I am experimenting with adding Gitea support to GARM (Github Actions Runner Manager).

The current WiP branch is here: https://github.com/cloudbase/garm/pull/393

I like the idea of adding endpoints for Gitea, GHES and Github proper and using the same GARM instance to manage runners for repos across multiple forges.

#gitea #github #ghes #runners #garm

Add gitea by gabriel-samfira · Pull Request #393 · cloudbase/garm

This branch adds initial Gitea support. What works: Adding gitea endpoint adding gitea credentials adding repositories Webhooks properly record jobs Runners are managed properly PAT auth What doe...

GitHub
Why Bitbucket Never Caught Up With GitHub: A Comprehensive Analysis

Bitbucket and GitHub are two of the most widely used version control platforms, both allowing developers to manage their code repositories and collaborate on software projects. However, when…

Medium

GitHub patches critical Security Flaws in
Enterprise Server.  

GitHub has released fixes to address a set of three security flaws impacting its Enterprise Server product, including one critical bug that could be abused to gain site administrator privileges.

[CVE-2024-7711]
[CVE-2024-6337]
[CVE-2024-6800]

https://docs.github.com/en/enterprise-[email protected]/admin/release-notes

#github #ghes #it #security #flaw #admin #privileges #privacy #programming #engineering #tech #media #news

Release notes - GitHub Enterprise Server 3.13 Docs

Get started, troubleshoot, and make the most of GitHub. Documentation for new users, developers, administrators, and all of GitHub's products.

GitHub Docs
#GitHib: If you are running an on-prem GitHub Enterprise Server #GHES you need to update it urgently as #vulnerability CVE-2024-6800 could be exploited to bypass authentication & gain admin privileges:
👇
https://www.bleepingcomputer.com/news/security/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/
https://www.bleepingcomputer.com/news/security/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/
GitHub Enterprise Server vulnerable to critical auth bypass flaw

A critical vulnerability affecting multiple versions of GitHub Enterprise Server could be exploited to bypass authentication and enable an attacker to gain administrator privileges on the machine.

BleepingComputer

🚨 Critical vulnerability (CVE-2024-6800) found in GitHub Enterprise Server versions. Attackers could bypass authentication and gain admin privileges. GitHub has released patches for affected versions. Over 36,500 GHES instances exposed online, mostly in the US. Update ASAP to versions 3.13.3, 3.12.8, 3.11.14, or 3.10.16 for security.

#GitHubSecurity #CyberSecurity #SoftwareUpdate #GHES

Bleeping Computers: https://www.bleepingcomputer.com/news/security/github-enterprise-server-vulnerable-to-critical-auth-bypass-flaw/

GitHub Enterprise Server vulnerable to critical auth bypass flaw

A critical vulnerability affecting multiple versions of GitHub Enterprise Server could be exploited to bypass authentication and enable an attacker to gain administrator privileges on the machine.

BleepingComputer

GitHub Issues Patch for Critical Exploit in Enterprise Server

The vulnerability affects all #GHES versions before 3.13.0 and achieves the highest possible CVSS score of 10. Instances with SAML SSO authentication are at risk. #GitHub
https://securityboulevard.com/2024/05/github-issues-patch-for-critical-exploit-in-enterprise-server/

GitHub Issues Patch for Critical Exploit in Enterprise Server

The vulnerability affects all GHES versions prior to 3.13.0 and achieves the highest possible CVSS score of 10. Instances with SAML SSO authentication are at risk.

Security Boulevard

I’ve got some really cool work news!

I recently joined a brand new team that is focused on improving the way licensing works. This includes  Enterprise Cloud,  Enterprise Server,  Copilot for Business and  Advanced Security

Let me know if you have any licensing feedback or woes!

#GitHub #GHEC #GHES #GHAS #copilot