First published: Thu Aug 08 2024(Updated: )
ReDoS flaw in RefMatcher when matching branch names using wildcards in GitLab EE/CE affecting all versions from 11.3 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allows denial of service via Regex backtracking.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.3.0<17.0.6 | |
GitLab | >=11.3.0<17.0.6 | |
GitLab | >=17.1.0<17.1.4 | |
GitLab | >=17.1.0<17.1.4 |
Upgrade to versions 17.2.2, 17.1.4, 17.0.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2800 has been classified with a high severity due to its potential to cause denial of service through Regex backtracking.
To resolve CVE-2024-2800, upgrade your GitLab to version 17.0.6 or later for branch names matching wildcards.
CVE-2024-2800 affects all versions of GitLab from 11.3 up to and including 17.0.6, along with specific versions 17.1 up to 17.1.4 and 17.2 up to 17.2.2.
CVE-2024-2800 enables a ReDoS (Regular Expression Denial of Service) attack that can render the application unresponsive.
Yes, CVE-2024-2800 affects both GitLab Enterprise Edition (EE) and Community Edition (CE) across the specified versions.