First published: Mon Oct 17 2022(Updated: )
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Malformed content added to the issue description could have been used to trigger high CPU usage.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.1.6 | |
GitLab | <15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2931 has a high severity rating due to its potential to cause denial of service (DoS) by consuming high CPU resources.
To fix CVE-2022-2931, you should upgrade your GitLab instance to version 15.1.6 or above, or to a secure version above 15.2.4 or 15.3.2.
CVE-2022-2931 affects all versions of GitLab before 15.1.6, as well as versions starting from 15.2 up to 15.2.4 and from 15.3 up to 15.3.2.
CVE-2022-2931 can be triggered by adding malformed content to the issue description in GitLab.
There is no official workaround for CVE-2022-2931, and users are advised to upgrade to a patched version as soon as possible.