First published: Thu May 09 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. The pins endpoint is susceptible to DoS through a crafted request.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.11.0<16.9.7 | |
GitLab | >=15.11.0<16.9.7 | |
GitLab | >=16.10.0<16.10.5 | |
GitLab | >=16.10.0<16.10.5 | |
GitLab | >=16.11.0<16.11.2 | |
GitLab | >=16.11.0<16.11.2 |
Upgrade to versions 16.9.7, 16.10.5, 16.11.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2454 is classified as a denial of service vulnerability impacting GitLab CE/EE.
To mitigate CVE-2024-2454, upgrade GitLab to version 16.9.7 or later, 16.10.5 or later, or 16.11.2 or later.
CVE-2024-2454 affects GitLab versions starting from 15.11 up to 16.9.7, from 16.10 up to 16.10.5, and from 16.11 up to 16.11.2.
Yes, CVE-2024-2454 affects both GitLab Community Edition (CE) and Enterprise Edition (EE).
CVE-2024-2454 enables denial of service attacks through crafted requests to the pins endpoint.