HomeCII/OTGitLab Critical Patches Released - Version 17.4.2, 17.3.5, 17.2.9

GitLab Critical Patches Released – Version 17.4.2, 17.3.5, 17.2.9

Published on

spot_img

GitLab recently made headlines with the release of critical patches for its Community Edition (CE) and Enterprise Edition (EE) in versions 17.4.2, 17.3.5, and 17.2.9. These patches are considered essential for all self-managed GitLab installations in order to address various vulnerabilities and potential bugs that could jeopardize user data and system security.

The company has emphasized the importance of these updates, stressing that all users should upgrade their installations promptly to ensure the protection of user data and maintain compliance with GitLab’s stringent security standards. While GitLab.com has already implemented the patched versions, GitLab Dedicated customers are reassured that they do not require immediate action on their part.

GitLab follows a clear release schedule that includes both planned releases and critical patches as needed. Scheduled releases take place twice a month on the second and fourth Wednesdays, while critical patches are issued to address high-severity vulnerabilities as they arise. Users can refer to GitLab’s release handbook and security FAQ for more information on release schedules.

In a display of transparency, GitLab makes details about each vulnerability publicly available on their issue tracker 30 days after the patch is released. This level of transparency enables users to stay informed about potential threats and the steps taken to mitigate them.

The latest critical patches from GitLab target various vulnerabilities within the platform, each categorized by severity. Some of the key issues addressed include:

1. Critical Vulnerability: Running Pipelines on Arbitrary Branches (CVE-2024-9164)
– This critical vulnerability allowed attackers to run pipelines on arbitrary branches across multiple versions, posing a threat with a CVSS score of 9.6.

2. High Severity: Impersonating Arbitrary Users (CVE-2024-8970)
– Another significant vulnerability enabled attackers to trigger pipelines as another user under specific conditions, affecting versions from 11.6 to 17.4.2 and receiving a high CVSS score of 8.2.

3. High Severity: SSRF in Analytics Dashboard (CVE-2024-8977)
– Instances with Product Analytics Dashboard enabled were vulnerable to Server-Side Request Forgery (SSRF) attacks, rated high with a CVSS score of 8.2.

4. High Severity: Slow Diffs of Merge Requests with Conflicts (CVE-2024-9631)
– Viewing merge request diffs containing conflicts was slowed down by processing inefficiencies, impacting versions from 13.6 and receiving a high severity rating of 7.5.

5. High Severity: HTML Injection in OAuth Page (CVE-2024-6530)
– A cross-site scripting (XSS) vulnerability allowed unauthorized HTML rendering when authorizing new applications, rated with a severity of 7.3.

6. Medium Severity: Deploy Keys Pushing Changes to Archived Repositories (CVE-2024-9623)
– A medium severity issue was identified where deploy keys could push changes to archived repositories, affecting versions from 8.16.

7. Low Severity: GitLab Instance Version Disclosure (CVE-2024-9596)
– A low-severity issue allowed unauthenticated attackers to discover the version number of a GitLab instance, highlighting the importance of securing system configurations.

Given the seriousness of these vulnerabilities, GitLab strongly urges all affected users to upgrade to the latest patch releases promptly. Users can benefit significantly from these updates, whether they are self-managed or cloud users of GitLab. Detailed guidance on updating GitLab installations and GitLab Runner can be found on the respective update pages.

In conclusion, GitLab’s commitment to security and proactive approach to addressing vulnerabilities demonstrate the company’s dedication to safeguarding user data and ensuring the integrity of its platform. Users are encouraged to stay vigilant and prioritize updating their installations to mitigate potential risks and uphold system security.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...