
  &lt;li&gt;More API&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;I&#x27;ve already updated my instance :)&lt;&#x2F;p&gt;

&lt;p&gt;I&#x27;d like to thank a community for bug reporting, contributing and patience.&lt;&#x2F;p&gt;

&lt;h2 id=&quot;some-screens&quot;&gt;Some screens:&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_dash.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_adm.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_files.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_issue.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_profile.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_tm.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_9&#x2F;gl_29_wall.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;
&lt;h4&gt;Links&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;a title=&quot;Update from 2.8&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.8-to-2.9&quot;&gt;Update from 2.8&lt;&#x2F;a&gt;
&lt;a title=&quot;How to Install&quot; href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>News from the front</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/09/17/news-from-the-front/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/09/17/news-from-the-front/</id>
<published>2012-09-17T17:45:00+00:00</published>
<updated>2012-09-17T17:45:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;v29pre-news-from-the-front&quot;&gt;v2.9pre. News from the front&lt;&#x2F;h3&gt;

&lt;p&gt;Hi everyone!&lt;&#x2F;p&gt;

&lt;p&gt;I got a free minute and decided to share some news of next release with you :)&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;2.9 already got over 400 commits&lt;&#x2F;li&gt;
  &lt;li&gt;We changed comments order(except wall)&lt;&#x2F;li&gt;
  &lt;li&gt;We added omniauth support (twitter, google…)&lt;&#x2F;li&gt;
  &lt;li&gt;Bunch of stuff fixed&lt;&#x2F;li&gt;
  &lt;li&gt;Refactored a lot of code&lt;&#x2F;li&gt;
  &lt;li&gt;We prepared gitlab for gitolite v3&lt;&#x2F;li&gt;
  &lt;li&gt;Emoji :smile:&lt;&#x2F;li&gt;
  &lt;li&gt;Moved from Cucumber to &lt;a href=&quot;http:&#x2F;&#x2F;codegram.github.com&#x2F;spinach-presentation&#x2F;#1&quot;&gt;Spinach&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;keep LDAP, OAuth setting in one place -&amp;gt; config&#x2F;gitlab.yml&lt;&#x2F;li&gt;
  &lt;li&gt;Profile and Admin area got some new features&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Its a very cool release and I recommend everyone to update at 22th :)&lt;&#x2F;p&gt;

&lt;p&gt;I&#x27;d like to thank all the contributors! We build a better software together.&lt;&#x2F;p&gt;

&lt;p&gt;Also special thanks for:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;tsigo&quot;&gt;@tsigo&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;NARKOZ&quot;&gt;@NARKOZ&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;riyad&quot;&gt;@riyad&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
  &lt;li&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;AlexDenisov&quot;&gt;@AlexDenisov&lt;&#x2F;a&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;They made a lot of cool commits for this release.&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GITLAB 2.8 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/08/22/gitlab-2-dot-8-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/08/22/gitlab-2-dot-8-released/</id>
<published>2012-08-22T17:45:00+00:00</published>
<updated>2012-08-22T17:45:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;gitlab-28-released&quot;&gt;GITLAB 2.8 released&lt;&#x2F;h3&gt;

