First published: Tue Jun 08 2021(Updated: )
All versions of GitLab CE/EE starting from 12.8 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.8.0<13.10.5 | |
GitLab | >=12.8.0<13.10.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.11.0<13.11.5 | |
GitLab | >=13.12.0<13.12.2 | |
GitLab | >=13.12.0<13.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22218 has a severity rating that could allow an attacker to spoof authorship of signed commits, posing a significant security risk.
To fix CVE-2021-22218, you should upgrade to GitLab versions 13.10.5, 13.11.5, or 13.12.2 or later.
CVE-2021-22218 affects GitLab CE/EE versions starting from 12.8 before 13.10.5, 13.11 before 13.11.5, and 13.12 before 13.12.2.
CVE-2021-22218 involves an issue in the handling of x509 certificates that can be exploited to deceive users.
The primary impact of CVE-2021-22218 is the risk of unauthorized commit author spoofing, which can undermine trust in version control integrity.