First published: Wed May 15 2019(Updated: )
An issue was discovered in GitLab Community and Enterprise Edition before 11.7.10, 11.8.x before 11.8.6, and 11.9.x before 11.9.4. A regex input validation issue for the .gitlab-ci.yml refs value allows Uncontrolled Resource Consumption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <11.7.10 | |
GitLab | <11.7.10 | |
GitLab | >=11.8.0<11.8.6 | |
GitLab | >=11.8.0<11.8.6 | |
GitLab | >=11.9.0<11.9.4 | |
GitLab | >=11.9.0<11.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10640 is classified as having a medium severity due to its potential for uncontrolled resource consumption.
To fix CVE-2019-10640, upgrade to GitLab versions 11.7.10, 11.8.6, or 11.9.4 or later.
CVE-2019-10640 affects GitLab Community and Enterprise Editions prior to version 11.7.10, 11.8.x prior to 11.8.6, and 11.9.x prior to 11.9.4.
CVE-2019-10640 is a regex input validation issue that can lead to uncontrolled resource consumption.
If you've updated your GitLab instance to the recommended versions, CVE-2019-10640 should no longer pose a risk.