&lt;p&gt;Good news everyone! GITLAB version 2.8 has been released.
So what&#x27;s new?&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Gitlab Flavored Markdown&lt;&#x2F;li&gt;
  &lt;li&gt;Bulk Issues update. Change milestone for ten issues now can be done via one click.&lt;&#x2F;li&gt;
  &lt;li&gt;Issues API&lt;&#x2F;li&gt;
  &lt;li&gt;GITLAB post-receive hooks for new projects created via gitolite. Less bugs with push events now.&lt;&#x2F;li&gt;
  &lt;li&gt;UI improved. We continue polishing it&lt;&#x2F;li&gt;
  &lt;li&gt;Application cleanup. Get rid of unused libraries.&lt;&#x2F;li&gt;
  &lt;li&gt;More tests - less bugs. We currently have 80% code covered with tests&lt;&#x2F;li&gt;
  &lt;li&gt;Few security fixes&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;
&lt;h4&gt;Links&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;a title=&quot;Update from 2.7&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.7-to-2.8&quot;&gt;Update from 2.7&lt;&#x2F;a&gt;
&lt;a title=&quot;How to Install&quot; href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;some-screens&quot;&gt;Some screens:&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;2_8&#x2F;gitlab_source.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_8&#x2F;gitlab_issues.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GITLAB 2.7</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/07/17/gitlab-2-dot-7/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/07/17/gitlab-2-dot-7/</id>
<published>2012-07-17T16:45:00+00:00</published>
<updated>2012-07-17T16:45:00+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3 id=&quot;meet-the-new-gitlab-version----27&quot;&gt;Meet the new GITLAB version  - 2.7&lt;&#x2F;h3&gt;

&lt;p&gt;Lets look at changelog:&lt;&#x2F;p&gt;

&lt;h2 id=&quot;features&quot;&gt;Features:&lt;&#x2F;h2&gt;

&lt;ol&gt;
  &lt;li&gt;Issues tags&lt;&#x2F;li&gt;
  &lt;li&gt;Image compare in commit&lt;&#x2F;li&gt;
  &lt;li&gt;Unassigned Issues, MR&lt;&#x2F;li&gt;
  &lt;li&gt;Inline diff&lt;&#x2F;li&gt;
  &lt;li&gt;API&lt;&#x2F;li&gt;
  &lt;li&gt;Merge request can be exported to patch file&lt;&#x2F;li&gt;
  &lt;li&gt;Git HTTP support&lt;&#x2F;li&gt;
  &lt;li&gt;App system hooks&lt;&#x2F;li&gt;
  &lt;li&gt;Git error logs in admin&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;h2 id=&quot;improvements&quot;&gt;Improvements:&lt;&#x2F;h2&gt;

&lt;ol&gt;
  &lt;li&gt;Source Browse performance increased&lt;&#x2F;li&gt;
  &lt;li&gt;Better configuration file&lt;&#x2F;li&gt;
  &lt;li&gt;UI: full tabs, colored labels and much more&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;hr &#x2F;&gt;
&lt;h4&gt;Links&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;a title=&quot;Update from 2.6.x&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.6.x-to-2.7.0&quot;&gt;Update from 2.6.x&lt;&#x2F;a&gt;
&lt;a title=&quot;How to Install&quot; href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;h2 id=&quot;some-screens&quot;&gt;Some screens:&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;2_7&#x2F;GitLab_changed_images.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_7&#x2F;gitlab_commits.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_7&#x2F;gitlab_issues.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_7&#x2F;gitlab_diff.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_7&#x2F;gitlab_ajax.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GITLAB v2.6 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/06/22/gitlab-v2-6-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/06/22/gitlab-v2-6-released/</id>
<published>2012-06-22T04:00:57+00:00</published>
<updated>2012-06-22T04:00:57+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Meet the new GITLAB version  - 2.6&lt;&#x2F;p&gt;
&lt;p&gt;This release contains almost 200 commits and have a lot of major &amp;amp; minor improvements&lt;&#x2F;p&gt;
&lt;p&gt;Short changelog:&lt;&#x2F;p&gt;

