First published: Thu Aug 08 2024(Updated: )
An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=11.10.0<17.0.6 | |
GitLab | >=11.10.0<17.0.6 | |
GitLab | >=17.1.0<17.1.4 | |
GitLab | >=17.1.0<17.1.4 |
Upgrade to versions 17.2.2, 17.1.4, 17.0.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3114 has a moderate severity level due to its potential for causing a denial of service (DoS) through regular expression processing.
To fix CVE-2024-3114, update your GitLab installation to version 17.0.6 or newer, or version 17.1.4 or newer, or version 17.2.2 or newer.
CVE-2024-3114 affects all GitLab CE and EE versions from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2.
CVE-2024-3114 can lead to a denial of service attack on the server due to improper processing of invalid commit parsing.
CVE-2024-3114 affects both the Community and Enterprise editions of GitLab across the specified versions.