First published: Tue Nov 26 2024(Updated: )
A denial of service (DoS) condition was discovered in GitLab CE/EE affecting all versions from 13.2.4 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls. This was a regression of an earlier patch.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=13.2.4<17.4.5 | |
GitLab | >=13.2.4<17.4.5 | |
GitLab | >=17.5.0<17.5.3 | |
GitLab | >=17.5.0<17.5.3 | |
GitLab | =17.6.0 | |
GitLab | =17.6.0 |
Upgrade to versions 17.4.5, 17.5.3, 17.6.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11828 has been classified as a denial of service (DoS) vulnerability affecting multiple versions of GitLab.
To remediate CVE-2024-11828, upgrade your GitLab installation to version 17.4.6 or later, or 17.5.3 or later.
CVE-2024-11828 affects GitLab versions from 13.2.4 to 17.4.5, as well as 17.5.0 to 17.5.2 and version 17.6.0.
CVE-2024-11828 can be exploited through crafted API calls leading to a denial of service condition.
No official workaround is provided for CVE-2024-11828; the recommended action is to apply the necessary updates.