&lt;ul&gt;
  &lt;li&gt;Better fonts for code&#x2F;commit browse (Windows, Linux)&lt;&#x2F;li&gt;
  &lt;li&gt;Ability to remove source branch after apply Merge Request&lt;&#x2F;li&gt;
  &lt;li&gt;You can create Merge Request from your last push from dashboard&lt;&#x2F;li&gt;
  &lt;li&gt;Network graph improved&lt;&#x2F;li&gt;
  &lt;li&gt;RSS Feed for dashboard&lt;&#x2F;li&gt;
  &lt;li&gt;UI polished&lt;&#x2F;li&gt;
  &lt;li&gt;Admin area - Search for projects, users&lt;&#x2F;li&gt;
  &lt;li&gt;Legend for Issues &amp;amp; Merge Requests&lt;&#x2F;li&gt;
  &lt;li&gt;Assignee filter for issues&lt;&#x2F;li&gt;
  &lt;li&gt;Bugfixes&lt;&#x2F;li&gt;
  &lt;li&gt;Code refactoring&lt;&#x2F;li&gt;
  &lt;li&gt;Increased test coverage of application&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;h4&gt;Links&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;a title=&quot;Update from 2.5.0&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.5.0-to-2.6.0&quot;&gt;Update from 2.5.0&lt;&#x2F;a&gt;
&lt;a title=&quot;How to Install&quot; href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;h4&gt;Some screens:&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;img src=&quot;&#x2F;images&#x2F;2_6&#x2F;gitlab_better_fonts_for_code_0.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_6&#x2F;gitlab_last_push.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;
&lt;img src=&quot;&#x2F;images&#x2F;2_6&#x2F;gitlab_remove_branch.png&quot; alt=&quot;Screens&quot; &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GITLAB v2.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/05/22/gitlab-v2-5/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/05/22/gitlab-v2-5/</id>
<published>2012-05-22T16:24:33+00:00</published>
<updated>2012-05-22T16:24:33+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Hi!&lt;&#x2F;p&gt;

&lt;p&gt;We released version 2.5. We fixed a lot of encoding issues, polished UI, and added few new features. 
&lt;br &#x2F;&gt;Hope you like it&lt;&#x2F;p&gt;
&lt;h4&gt;Links&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;a title=&quot;Update from 2.4.1&quot; href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.4.1-to-2.5.0&quot;&gt;Update from 2.4.1&lt;&#x2F;a&gt;
&lt;a title=&quot;How to Install&quot; href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot;&gt;How to Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;h4&gt;Some screens:&lt;&#x2F;h4&gt;
&lt;p&gt;[nggallery id=3]&lt;&#x2F;p&gt;
&lt;h4&gt;Short changelog:&lt;&#x2F;h4&gt;
&lt;ol&gt;
  &lt;li&gt;Email send in background now&lt;&#x2F;li&gt;
  &lt;li&gt;Better test coverage&lt;&#x2F;li&gt;
  &lt;li&gt;Bug fix&lt;&#x2F;li&gt;
  &lt;li&gt;Fit blame for file&lt;&#x2F;li&gt;
  &lt;li&gt;Better MR accept&lt;&#x2F;li&gt;
  &lt;li&gt;UI polished&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Few screens from v2.5</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/05/19/few-screens-from-v2-5/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/05/19/few-screens-from-v2-5/</id>
<published>2012-05-19T10:10:38+00:00</published>
<updated>2012-05-19T10:10:38+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Hi!&lt;&#x2F;p&gt;

&lt;p&gt;We are going to release 2.5 at May 22th. Here few screens: 
[nggallery id=3]&lt;&#x2F;p&gt;

&lt;p&gt;And some facts about this release:&lt;&#x2F;p&gt;

&lt;ol&gt;
  &lt;li&gt;Email send in background now&lt;&#x2F;li&gt;
  &lt;li&gt;Better test coverage&lt;&#x2F;li&gt;
  &lt;li&gt;Bug fix&lt;&#x2F;li&gt;
  &lt;li&gt;Fit blame for file&lt;&#x2F;li&gt;
  &lt;li&gt;Better MR accept&lt;&#x2F;li&gt;
  &lt;li&gt;UI polished&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>GitLab v2.4 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/04/22/gitlab-v2-4-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/04/22/gitlab-v2-4-released/</id>
<published>2012-04-22T15:26:36+00:00</published>
<updated>2012-04-22T15:26:36+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;We proudly announce new version with ~200 commits. Hope you like it :)&lt;&#x2F;p&gt;

