First published: Fri Jan 12 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions from 12.2 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which an attacker could potentially modify the metadata of signed commits.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=12.2.0<16.5.6 | |
GitLab | >=12.2.0<16.5.6 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | >=16.6.0<16.6.4 | |
GitLab | =16.7.0 | |
GitLab | =16.7.0 | |
GitLab | =16.7.1 | |
GitLab | =16.7.1 |
Upgrade to versions 16.5.6, 16.6.4, 16.7.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2030 is a critical vulnerability that allows an attacker to modify the metadata of signed commits in GitLab.
To fix CVE-2023-2030, upgrade GitLab to version 16.5.6, 16.6.4, or 16.7.2 or later.
CVE-2023-2030 affects all GitLab CE/EE versions from 12.2 up to, but not including, 16.5.6, 16.6 up to 16.6.4, and 16.7 up to 16.7.2.
CVE-2023-2030 affects both GitLab Community Edition and Enterprise Edition installations.
Yes, CVE-2023-2030 can be exploited remotely, allowing attackers to tamper with signed commit metadata.