First published: Mon Oct 17 2022(Updated: )
An unhandled exception in job log parsing in GitLab CE/EE affecting all versions prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an attacker to prevent access to job logs
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.2.5 | |
GitLab | <15.2.5 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.4<15.4.1 | |
GitLab | >=15.4<15.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3279 is classified as a medium severity vulnerability.
To fix CVE-2022-3279, you should upgrade GitLab to version 15.2.5 or later, or to version 15.3.4 or later, or to version 15.4.1 or later.
CVE-2022-3279 allows an attacker to prevent access to job logs in affected versions of GitLab.
CVE-2022-3279 affects all versions of GitLab prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1.
Yes, both GitLab Community Edition (CE) and Enterprise Edition (EE) are impacted by CVE-2022-3279.