First published: Wed Jul 10 2019(Updated: )
GitLab CE 8.17 and later and EE 8.3 and later have a symlink time-of-check-to-time-of-use race condition that would allow unauthorized access to files in the GitLab Pages chroot environment. This is fixed in versions 11.5.1, 11.4.8, and 11.3.11.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=8.3.0<11.3.11 | |
GitLab | >=8.17.0<11.3.11 | |
GitLab | >=11.3.12<11.4.8 | |
GitLab | >=11.3.12<11.4.8 | |
GitLab | >=11.4.9<11.5.1 | |
GitLab | >=11.4.9<11.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19572 has a high severity due to the potential for unauthorized access to files in the GitLab Pages chroot environment.
To fix CVE-2018-19572, upgrade to versions 11.5.1, 11.4.8, or 11.3.11 of GitLab.
GitLab CE version 8.17 and later and EE version 8.3 and later are affected by CVE-2018-19572.
CVE-2018-19572 is a symlink time-of-check-to-time-of-use race condition vulnerability.
Yes, CVE-2018-19572 impacts both the GitLab Community Edition and the Enterprise Edition.