&lt;h2&gt;What&#x27;s new?&lt;&#x2F;h2&gt;
&lt;ul&gt;
	&lt;li&gt;&#x27;Accept merge request&#x27; button&lt;&#x2F;li&gt;
	&lt;li&gt;Milestones&lt;&#x2F;li&gt;
	&lt;li&gt;Ability to block user&lt;&#x2F;li&gt;
	&lt;li&gt;Responsive layout&lt;&#x2F;li&gt;
	&lt;li&gt;Big commits handling&lt;&#x2F;li&gt;
        &lt;li&gt;and much more...&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;[nggallery id=2]&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot; title=&quot;Install&quot;&gt;Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.3-to-2.4&quot; title=&quot;Update from 2.3&quot;&gt;Update from 2.3&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;h2&gt;What&#x27;s next?&lt;&#x2F;h2&gt;

&lt;p&gt;We are going to release v3.0 with bunch of code refactored at 22th May&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Gitlab 2.3 released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/03/22/gitlab-2-3-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/03/22/gitlab-2-3-released/</id>
<published>2012-03-22T08:52:09+00:00</published>
<updated>2012-03-22T08:52:09+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h2&gt;What&#x27;s new?&lt;&#x2F;h2&gt;
&lt;ul&gt;
	&lt;li&gt;mysql support&lt;&#x2F;li&gt;
	&lt;li&gt;resque required&lt;&#x2F;li&gt;
	&lt;li&gt;keep merge request diff even after merge&lt;&#x2F;li&gt;
	&lt;li&gt;automatically close merge request on push&lt;&#x2F;li&gt;
	&lt;li&gt;dashboard&lt;&#x2F;li&gt;
	&lt;li&gt;search page&lt;&#x2F;li&gt;
        &lt;li&gt;and much more...&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;install&#x2F;&quot; title=&quot;Install&quot;&gt;Install&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.2-to-2.3&quot; title=&quot;Update from 2.2&quot;&gt;Update from 2.2&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Some screens from 2.3pre</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/03/07/some-screens-from-2-3pre/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/03/07/some-screens-from-2-3pre/</id>
<published>2012-03-07T12:26:43+00:00</published>
<updated>2012-03-07T12:26:43+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;We have 2 major backend changes in 2.3&lt;&#x2F;p&gt;
&lt;ol&gt;
  &lt;li&gt;Resque &lt;strong&gt;is required&lt;&#x2F;strong&gt; for application functionality&lt;&#x2F;li&gt;
  &lt;li&gt;We&#x27;ll move to mysql from sqlite&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Gitlab Version 2.2</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/02/22/gitlab-version-2-2/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/02/22/gitlab-version-2-2/</id>
<published>2012-02-22T10:32:45+00:00</published>
<updated>2012-02-22T10:32:45+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h2&gt;Up to v2.2&lt;&#x2F;h2&gt;

&lt;p&gt;
We proud to announce that we released new version of gitlab.
First of all &lt;strong&gt;we strongly recommend to update your gitlab to v2.2&lt;&#x2F;strong&gt; cause it included a lot of security fixes.
Finally gitlab is ready for general enterprise use.
For update instructions visit &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-2.1-to-2.2&quot;&gt;this link&lt;&#x2F;a&gt;
For demo visit &lt;a href=&quot;https:&#x2F;&#x2F;about.gitlab.com&#x2F;demo&#x2F;&quot;&gt;this link&lt;&#x2F;a&gt;
For source code visit &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&quot;&gt;this link&lt;&#x2F;a&gt;
VMWare image will be available in a week. 
&lt;&#x2F;p&gt;
&lt;div&gt;
&lt;strong&gt;So what&#x27;s new in v2.2?&lt;&#x2F;strong&gt;
- We&#x27;ve added support of LDAP auth
- Improved permission logic (4 roles system)
- Protected branches (now only masters can push to protected branches)
- Usability improved
- twitter bootstrap integrated
- compare view between commits
- wiki feature
- now you can enable&#x2F;disable issues, wiki, wall features per project
- security fixes
- improved code browsing (ajax branch switch etc)
- improved per-line commenting
- git submodules displayed
- moved to rails 3.2
- help section improved
&lt;&#x2F;div&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>2.1.pre</title>
<release></release>
<link href='https://about.gitlab.com/releases/2012/01/05/2-1-pre/' rel='alternate' />
<id>https://about.gitlab.com/releases/2012/01/05/2-1-pre/</id>
<published>2012-01-05T18:23:58+00:00</published>
<updated>2012-01-05T18:23:58+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;For last week we made some changes to gitlab so we are a bit closer to 2.1 release.&lt;&#x2F;p&gt;

