<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom"><title>GitLab Security & Patch Releases</title><id>https://docs.gitlab.com/releases/</id><link href="https://docs.gitlab.com/releases/" rel="alternate"/><updated>2026-04-22T00:00:00Z</updated><author><name>The GitLab Team</name></author><entry><title>GitLab Patch Release: 18.11.1, 18.10.4, 18.9.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-1-released/</id><published>2026-04-22T00:00:00Z</published><updated>2026-04-22T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 22, 2026, we released versions 18.11.1, 18.10.4, 18.9.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-4922---cross-site-request-forgery-issue-in-graphql-api-impacts-gitlab-ceee">Cross-Site Request Forgery issue in GraphQL API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-5816---improper-resolution-of-path-equivalence-issue-in-web-ide-asset-impacts-gitlab-ceee">Improper Resolution of Path Equivalence issue in Web IDE asset impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-5262---cross-site-scripting-issue-in-storybook-impacts-gitlab-ceee">Cross-site Scripting issue in Storybook impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2025-0186---denial-of-service-issue-in-discussions-endpoint-impacts-gitlab-ceee">Denial of Service issue in discussions endpoint impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-1660---denial-of-service-issue-in-jira-import-impacts-gitlab-ceee">Denial of Service issue in Jira import impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2025-6016---denial-of-service-issue-in-notes-endpoint-impacts-gitlab-ceee">Denial of Service issue in notes endpoint impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2025-3922---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee">Denial of Service issue in GraphQL API impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-6515---insufficient-session-expiration-issue-in-virtual-registry-credentials-validation-impacts-gitlab-ceee">Insufficient Session Expiration issue in virtual registry credentials validation impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-5377---improper-access-control-issue-in-issue-description-renderer-impacts-gitlab-ceee">Improper Access Control issue in issue description renderer impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2026-3254---improper-restriction-of-rendered-ui-layers-or-frames-issue-in-mermaid-sandbox-impacts-gitlab-ceee">Improper Restriction of Rendered UI Layers or Frames issue in Mermaid sandbox impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-11-1-released/#cve-2025-9957---improper-access-control-issue-in-project-fork-relationship-api-impacts-gitlab-ceee">Improper Access Control issue in project fork relationship API impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2026-4922---cross-site-request-forgery-issue-in-graphql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-4922">CVE-2026-4922</a> - Cross-Site Request Forgery issue in GraphQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to execute GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 8.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-5816---improper-resolution-of-path-equivalence-issue-in-web-ide-asset-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-5816">CVE-2026-5816</a> - Improper Resolution of Path Equivalence issue in Web IDE asset impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user&rsquo;s browser session due to improper path validation under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 8.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-5262---cross-site-scripting-issue-in-storybook-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-5262">CVE-2026-5262</a> - Cross-site Scripting issue in Storybook impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an unauthenticated user to access tokens in the Storybook development environment due to improper input validation.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.1 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 8.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-0186---denial-of-service-issue-in-discussions-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-0186">CVE-2025-0186</a> - Denial of Service issue in discussions endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause denial of service under certain conditions by exhausting server resources by making crafted requests to a discussions endpoint.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 10.6 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1660---denial-of-service-issue-in-jira-import-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1660">CVE-2026-1660</a> - Denial of Service issue in Jira import impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated user to cause denial of service when importing issues due to improper input validation.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 12.3 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-6016---denial-of-service-issue-in-notes-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6016">CVE-2025-6016</a> - Denial of Service issue in notes endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause denial of service due to insufficient resource allocation limits when retrieving notes under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 9.2 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-3922---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-3922">CVE-2025-3922</a> - Denial of Service issue in GraphQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause denial of service by overwhelming system resources under certain conditions due to insufficient resource allocation limits in the GraphQL API.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 12.4 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-6515---insufficient-session-expiration-issue-in-virtual-registry-credentials-validation-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-6515">CVE-2026-6515</a> - Insufficient Session Expiration issue in virtual registry credentials validation impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a user to use invalidated or incorrectly scoped credentials to access Virtual Registries under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.2 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 5.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member David Fernandez</p>
<h3 id="cve-2026-5377---improper-access-control-issue-in-issue-description-renderer-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-5377">CVE-2026-5377</a> - Improper Access Control issue in issue description renderer impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to access titles of confidential or private issues in public projects due to improper access control in the issue description rendering process.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-3254---improper-restriction-of-rendered-ui-layers-or-frames-issue-in-mermaid-sandbox-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-3254">CVE-2026-3254</a> - Improper Restriction of Rendered UI Layers or Frames issue in Mermaid sandbox impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated user to load unauthorized content into another user&rsquo;s browser due to improper input validation in the Mermaid sandbox.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-9957---improper-access-control-issue-in-project-fork-relationship-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-9957">CVE-2025-9957</a> - Improper Access Control issue in project fork relationship API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated user with project owner permissions to bypass group fork prevention settings due to improper authorization checks.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.2 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 <br>
<strong>CVSS</strong> 2.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="18111">18.11.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231458">Backport- Use force_index_repo task type for Zoekt schema_version bump reindexing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231430">Backport docs: Update PostgreSQL version documentation for PG17</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231810">[18.11] Skip re-creating of constraint when migration spec is skipped</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231737">Backport of &quot; 18.11 What&rsquo;s new&quot;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231836">Revert &ldquo;Merge branch &lsquo;renovate-ci-templates/auto-build-image-4.x&rsquo; into &lsquo;v18.11.0-ee&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231856">Backport of &ldquo;BBM - Skip 3 migrations referencing dropped tables&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/232147">[18.11] Fix session ID dropdown never appearing during active agentic chat</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231844">Backport of &lsquo;Fix JSON tables with non-string values&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9334">18.11 - Cherry-pick !9288 and !9311 - Remove PackageCloud CI and rename pulp jobs</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9339">Backport of &lsquo;Remove package OS check from deployer task&rsquo; - 18.11</a></li>
