First published: Tue Jun 08 2021(Updated: )
A denial of service vulnerability in all versions of GitLab CE/EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a very long issue or merge request description
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <13.10.5 | |
GitLab | <13.10.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.12.0<13.12.2 | |
GitLab | >=13.12.0<13.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22216 has been classified as a denial of service vulnerability with a high severity level.
To fix CVE-2021-22216, you should upgrade to GitLab versions 13.12.2, 13.11.5, or 13.10.5 or later.
CVE-2021-22216 affects all versions of GitLab CE/EE prior to versions 13.12.2, 13.11.5, or 13.10.5.
CVE-2021-22216 allows an attacker to cause uncontrolled resource consumption through excessively long issue or merge request descriptions.
Yes, CVE-2021-22216 affects both GitLab Community Edition (CE) and Enterprise Edition (EE).