First published: Tue Nov 17 2020(Updated: )
A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 12.6. The container registry name check could cause exponential number of backtracks for certain user supplied values resulting in high CPU usage. Affected versions are: >=12.6, <13.3.9.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.6.0<13.3.9 | |
GitLab | >=12.6.0<13.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13354 is classified as a DOS vulnerability affecting GitLab CE/EE, which can lead to high CPU usage.
To resolve CVE-2020-13354, upgrade GitLab to version 13.3.9 or later.
CVE-2020-13354 affects GitLab versions from 12.6 to 13.3.8.
CVE-2020-13354 facilitates a Denial of Service attack due to excessive CPU usage when processing certain container registry name checks.
Yes, CVE-2020-13354 impacts both GitLab Community Edition (CE) and Enterprise Edition (EE).