First published: Mon Oct 17 2022(Updated: )
A potential DoS vulnerability was discovered in Gitlab CE/EE versions starting from 10.7 before 15.1.5, all versions starting from 15.2 before 15.2.3, all versions starting from 15.3 before 15.3.1 allowed an attacker to trigger high CPU usage via a special crafted input added in the Commit message field.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.7.0<15.1.5 | |
GitLab | >=10.7.0<15.1.5 | |
GitLab | >=15.2<15.2.3 | |
GitLab | >=15.2<15.2.3 | |
GitLab | >=15.3<15.3.1 | |
GitLab | >=15.3<15.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2908 is classified as a denial of service (DoS) vulnerability, which can lead to high CPU usage.
To mitigate CVE-2022-2908, update GitLab to version 15.1.5 or later, 15.2.3 or later, or 15.3.1 or later.
CVE-2022-2908 affects GitLab CE/EE versions starting from 10.7 up to 15.3 before 15.3.1.
CVE-2022-2908 is caused by a specially crafted input in the commit message that can trigger excessive CPU usage.
Yes, CVE-2022-2908 can be exploited remotely by sending a specially crafted commit message.