First published: Fri Oct 21 2022(Updated: )
A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 10.8 before 15.1.6, all versions starting from 15.2 before 15.2.4, all versions starting from 15.3 before 15.3.2. Improper data handling on branch creation could have been used to trigger high CPU usage.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=10.8.0<15.1.6 | |
GitLab | >=15.2<15.2.4 | |
GitLab | >=15.3<15.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3639 has a moderate severity level due to its potential to cause denial-of-service (DOS) conditions.
To fix CVE-2022-3639, you should upgrade your GitLab instance to version 15.1.6, 15.2.4 or 15.3.2 or higher.
CVE-2022-3639 affects all GitLab versions from 10.8 before 15.1.6, from 15.2 before 15.2.4, and from 15.3 before 15.3.2.
CVE-2022-3639 is a potential denial-of-service (DOS) vulnerability caused by improper data handling during branch creation.
An attacker could exploit CVE-2022-3639 to trigger high CPU usage on the affected GitLab server, affecting its availability.