&lt;ul&gt;	
&lt;li&gt;Project tab&lt;&#x2F;li&gt;
&lt;li&gt;Restyled Activities&lt;&#x2F;li&gt;
&lt;li&gt;Repository tab&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Gitlabhq v2.0: Moderno</title>
<release></release>
<link href='https://about.gitlab.com/releases/2011/12/22/gitlabhq-v2-0-moderno/' rel='alternate' />
<id>https://about.gitlab.com/releases/2011/12/22/gitlabhq-v2-0-moderno/</id>
<published>2011-12-22T09:54:45+00:00</published>
<updated>2011-12-22T09:54:45+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h2&gt;Giltab v2.0 &#x27;Moderno&#x27; released!&lt;&#x2F;h2&gt;
&lt;p&gt;We finally moved from gitosis to gitolite. It&#x27;ll allow us to make a lot of useful features in the future.&lt;&#x2F;p&gt;
&lt;p&gt;We still move forward. And as always I promise you next version release in a month.&lt;&#x2F;p&gt;

&lt;h2&gt;Now I&#x27;ll try to explain why you need v2.0.&lt;&#x2F;h2&gt;

&lt;h4&gt;1. Gitolite support&lt;&#x2F;h4&gt;
&lt;h4&gt;2. Merge Requests&lt;&#x2F;h4&gt;
&lt;h4&gt;3. Project&#x2F;Repository access&lt;&#x2F;h4&gt;
&lt;h4&gt;4. Commits &amp;amp; Issues Feed&lt;&#x2F;h4&gt;
&lt;h4&gt;5. Switch code view colors&lt;&#x2F;h4&gt;
&lt;h4&gt;6. Improved Email notifications&lt;&#x2F;h4&gt;
&lt;h4&gt;7. Dashboard&lt;&#x2F;h4&gt;
&lt;h4&gt;+ much more and bug fix and performance improvements...&lt;&#x2F;h4&gt;
&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h2&gt;We&#x27;ll update documentation in few days with install &amp;amp; update instructions&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h2&gt;&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&quot;&gt; Source Code&lt;&#x2F;a&gt;&lt;&#x2F;h2&gt;
&lt;p&gt;&lt;br &#x2F;&gt;&lt;&#x2F;p&gt;
&lt;h2&gt;To get most recent info - follow us on twitter&lt;&#x2F;h2&gt;

