First published: Mon Dec 13 2021(Updated: )
An uncontrolled resource consumption vulnerability in GitLab Runner affecting all versions starting from 13.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker triggering a job with a specially crafted docker image to exhaust resources on runner manager
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.7.0<14.3.6 | |
GitLab | >=13.7.0<14.3.6 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.4.0<14.4.4 | |
GitLab | >=14.5.0<14.5.2 | |
GitLab | >=14.5.0<14.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39939 has a medium severity rating due to its potential for resource exhaustion.
To fix CVE-2021-39939, upgrade GitLab Runner to version 14.3.6 or later, 14.4.4 or later, or 14.5.2 or later.
CVE-2021-39939 affects all GitLab Runner versions from 13.7 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2.
CVE-2021-39939 is categorized as an uncontrolled resource consumption vulnerability.
Yes, CVE-2021-39939 can be exploited remotely if an attacker triggers a job with a specially crafted Docker image.