First published: Fri Jul 01 2022(Updated: )
A Regular Expression Denial of Service vulnerability in GitLab CE/EE affecting all versions from 1.0.2 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker to make a GitLab instance inaccessible via specially crafted web server response headers
Credit: cve@gitlab.com cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=1.0.2<14.10.5 | |
GitLab | >=1.0.2<14.10.5 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | >=15.0.0<15.0.4 | |
GitLab | =15.1.0 | |
GitLab | =15.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1954 is classified as a Regular Expression Denial of Service vulnerability.
To fix CVE-2022-1954, update your GitLab instance to version 14.10.5, 15.0.4, or 15.1.1 or later.
CVE-2022-1954 affects all versions of GitLab from 1.0.2 prior to 14.10.5, all versions from 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1.
CVE-2022-1954 enables an attacker to make a GitLab instance inaccessible via specially crafted web server response headers.
Yes, CVE-2022-1954 affects both GitLab Community Edition (CE) and Enterprise Edition (EE) versions.