&lt;p&gt;&lt;a href=&quot;https:&#x2F;&#x2F;twitter.com&#x2F;gitlab&quot; class=&quot;twitter-follow-button&quot; data-show-count=&quot;false&quot; data-size=&quot;large&quot;&gt;Follow @gitlab&lt;&#x2F;a&gt;
&lt;script&gt;!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=&quot;&#x2F;&#x2F;platform.twitter.com&#x2F;widgets.js&quot;;fjs.parentNode.insertBefore(js,fjs);}}(document,&quot;script&quot;,&quot;twitter-wjs&quot;);&lt;&#x2F;script&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>What&#x27;s next?</title>
<release></release>
<link href='https://about.gitlab.com/releases/2011/11/22/whats-next/' rel='alternate' />
<id>https://about.gitlab.com/releases/2011/11/22/whats-next/</id>
<published>2011-11-22T23:05:13+00:00</published>
<updated>2011-11-22T23:05:13+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;&#x27;Pronto&#x27; released. We are on our way to version 2. The main goal is &lt;strong&gt;gitolite&lt;&#x2F;strong&gt; support. I think of some other features I find useful for project:&lt;&#x2F;p&gt;
&lt;ul&gt;
	&lt;li&gt;Project wiki&lt;&#x2F;li&gt;
	&lt;li&gt;Workflow&#x2F;Branch management (create&#x2F;remove branch, tag etc)&lt;&#x2F;li&gt;
	&lt;li&gt;Commit&#x2F;Branch diff&lt;&#x2F;li&gt;
	&lt;li&gt;Merge requests&lt;&#x2F;li&gt;
	&lt;li&gt;Issues tags&lt;&#x2F;li&gt;
	&lt;li&gt;File tab listing all files attached to notes&lt;&#x2F;li&gt;
	&lt;li&gt;Advanced user profile&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;
&lt;p&gt;Also some things should be improved:&lt;&#x2F;p&gt;
&lt;ul&gt;
	&lt;li&gt;New design is far from perfect. It should be polished&lt;&#x2F;li&gt;
	&lt;li&gt;I don&#x27;t like tree browse performance&lt;&#x2F;li&gt;
        &lt;li&gt;Activities page requires pagination like &#x27;commits&#x27; or &#x27;wall&#x27; page&lt;&#x2F;li&gt;
        &lt;li&gt;Usability&lt;&#x2F;li&gt;
&lt;&#x2F;ul&gt;

&lt;p&gt;Some We&#x27;ll try to implement for 2.0, other will be announced as part of 2.1.
Anyway I&#x27;ll continue my work on this project &amp;amp; hope you&#x27;ll like it.&lt;&#x2F;p&gt;

&lt;h4&gt;Thanks for gitlab team for help.&lt;&#x2F;h4&gt;
&lt;p&gt;Cant imagine 1.2 released without their help. Special thanks to our designer &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;rickyrauch&quot;&gt;Ricardo&lt;&#x2F;a&gt; for new look of gitlabhq.&lt;&#x2F;p&gt;
&lt;h4&gt;Thank you for your support, feedback &amp;amp; pull requests.&lt;&#x2F;h4&gt;
&lt;p&gt;Follow us on twitter (@gitlab) and follow us on &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&quot;&gt;github&lt;&#x2F;a&gt;. 
We really appreciate your support!&lt;&#x2F;p&gt;

&lt;p&gt;sincerely yours, &lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;randx&quot;&gt;Dmitriy&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Pronto released</title>
<release></release>
<link href='https://about.gitlab.com/releases/2011/11/22/pronto-released/' rel='alternate' />
<id>https://about.gitlab.com/releases/2011/11/22/pronto-released/</id>
<published>2011-11-22T20:28:54+00:00</published>
<updated>2011-11-22T20:28:54+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;p&gt;Gitlab &#x27;Pronto&#x27; v1.2 released!
checkout &lt;code&gt;master&lt;&#x2F;code&gt; or &lt;code&gt;pronto&lt;&#x2F;code&gt; branches&lt;&#x2F;p&gt;

&lt;p&gt;&lt;a href=&quot;&#x2F;releases&#x2F;2011&#x2F;11&#x2F;17&#x2F;features-for-pronto-v1-2-0&#x2F;&quot; title=&quot;feature list&quot;&gt;features&lt;&#x2F;a&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&quot; title=&quot;github source code&quot;&gt;github source code&lt;&#x2F;a&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&quot; title=&quot;github wiki&quot;&gt;github wiki&lt;&#x2F;a&gt;
&lt;a href=&quot;https:&#x2F;&#x2F;github.com&#x2F;gitlabhq&#x2F;gitlabhq&#x2F;wiki&#x2F;From-pratica-to-pronto&quot; title=&quot;update&quot;&gt;update from pratica&lt;&#x2F;a&gt;&lt;&#x2F;p&gt;