</ul>
<h3 id="18104">18.10.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8675">[18.10] Scope start-rails-specs changes rule to MR pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229960">Backport of &lsquo;Fix runner token reset returning 500 for unassigned project runners&rsquo; to 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230426">Backport of &lsquo;Fix flaky new_project_spec.rb by scoping within pane&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230319">18.10 Backport of &lsquo;Update rack to 2.2.23&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230677">Backport of &ldquo;Skip BBMs referencing dropped tables in single-record bug retry&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230794">Backport of Added reload to address flaky pipeline spec race condition</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229886">Backport GITLAB_ZOEKT_INDEXER v1.11.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230785">Backport of Fix flaky tests for ui_variable_non_inheritable_when_forward_pipeline_variables_false_spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230877">Backport of &lsquo;Skip CI finished builds backfill when ClickHouse is not configured&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230978">Backport to 18.10: Geo: Run concurrency limit worker on secondary sites</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231161">Backport of &lsquo;Geo: Switch blob download to use GitLab::HTTP to avoid llhttp-ffi issue&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231496">Backport of Release environment deploy needs Omnibus package - 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231460">Backport- Use force_index_repo task type for Zoekt schema_version bump reindexing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231085">Backport of  add feature flag to gate default Sidekiq concurrency limit calculation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231811">[18.10] Skip re-creating of constraint when migration spec is skipped</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231082">Docs backport: Add note about Agent Platform flow configurations not available until 18.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231160">Backport of praba/release-connections-from-all-hosts and stomlinson/feature-check-dead-connections to 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231988">Backport to 18.10: Geo: Fix site validation when outbound request filtering is enabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9264">Ensure postgresql_new is included in GitLab CE</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9291">18.10 backport of &lsquo;Update rack to 2.2.23&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9302">Upgrade postgresql-17 to 17.8 for 18-10-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9303">Upgrade postgresql-16 to 16.13 for 18-10-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9308">Backport: fix: Set sv timeout when restarting Gitaly to 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9314">[18.10] Remove Mattermost for SLES-12.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9335">18.10 - Cherry-pick !9288 and !9311 - Remove PackageCloud CI and rename pulp jobs</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9340">Backport of &lsquo;Remove package OS check from deployer task&rsquo; - 18.10</a></li>
</ul>
<h3 id="1896">18.9.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2896">chore: bump gitlab-zoekt to v1.8.2 on 18-9-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8676">[18.9] Scope start-rails-specs changes rule to MR pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231281">18.9 Backport of &lsquo;update zlib to 3.2.3&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231207">Backport to 18.9: Geo: Run concurrency limit worker on secondary sites</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231497">Backport of Release environment deploy needs Omnibus package - 18.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231461">Backport- Use force_index_repo task type for Zoekt schema_version bump reindexing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231812">[18.9] Skip re-creating of constraint when migration spec is skipped</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231083">Docs backport: Add note about Agent Platform flow configurations not available until 18.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231297">Backport of  add feature flag to gate default Sidekiq concurrency limit calculation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231352">Backport GITLAB_ZOEKT_INDEXER v1.8.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/231990">Backport to 18.9: Geo: Fix site validation when outbound request filtering is enabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9298">Backport: Ensure postgresql_new is included in GitLab CE</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9292">18.9 backport of &lsquo;Update rack to 2.2.23&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9305">Upgrade postgresql-17 to 17.8 for 18-9-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9306">Upgrade postgresql-16 to 16.13 for 18-9-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9309">Backport: fix: Set sv timeout when restarting Gitaly to 18.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9315">[18.9] Remove Mattermost for SLES-12.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9336">18.9 - Cherry-pick !9288 and !9311 - Remove PackageCloud CI and rename pulp jobs</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9297">Remove .gitlab folder under package gitlab-rails</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9341">Backport of &lsquo;Remove package OS check from deployer task&rsquo; - 18.9</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="regular-migrations">Regular migrations</h3>
<p>The following versions include regular migrations that run during the upgrade process:</p>
<ul>
<li>18.11.1</li>
<li>18.10.4</li>
<li>18.9.6</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.11.1</li>
<li>18.10.4</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->
]]></content></entry><entry><title>GitLab Patch Release: 18.10.3, 18.9.5, 18.8.9</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-10-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-10-3-released/</id><published>2026-04-08T00:00:00Z</published><updated>2026-04-08T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 8, 2026, we released versions 18.10.3, 18.9.5, 18.8.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-5173---exposed-method-issue-in-websocket-connections-impacts-gitlab-ceee">Exposed Method issue in websocket connections impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-1092---denial-of-service-issue-in-terraform-state-lock-api-impacts-gitlab-ceee">Denial of Service issue in Terraform state lock API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2025-12664---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee">Denial of Service issue in GraphQL API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-1403---denial-of-service-issue-in-csv-import-impacts-gitlab-ceee">Denial of Service issue in CSV import impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-1101---denial-of-service-issue-in-graphql-sbom-api-impacts-gitlab-ee">Denial of Service issue in GraphQL SBOM API impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-1516---code-injection-issue-in-code-quality-reports-impacts-gitlab-ee">Code Injection issue in Code Quality reports impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-4332---cross-site-scripting-issue-in-analytics-dashboards-impacts-gitlab-ee">Cross-site Scripting issue in analytics dashboards impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-2619---incorrect-authorization-issue-in-vulnerability-flags-ai-detection-api-impacts-gitlab-ee">Incorrect Authorization issue in vulnerability flags AI detection API impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2025-9484---information-disclosure-issue-in-certain-graphql-query-impacts-gitlab-ee">Information disclosure issue in certain GraphQl query impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-1752---improper-access-control-issue-in-environments-api-impacts-gitlab-ee">Improper Access Control issue in Environments API impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-2104---information-disclosure-issue-in-csv-export-impacts-gitlab-ceee">Information disclosure issue in CSV export impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-3-released/#cve-2026-4916---missing-authorization-issue-in-custom-role-permissions-impacts-gitlab-ceee">Missing Authorization issue in custom role permissions impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2026-5173---exposed-method-issue-in-websocket-connections-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-5173">CVE-2026-5173</a> - Exposed Method issue in websocket connections impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to invoke unintended server-side methods through websocket connections due to improper access control.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 8.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member Simon Tomlinson</p>
