First published: Mon Oct 17 2022(Updated: )
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions before before 15.2.5, all versions starting from 15.3 before 15.3.4, all versions starting from 15.4 before 15.4.1 While cloning an issue with special crafted content added to the description could have been used to trigger high CPU usage.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <15.2.5 | |
GitLab | <15.2.5 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.3<15.3.4 | |
GitLab | >=15.4<15.4.1 | |
GitLab | >=15.4<15.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3283 is classified as a potential denial-of-service (DoS) vulnerability.
To remediate CVE-2022-3283, upgrade GitLab to version 15.2.5 or later, or to versions 15.3.4 or later, or to version 15.4.1 or later.
CVE-2022-3283 affects all GitLab CE/EE versions before 15.2.5, versions from 15.3 before 15.3.4, and versions from 15.4 before 15.4.1.
CVE-2022-3283 can be exploited through specially crafted content in the description while cloning an issue, leading to a potential denial-of-service.
While CVE-2022-3283 is not classified as critical, it poses a risk of denial-of-service that organizations should address promptly.