&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>Features for Pronto  (v1.2.0)</title>
<release></release>
<link href='https://about.gitlab.com/releases/2011/11/17/features-for-pronto-v1-2-0/' rel='alternate' />
<id>https://about.gitlab.com/releases/2011/11/17/features-for-pronto-v1-2-0/</id>
<published>2011-11-17T14:34:11+00:00</published>
<updated>2011-11-17T14:34:11+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;ol&gt;
	&lt;li&gt;&lt;h3&gt;New design&lt;&#x2F;h3&gt;&lt;&#x2F;li&gt;
	&lt;li&gt;&lt;h3&gt;User dashboard&lt;&#x2F;h3&gt;&lt;&#x2F;li&gt;
	&lt;li&gt;&lt;h3&gt;Project activities&lt;&#x2F;h3&gt;&lt;&#x2F;li&gt;
	&lt;li&gt;&lt;h3&gt;Network graph&lt;&#x2F;h3&gt;&lt;&#x2F;li&gt;
	&lt;li&gt;&lt;h3&gt;Markdown support for comments&lt;&#x2F;h3&gt;&lt;&#x2F;li&gt;
	&lt;li&gt;&lt;h3&gt;Wall improved&lt;&#x2F;h3&gt;&lt;&#x2F;li&gt;
&lt;&#x2F;ol&gt;

&lt;p&gt;This features are ready and will be available at Nov 22, 2011&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
<entry>
<title>gitlab v1.1 vmware image</title>
<release></release>
<link href='https://about.gitlab.com/releases/2011/10/24/gitlab-v1-1-vmware-image/' rel='alternate' />
<id>https://about.gitlab.com/releases/2011/10/24/gitlab-v1-1-vmware-image/</id>
<published>2011-10-24T12:17:18+00:00</published>
<updated>2011-10-24T12:17:18+00:00</updated>
<author>
<name></name>
</author>
<content type='html'>&lt;h3&gt;1. Download (501 MB)
&lt;a title=&quot;ubuntu server 10.04&quot; href=&quot;http:&#x2F;&#x2F;downloads.gitlabhq.com&#x2F;gitlab-ubuntu-server-10.04-amd64.zip&quot;&gt;http:&#x2F;&#x2F;downloads.gitlabhq.com&#x2F;gitlab-ubuntu-server-10.04-amd64.zip&lt;&#x2F;a&gt;
&lt;&#x2F;h3&gt;

&lt;h3&gt;2. Access to virtual machine:&lt;&#x2F;h3&gt;
&lt;p&gt;user: notroot
pass: gitlabhq&lt;&#x2F;p&gt;

&lt;h3&gt;3. Important! After login - rebuild ssh keys&lt;&#x2F;h3&gt;

&lt;p&gt;&lt;code&gt;ssh-keygen -t rsa
sudo -H -u git gitosis-init &amp;lt; ~&#x2F;.ssh&#x2F;id_rsa.pub&lt;&#x2F;code&gt;&lt;&#x2F;p&gt;

&lt;h3&gt;4. Login via web. Admin login details for webUI&lt;&#x2F;h3&gt;

&lt;p&gt;user: admin@local.host
pass: 5iveL!fe&lt;&#x2F;p&gt;

&lt;hr &#x2F;&gt;

&lt;p&gt;&lt;em&gt;VirtualBox also support&lt;&#x2F;em&gt;&lt;&#x2F;p&gt;
&lt;img src=&#x27;https:&#x2F;&#x2F;about.gitlab.com&#x2F;images&#x2F;default-blog-image.png&#x27; class=&#x27;webfeedsFeaturedVisual&#x27; style=&#x27;display: none;&#x27; &#x2F;&gt;</content>
</entry>
</feed>