<h3 id="cve-2026-1092---denial-of-service-issue-in-terraform-state-lock-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1092">CVE-2026-1092</a> - Denial of Service issue in Terraform state lock API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause denial of service due to improper input validation of JSON payloads.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 12.10 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12664---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12664">CVE-2025-12664</a> - Denial of Service issue in GraphQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL queries.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 13.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/foxribeye">foxribeye</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1403---denial-of-service-issue-in-csv-import-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1403">CVE-2026-1403</a> - Denial of Service issue in CSV import impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that when importing CSV files could have allowed an authenticated user to cause denial of service to Sidekiq workers due to improper validation of CSV file structure.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.7 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1101---denial-of-service-issue-in-graphql-sbom-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1101">CVE-2026-1101</a> - Denial of Service issue in GraphQL SBOM API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause denial of service to the GitLab instance due to improper input validation in GraphQL queries.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1516---code-injection-issue-in-code-quality-reports-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1516">CVE-2026-1516</a> - Code Injection issue in Code Quality reports impacts GitLab EE</h3>
<p>GitLab has remediated an issue that in Code Quality reports could have allowed an authenticated user to leak IP addresses of users viewing the report via specially crafted content.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.0.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 5.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/maksyche">maksyche</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-4332---cross-site-scripting-issue-in-analytics-dashboards-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-4332">CVE-2026-4332</a> - Cross-site Scripting issue in analytics dashboards impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, in customizable analytics dashboards, could have allowed an authenticated user to execute arbitrary JavaScript in the context of other users&rsquo; browsers due to improper input sanitization.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 5.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-2619---incorrect-authorization-issue-in-vulnerability-flags-ai-detection-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2619">CVE-2026-2619</a> - Incorrect Authorization issue in vulnerability flags AI detection API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that under certain circumstances could have allowed an authenticated user with auditor privileges to modify vulnerability flag data in private projects due to incorrect authorization.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sage_cyberlord">sage_cyberlord</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-9484---information-disclosure-issue-in-certain-graphql-query-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-9484">CVE-2025-9484</a> - Information Disclosure issue in certain GraphQl query impacts GitLab EE</h3>
<p>GitLab has remediated an issue that under certain circumstances could have allowed an authenticated user to have access to other users&rsquo; email addresses via certain GraphQL queries.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 16.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1752---improper-access-control-issue-in-environments-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1752">CVE-2026-1752</a> - Improper Access Control issue in Environments API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with developer-role permissions to modify protected environment settings due to improper authorization checks in the API.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 11.3 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/modhanami">modhanami</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-2104---information-disclosure-issue-in-csv-export-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2104">CVE-2026-2104</a> - Information Disclosure issue in CSV export impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to access confidential issues assigned to other users via CSV export due to insufficient authorization checks.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-4916---missing-authorization-issue-in-custom-role-permissions-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-4916">CVE-2026-4916</a> - Missing Authorization issue in custom role permissions impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with custom role permissions to demote or remove higher-privileged group members due to improper authorization checks on member management operations.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.2 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 <br>
<strong>CVSS</strong> 2.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="18103">18.10.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228257">Fix regression: &ldquo;Git operations for Deploy keys fail on a Geo Site&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227862">18.10 Backport of &lsquo;Stop archiving projects when marking for deletion&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228765">[18.10] Ignore Net::SMTPServerBusy errors in SLIs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228570">[Backport] Add improvements to migration helper so that the backfill migration completes faster</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228968">[BACKPORT] Fix agentic flows for DAP self-hosted</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228728">Backport of 594064-geo-handle-record-not-found-on-sync to 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9250">[18.10] Fix AmazonLinux 2023 not working with epoll_pwait2 glibc call</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9257">18.10 - Stop uploading packages to PackageCloud</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229095">Backport of Match MergeRequests::ApplicationController auth checks in MCP conflicts tool</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229203">Backport of &lsquo;Add null user guard to adjourned group deletion service&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229448">[18.10] Fix composite identity support for dependency proxy access</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2889">[18.10] Revert &ldquo;Merge branch &lsquo;segregate-buildx-build-among-rails-ce-and-ee&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2888">chore: bump gitlab-zoekt to v1.11.1 on 18-10-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229779">Backport of Validate parallel:matrix expanded job name length</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229852">Fix flaky spec in spec/requests/api/merge_requests_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229869">Backport of Fix remaining failures in new_project_spec.rb after !228726</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230008">Backport of &lsquo;Fixes <code>gitlab-rspec</code> test failures on stable branches&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229844">Backport of &lsquo;Upgrade http and llhttp-ffi&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230127">Backport &lsquo;595107/fix-model-selection-ui-regression&rsquo; into 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9269">[18.10] Remove me-south-1 region from AMI publishing list</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9280">Backport 18.10: Do not include Spamcheck with the SLES12 package</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9282">Backport 18-10: Set strategy:mirror to propagate downstream failure on check-packages-functionality trigger job</a></li>
</ul>
