First published: Thu May 09 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. It was possible for an attacker to cause a denial of service using maliciously crafted markdown content.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.9.7 | |
GitLab | <16.9.7 | |
GitLab | >=16.10.0<16.10.5 | |
GitLab | >=16.10.0<16.10.5 | |
GitLab | >=16.11.0<16.11.2 | |
GitLab | >=16.11.0<16.11.2 |
Upgrade to versions 16.9.7, 16.10.5, 16.11.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2651 has been classified as a denial of service vulnerability that can impact the availability of GitLab.
To fix CVE-2024-2651, upgrade your GitLab installation to version 16.9.7 or later, or versions 16.10.5 and above, or versions 16.11.2 and above.
CVE-2024-2651 affects all versions of GitLab prior to 16.9.7, from 16.10.0 up to but not including 16.10.5, and from 16.11.0 up to but not including 16.11.2.
CVE-2024-2651 allows attackers to perform a denial of service attack using maliciously crafted markdown content.
CVE-2024-2651 is present in both GitLab Community Edition (CE) and GitLab Enterprise Edition (EE) across the specified affected versions.