A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-24443 A potential DOS vulnerability was discovered in GitLab CE/EE affecting all versions from 13.1 prior to 14.7.7, 14.8.0 prior to 14.8.5, and 14.9.0 prior to 14.9.2. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2024-08-02T23:55:23.609Z

Reserved: 2022-03-25T00:00:00

Link: CVE-2022-1100

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-04T20:15:09.647

Modified: 2024-11-21T06:40:02.050

Link: CVE-2022-1100

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.