<h3 id="1895">18.9.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228269">Fix regression: &ldquo;Git operations for Deploy keys fail on a Geo Site&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227869">18.9 Backport of &lsquo;Stop archiving projects when marking for deletion&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228970">[BACKPORT] Fix agentic flows for DAP self-hosted</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228725">Backport of 594064-geo-handle-record-not-found-on-sync to 18.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9249">[18.9] Fix AmazonLinux 2023 not working with epoll_pwait2 glibc call</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9258">18.9 - Stop uploading packages to PackageCloud</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229454">[18.9] Fix composite identity support for dependency proxy access</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229790">Fix flaky spec in spec/requests/api/merge_requests_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229871">Backport of Fix remaining failures in new_project_spec.rb after !228726</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230128">Backport &lsquo;595107/fix-model-selection-ui-regression&rsquo; into 18.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9270">[18.9] Remove me-south-1 region from AMI publishing list</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9281">Backport 18.9: Do not include Spamcheck with the SLES12 package</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9283">Backport 18-9: Set strategy:mirror to propagate downstream failure on check-packages-functionality trigger job</a></li>
</ul>
<h3 id="1889">18.8.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228271">Fix regression: &ldquo;Git operations for Deploy keys fail on a Geo Site&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228056">18.8 Backport of &lsquo;Stop archiving projects when marking for deletion&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228731">Backport of 594064-geo-handle-record-not-found-on-sync to 18.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228974">[BACKPORT] Fix agentic flows for DAP self-hosted</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9259">18.8 - Stop uploading packages to PackageCloud</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9248">[18.8] Fix AmazonLinux 2023 not working with epoll_pwait2 glibc call</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/229874">Backport of Fix remaining failures in new_project_spec.rb after !228726</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/230129">Backport &lsquo;595107/fix-model-selection-ui-regression&rsquo; into 18.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9271">[18.8] Remove me-south-1 region from AMI publishing list</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9284">Backport 18-8: Set strategy:mirror to propagate downstream failure on check-packages-functionality trigger job</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>These versions do not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<p>The SLES 12.5 packages for 18.10.3 and 18.9.5 are not present in this release.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<p>Note: GitLab releases have skipped 18.10.2, 18.9.4 and 18.8.8. There are no patches with these version numbers.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.10.1, 18.9.3, 18.8.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-10-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-10-1-released/</id><published>2026-03-25T00:00:00Z</published><updated>2026-03-25T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On March 25, 2026, we released versions 18.10.1, 18.9.3, 18.8.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-2370---improper-handling-of-parameters-issue-in-jira-connect-installations-impacts-gitlab-ceee">Improper Handling of Parameters issue in Jira Connect installations impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-3857---cross-site-request-forgery-issue-in-glql-api-impacts-gitlab-ceee">Cross-Site Request Forgery issue in GLQL API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-2995---html-injection-in-vulnerability-report-impacts-gitlab-ee">HTML Injection in vulnerability report impacts GitLab EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-3988---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee">Denial of Service issue in GraphQL API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-2745---improper-access-control-issue-in-webauthn-2fa-impacts-gitlab-ceee">Improper Access Control issue in WebAuthn 2FA impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-1724---improper-access-control-issue-in-graphql-query-impacts-gitlab-ee">Improper Access Control issue in GraphQL query impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2025-13436---denial-of-service-issue-in-ci-configuration-processing-impacts-gitlab-ceee">Denial of Service issue in CI configuration processing impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2025-13078---denial-of-service-issue-in-webhook-configuration-impacts-gitlab-ceee">Denial of Service issue in webhook configuration impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-2973---cross-site-scripting-issue-in-mermaid-diagram-renderer-impacts-gitlab-ceee">Cross-site Scripting issue in Mermaid diagram renderer impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-2726---improper-access-control-issue-in-merge-requests-impacts-gitlab-ceee">Improper Access Control issue in Merge Requests impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2025-14595---access-control-issue-in-graphql-api-impacts-gitlab-ee">Access Control issue in GraphQL API impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-10-1-released/#cve-2026-4363---incorrect-authorization-issue-in-authorization-caching-impacts-gitlab-ee">Incorrect Authorization issue in authorization caching impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2026-2370---improper-handling-of-parameters-issue-in-jira-connect-installations-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2370">CVE-2026-2370</a> - Improper Handling of Parameters issue in Jira Connect installations impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue affecting Jira Connect installations that could have allowed an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab app due to improper authorization checks.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 8.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/maksyche">maksyche</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-3857---cross-site-request-forgery-issue-in-glql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-3857">CVE-2026-3857</a> - Cross-Site Request Forgery issue in GLQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 8.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-2995---html-injection-in-vulnerability-report-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2995">CVE-2026-2995</a> - HTML Injection in vulnerability report impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper sanitization of HTML content.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a_m_a_m">a_m_a_m</a> and <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-3988---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-3988">CVE-2026-3988</a> - Denial of Service issue in GraphQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance unresponsive due to improper input validation in GraphQL request processing.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/svalkanov">svalkanov</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-2745---improper-access-control-issue-in-webauthn-2fa-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2745">CVE-2026-2745</a> - Improper Access Control issue in WebAuthn 2FA impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to bypass WebAuthn two-factor authentication and gain unauthorized access to user accounts due to inconsistent input validation in the authentication process.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 7.11 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 6.8 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a0xnirudh">a0xnirudh</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-1724---improper-access-control-issue-in-graphql-query-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1724">CVE-2026-1724</a> - Improper Access Control issue in GraphQL query impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to access API tokens of self-hosted AI models due to improper access control.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 6.8 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/maksyche">maksyche</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-13436---denial-of-service-issue-in-ci-configuration-processing-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13436">CVE-2025-13436</a> - Denial of Service issue in CI configuration processing impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a denial of service due to excessive resource consumption when handling certain CI-related inputs.