First published: Thu Aug 08 2024(Updated: )
A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab | >=15.9.0<17.0.6 | |
GitLab | >=15.9.0<17.0.6 | |
GitLab | >=17.1.0<17.1.4 | |
GitLab | >=17.1.0<17.1.4 |
Upgrade to versions 17.2.2, 17.1.4, 17.0.6 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7610 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2024-7610, upgrade GitLab to version 17.0.6 or later, 17.1.4 or later, or 17.2.2 or later.
CVE-2024-7610 affects all versions of GitLab starting from 15.9 and prior to versions 17.0.6, 17.1.4, and 17.2.2.
CVE-2024-7610 can lead to catastrophic backtracking while parsing results from Elasticsearch, resulting in service interruptions.
Yes, CVE-2024-7610 can potentially be exploited remotely by an attacker.