First published: Thu Mar 28 2024(Updated: )
An issue has been discovered in GitLab CE/EE affecting all versions before 16.8.5, all versions starting from 16.9 before 16.9.3, all versions starting from 16.10 before 16.10.1. It was possible for an attacker to cause a denial of service using malicious crafted description parameter for labels.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | <16.8.5 | |
GitLab | <16.8.5 | |
GitLab | >=16.9.0<16.9.3 | |
GitLab | >=16.9.0<16.9.3 | |
GitLab | =16.10.0 | |
GitLab | =16.10.0 |
Upgrade to versions 16.8.5, 16.9.3, 16.10.1 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2818 is categorized as a medium severity vulnerability affecting specific versions of GitLab.
To mitigate the effects of CVE-2024-2818, upgrade GitLab to version 16.8.5 or later, or to 16.9.3 or later.
CVE-2024-2818 affects all versions of GitLab before 16.8.5, and versions starting from 16.9 before 16.9.3, as well as 16.10.0.
CVE-2024-2818 allows attackers to conduct a denial of service attack via a maliciously crafted description parameter.
There are no known workarounds for CVE-2024-2818; upgrading to a patched version is the recommended approach.