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 13.7 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-13078---denial-of-service-issue-in-webhook-configuration-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13078">CVE-2025-13078</a> - Denial of Service issue in webhook configuration impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a denial of service due to excessive resource consumption when processing certain webhook configuration inputs.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/lucky_luke">lucky_luke</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-2973---cross-site-scripting-issue-in-mermaid-diagram-renderer-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2973">CVE-2026-2973</a> - Cross-site Scripting issue in Mermaid diagram renderer impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to execute arbitrary JavaScript in a user&rsquo;s browser due to improper sanitization of entity-encoded content in Mermaid diagrams.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.7 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 5.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-2726---improper-access-control-issue-in-merge-requests-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2726">CVE-2026-2726</a> - Improper Access Control issue in Merge Requests impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to perform unauthorized actions on merge requests in other projects due to improper access control during cross-repository operations.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pkkr">pkkr</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-14595---access-control-issue-in-graphql-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14595">CVE-2025-14595</a> - Access Control issue in GraphQL API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated user with Planner role to view security category metadata and attributes in group security configuration due to improper access control.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.6 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/kamikaze1337">kamikaze1337</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-4363---incorrect-authorization-issue-in-authorization-caching-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-4363">CVE-2026-4363</a> - Incorrect Authorization issue in authorization caching impacts GitLab EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated user to gain unauthorized access to resources due to improper caching of authorization decisions.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.1 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 <br>
<strong>CVSS</strong> 3.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N</code></a>)</p>
<p>This vulnerability was discovered internally by GitLab team member Fred de Gier.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="18101">18.10.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8577">Backport gocloud version and checksum fix to 18-10 stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227950">[18.10] Zero downtime reindexing make setting async-durability optional</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227835">Backport &ldquo;CI: Update CNG mirror skip job regex&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227763">Backport of &lsquo;Revert Code review flow automatic reviews enabled by default for groups&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228063">Backport Handle http-abort panic and pass http execution error</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228199">Backport 18.10: Do not check column default in state machine initialization</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228241">Backport of What&rsquo;s new - 18.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228254">[18.10 Backport] Fix statement timeouts on p_ci_job_artifacts during pipeline deletion</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228389">Backport of &ldquo;Execute BBM affected by single record table bug&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228257">Fix regression: &ldquo;Git operations for Deploy keys fail on a Geo Site&rdquo;</a></li>
</ul>
<h3 id="1893">18.9.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8576">Backport gocloud version and checksum fix to 18-9 stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226264">[Backport 18.9] Fix gitlab:setup failure on fresh database</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226447">[18.9] Update dependency oj to v3.16.15</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226351">Backport of &lsquo;Use v-safe-html for commit.titleHtml in collapsible commit info&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226721">18.9 Backport of &lsquo;Fix re-archiving projects and subgroups after group unarchive&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227023">Backport of &lsquo;Fix edit in pipeline editor button not showing on ci file on file navigation&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227276">[18.9] GLQL advanced finder, remove project_ids</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227193">Backport of &lsquo;Update rack gem to 2.2.22&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227490">Backport <code>oj</code> and <code>oj-introspect</code> gem updates</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227473">[18.9] Exclude group-covered projects from search authorization to reduce redundant payload</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227834">Backport &ldquo;CI: Update CNG mirror skip job regex&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227951">[18.9] Zero downtime reindexing make setting async-durability optional</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228201">Backport 18.9: Do not check column default in state machine initialization</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227826">Backport of &ldquo;Execute BBM affected by single record table bug&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228255">[18.9 Backport] Fix statement timeouts on p_ci_job_artifacts during pipeline deletion</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228269">Fix regression: &ldquo;Git operations for Deploy keys fail on a Geo Site&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9198">Backport: Fix Valkey version detection</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9210">18.9 Backport CI: Fix the package install for zypper based distros</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9205">[18.9] Backport Mattermost Security Updates February 23, 2026</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9222">Backport 18-9-stable - check-packages uses Pulp</a></li>
</ul>
<h3 id="1887">18.8.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226555">Fix command execution race condition in Agentic Chat</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225307">Backport of &lsquo;fix: allow explain for all add ons&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226448">[18.8] Update dependency oj to v3.16.15</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226720">18.8 Backport of &lsquo;Fix re-archiving projects and subgroups after group unarchive&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225856">Add DAP self-hosted model DAP check in user_authorizable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227036">Backport of &lsquo;Fix edit in pipeline editor button not showing on ci file on file navigation&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227277">[18.8] GLQL advanced finder, remove project_ids</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227488">Backport <code>oj</code> and <code>oj-introspect</code> gem updates</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227202">Backport of &lsquo;Update rack gem to 2.2.22&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227832">Backport &ldquo;CI: Update CNG mirror skip job regex&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227474">[18.8] Exclude group-covered projects from search authorization to reduce redundant payload</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/227952">[18.8] Zero downtime reindexing make setting async-durability optional</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228000">Backport of &ldquo;Execute BBM affected by single record table bug&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228256">[18.8 Backport] Fix statement timeouts on p_ci_job_artifacts during pipeline deletion</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/228271">Fix regression: &ldquo;Git operations for Deploy keys fail on a Geo Site&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9211">18.8 Backport CI: Fix the package install for zypper based distros</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9206">[18.8] Backport Mattermost Security Updates February 23, 2026</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9223">Backport 18-8-stable - check-packages uses Pulp</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>The SLES 12.5 package is not available for GitLab 18.10.1.</p>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.10.1</li>
<li>18.9.3</li>
<li>18.8.7</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.9.2, 18.8.6, 18.7.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-9-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-9-2-released/</id><published>2026-03-11T00:00:00Z</published><updated>2026-03-11T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On March 11, 2026, we released versions 18.9.2, 18.8.6, 18.7.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-1090---cross-site-scripting-issue-in-markdown-placeholder-processing-impacts-gitlab-ceee">Cross-site Scripting issue in Markdown placeholder processing impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-1069---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee">Denial of Service issue in GraphQL API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-13929---denial-of-service-issue-in-repository-archive-endpoint-impacts-gitlab-ceee">Denial of Service issue in repository archive endpoint impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-14513---denial-of-service-issue-in-protected-branches-api-impacts-gitlab-ceee">Denial of Service issue in protected branches API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-13690---denial-of-service-issue-in-webhook-custom-headers-impacts-gitlab-ceee">Denial of Service issue in webhook custom headers impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-12576---denial-of-service-issue-in-webhook-endpoint-impacts-gitlab-ceee">Denial of Service issue in webhook endpoint impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-3848---improper-neutralization-of-crlf-sequences-issue-impacts-gitlab-ceee">Improper Neutralization of CRLF Sequences issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-12555---improper-access-control-issue-in-runners-api-impacts-gitlab-ceee">Improper Access Control issue in runners API impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-0602---improper-access-control-issue-in-snippet-rendering-impacts-gitlab-ceee">Improper Access Control issue in snippet rendering impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-1732---information-disclosure-issue-in-inaccessible-issues-impacts-gitlab-ceee">Information Disclosure issue in inaccessible issues impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-1663---missing-authorization-issue-in-group-import-impacts-gitlab-ceee">Missing Authorization issue in Group Import impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-1230---incorrect-reference-issue-in-repository-download-impacts-gitlab-ceee">Incorrect Reference issue in repository download impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2026-1182---information-disclosure-issue-in-confidential-issues-impacts-gitlab-ceee">Information Disclosure issue in confidential issues impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-12704---incorrect-authorization-issue-in-virtual-registry-impacts-gitlab-ee">Incorrect Authorization issue in Virtual Registry impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-2-released/#cve-2025-12697---improper-escaping-of-output-issue-in-datadog-integration-impacts-gitlab-ceee">Improper Escaping of Output issue in Datadog integration impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2026-1090---cross-site-scripting-issue-in-markdown-placeholder-processing-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1090">CVE-2026-1090</a> - Cross-site Scripting issue in Markdown placeholder processing impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user, when the <code>markdown_placeholders</code> feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1069---denial-of-service-issue-in-graphql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1069">CVE-2026-1069</a> - Denial of Service issue in GraphQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition by sending specially crafted GraphQL requests due to uncontrolled recursion under certain circumstances.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-13929---denial-of-service-issue-in-repository-archive-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13929">CVE-2025-13929</a> - Denial of Service issue in repository archive endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition by issuing specially crafted requests to repository archive endpoints under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-14513---denial-of-service-issue-in-protected-branches-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14513">CVE-2025-14513</a> - Denial of Service issue in protected branches API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition due to improper input validation when processing specially crafted JSON payloads in the protected branches API.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-13690---denial-of-service-issue-in-webhook-custom-headers-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13690">CVE-2025-13690</a> - Denial of Service issue in webhook custom headers impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a denial of service condition due to improper input validation on webhook custom header names under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12576---denial-of-service-issue-in-webhook-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12576">CVE-2025-12576</a> - Denial of Service issue in webhook endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated user to cause a denial of service condition due to improper handling of webhook response data.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 9.3 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-3848---improper-neutralization-of-crlf-sequences-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-3848">CVE-2026-3848</a> - Improper Neutralization of CRLF Sequences issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to make unintended internal requests through proxy environments under certain conditions due to improper input validation in import functionality.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 8.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 5.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability.</p>
<h3 id="cve-2025-12555---improper-access-control-issue-in-runners-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12555">CVE-2025-12555</a> - Improper Access Control issue in runners API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to access previous pipeline job information on projects with repository and CI/CD disabled due to improper authorization checks.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.1 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-0602---improper-access-control-issue-in-snippet-rendering-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-0602">CVE-2026-0602</a> - Improper Access Control issue in snippet rendering impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to disclose metadata from private issues, merge requests, epics, milestones, or commits due to improper filtering in the snippet rendering process under certain circumstances.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1732---information-disclosure-issue-in-inaccessible-issues-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1732">CVE-2026-1732</a> - Information Disclosure issue in inaccessible issues impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to disclose confidential issue titles due to improper filtering under certain circumstances.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 12.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/modhanami">modhanami</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1663---missing-authorization-issue-in-group-import-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1663">CVE-2026-1663</a> - Missing Authorization issue in Group Import impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with group import permissions to create labels in private projects due to improper authorization validation in the group import process under certain circumstances.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 14.4 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1230---incorrect-reference-issue-in-repository-download-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1230">CVE-2026-1230</a> - Incorrect Reference issue in repository download impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause repository downloads to contain different code than displayed in the web interface due to incorrect validation of branch references under certain circumstances.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 1.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 4.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1182---information-disclosure-issue-in-confidential-issues-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1182">CVE-2026-1182</a> - Information Disclosure issue in confidential issues impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to gain unauthorized access to confidential issue titles created in public projects under certain circumstances.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 8.14 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 4.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12704---incorrect-authorization-issue-in-virtual-registry-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12704">CVE-2025-12704</a> - Incorrect Authorization issue in Virtual Registry impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to access Virtual Registry data in groups where they are not members due to improper authorization under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.2 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12697---improper-escaping-of-output-issue-in-datadog-integration-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12697">CVE-2025-12697</a> - Improper Escaping of Output issue in Datadog integration impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with maintainer-role permissions to reveal Datadog API credentials under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.5 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 <br>
<strong>CVSS</strong> 2.2 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1892">18.9.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2850">Fix GitLab base caching (Backport 18.9)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8528">config: Add configuration to control GOMAXPROCS [backport to 18.9]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225012">Backport of &lsquo;Fix test pollution from simulate_saas rake task&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224916">Backport of &lsquo;Add backtrace to placeholder user reassignment failure logs&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225031">[Backport 18.9] Update bitbucket cloud importer to fetch workspace scoped repositories</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224683">Backport of &ldquo;Remove old DAP troubleshooting docs&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225026">Backport BBM - Fix helper with single record</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224721">[18.9] Backport of &lsquo;Reduce logs by ConcurrencyLimit::WorkerExecutionTracker&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224826">Backport of Reduce batch size for text-embedding-005 requests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225488">[Backport]- Fix transpilers for zoekt filters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225589">Backport of &lsquo;Fix exclude types in session query&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225679">[Backport]- Skip param validation for MCP requests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225282">Backport of 591296 Historical Addon Assignments - Ignore Namespace Path For SM</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225788">Backport of &lsquo;Handle Jira Server/Data Center Issue pagination&rsquo; (18.9)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224861">Backport &lsquo;Improve Deployments and Size quota specs for clarity and consistency&rsquo; to 18-9-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225506">Backport- Code search returns no results at intermediate group level</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225755">Backport of &lsquo;Move ConcurrencyLimit::ResumeWorker cron config to CE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225694">Backport of &lsquo;Extend package migrate task to metadata caches and symbols&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225290">Backport of &lsquo;Stop unblocking policy approvals when security jobs get canceled&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225790">Backport of Revert &ldquo;Clean up gpg_commit_delegate_to_signature feature flag&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226030">Support default AI access rules - Backport of 225728</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226116">Backport of &lsquo;Fix maintainers editing when they own a fork&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9161">[18-9-stable] Remove release instance deployment trigger from Ubuntu-20.04-staging job</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9173">[18.9] Backport Mattermost Security Updates February 18, 2026</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9172">Backport: Simplify pg-upgrade initdb by removing locale parameters</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9194">[18.9] Patch io-event gem to drop epoll_pwait2 check for RedHat 9</a></li>
</ul>
<h3 id="1886">18.8.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2844">Backport Go 1.25.7 to 18.8 Stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2851">Fix GitLab base caching (Backport 18.8)</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2826">Backport of &ldquo;fix(bug): Schema check should not fail when ClickHouse DB is uninitialized&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8536">config: Add configuration to control GOMAXPROCS [backport to 18.8]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224745">18.8 Backport of &lsquo;Fix PipelineSecurityReportFindings query timeout&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224527">Backport 18.8 - CI - Token used for release environments</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223650">Handle RecordInvalid in SyncProjectPolicyWorker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225028">[Backport 18.8] Update bitbucket cloud importer to fetch workspace scoped repositories</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224720">[18.8] Backport of &lsquo;Reduce logs by ConcurrencyLimit::WorkerExecutionTracker&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225101">Backport BBM - Fix helper with single record</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222779">Backport of &lsquo;Fix Duo sidebar absent for user with Agentic Chat access but without Classic Chat access&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225489">[Backport]- Fix transpilers for zoekt filters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225278">Backport of 591296 Historical Addon Assignments - Ignore Namespace Path For SM</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225598">Backport of &lsquo;Handle Jira Server/Data Center Issue pagination&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224862">Backport &lsquo;Improve Deployments and Size quota specs for clarity and consistency&rsquo; to 18-8-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225508">Backport- Code search returns no results at intermediate group level</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225754">Backport of &lsquo;Move ConcurrencyLimit::ResumeWorker cron config to CE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226114">Support default AI access rules - Backport of 225728</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9158">Backport Go 1.25.7 to GitLab 18.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9162">[18-8-stable] Remove release instance deployment trigger from Ubuntu-20.04-staging job</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9174">[18.8] Mattermost Security Updates February 18, 2026</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9195">[18.8] Patch io-event gem to drop epoll_pwait2 check for RedHat 9</a></li>
</ul>
<h3 id="1876">18.7.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2843">Backport Go 1.25.7 to 18.7 Stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2849">Fix GitLab base caching (Backport 18.7)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224530">Backport 18.7 - CI - Token used for release environments</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223652">Handle RecordInvalid in SyncProjectPolicyWorker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225025">[Backport 18.7] Update bitbucket cloud importer to fetch workspace scoped repositories</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224717">[18.7] Backport of &lsquo;Reduce logs by ConcurrencyLimit::WorkerExecutionTracker&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225491">[Backport]- Fix transpilers for zoekt filters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225511">Backport- Code search returns no results at intermediate group level</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225211">Backport of 591296 Historical Addon Assignments - Ignore Namespace Path For SM</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225599">Backport of &lsquo;Handle Jira Server/Data Center Issue pagination&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224863">Backport &lsquo;Improve Deployments and Size quota specs for clarity and consistency&rsquo; to 18-7-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/225753">Backport of &lsquo;Move ConcurrencyLimit::ResumeWorker cron config to CE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/226561">[18.7] Fix image resizing assertion logic for RTE</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9159">Backport Go 1.25.7 to GitLab 18.7</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9163">[18-7-stable] Remove release instance deployment trigger from Ubuntu-20.04-staging job</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9175">[18.7] Backport Mattermost Security Updates February 18, 2026</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9196">[18.7] Patch io-event gem to drop epoll_pwait2 check for RedHat 9</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="regular-migrations">Regular migrations</h3>
<p>The following versions include regular migrations that run during the upgrade process:</p>
<ul>
<li>18.9.2</li>
<li>18.8.6</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.9.1, 18.8.5, 18.7.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-9-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-9-1-released/</id><published>2026-02-25T00:00:00Z</published><updated>2026-02-25T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On February 25, 2026, we released versions 18.9.1, 18.8.5, 18.7.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2026-0752---cross-site-scripting-issue-in-mermaid-sandbox-impacts-gitlab-ceee">Cross-site Scripting issue in Mermaid sandbox impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2025-14511---denial-of-service-issue-in-container-registry-impacts-gitlab-ceee">Denial of Service issue in container registry impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2026-1662---denial-of-service-issue-in-jira-events-endpoint-impacts-gitlab-ceee">Denial of Service issue in Jira events endpoint impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2026-1388---regular-expression-denial-of-service-issue-in-gitlab-merge-requests-impacts-gitlab-ceee">Regular Expression Denial of Service issue in GitLab merge requests impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2026-2845---missing-rate-limit-in-bitbucket-server-importer-impacts-gitlab-ceee">Missing rate limit in Bitbucket Server importer impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2025-3525---denial-of-service-issue-in-ci-trigger-api-impacts-gitlab-ceee">Denial of Service issue in CI trigger API impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2026-1725---denial-of-service-issue-in-token-decoder-impacts-gitlab-ceee">Denial of Service issue in token decoder impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2026-1747---improper-access-control-issue-in-conan-package-registry-impacts-gitlab-ee">Improper Access Control issue in Conan package registry impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-9-1-released/#cve-2025-14103---access-control-issue-in-ci-job-mutation-impacts-gitlab-ceee">Access Control issue in CI job mutation impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2026-0752---cross-site-scripting-issue-in-mermaid-sandbox-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-0752">CVE-2026-0752</a> - Cross-site Scripting issue in Mermaid sandbox impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain circumstances, could have allowed an unauthenticated user to inject arbitrary scripts into the Mermaid sandbox UI.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.2 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 8.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/aphantom">aphantom</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-14511---denial-of-service-issue-in-container-registry-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14511">CVE-2025-14511</a> - Denial of Service issue in container registry impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause denial of service by sending specially crafted files to the container registry event endpoint under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 12.2 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1662---denial-of-service-issue-in-jira-events-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1662">CVE-2026-1662</a> - Denial of Service issue in Jira events endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause Denial of Service by sending specially crafted requests to the Jira events endpoint.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 14.4 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1388---regular-expression-denial-of-service-issue-in-gitlab-merge-requests-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1388">CVE-2026-1388</a> - Regular Expression Denial of Service issue in GitLab merge requests impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause regular expression denial of service by sending specially crafted input to a merge request endpoint under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 9.2 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-2845---missing-rate-limit-in-bitbucket-server-importer-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-2845">CVE-2026-2845</a> - Missing rate limit in Bitbucket Server importer impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause denial of service by exploiting a Bitbucket Server import endpoint via repeatedly sending large responses.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.2 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/SamWord">Sam Word</a></p>
<h3 id="cve-2025-3525---denial-of-service-issue-in-ci-trigger-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-3525">CVE-2025-3525</a> - Denial of Service issue in CI trigger API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have, under certain circumstances, allowed an authenticated user with certain access to cause denial of service by creating specially crafted CI triggers via the API.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 9.0 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1725---denial-of-service-issue-in-token-decoder-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1725">CVE-2026-1725</a> - Denial of Service issue in token decoder impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have under certain conditions, allowed an unauthenticated user to cause denial of service by sending specially crafted requests to a CI jobs API endpoint.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: versions from 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 5.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/vinax">vinax</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1747---improper-access-control-issue-in-conan-package-registry-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1747">CVE-2026-1747</a> - Improper Access Control issue in Conan package registry impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed Developer-role users with insufficient privileges to make unauthorized modifications to protected Conan packages.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 17.11 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/modhanami">modhanami</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-14103---access-control-issue-in-ci-job-mutation-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14103">CVE-2025-14103</a> - Access Control issue in CI job mutation impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthorized user with Developer-role permissions to set pipeline variables for manually triggered jobs under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.7 before 18.7.5, 18.8 before 18.8.5, and 18.9 before 18.9.1 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1891">18.9.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224070">Backport of fix semantic code search for Premium plans</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223896">Backport of &ldquo;Implement usage of namespace AI data collection setting&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224130">Backport of AI data collection docs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223889">Backport of &ldquo;Add exclude_types to the get_agent_flows query&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223770">Backport of &ldquo;Bypass group membership lock for service accounts&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224472">Backport 18.9 - CI - Token used for release environments</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223926">[Backport] Zoekt Fix the bug of includeForked</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224478">Backport of Fix adding flows when member invites are disabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224642">Backport of Fix workspace PAT creation with short PAT lifetime</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224434">Backport of Remove API dependency on composite identity onboarding</a></li>
</ul>
<h3 id="1885">18.8.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222533">Disable gitlab credits dashboard page for SM trial</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222688">Backport: Workhorse: Ignore misconfigured redis for DWS locking</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222523">Backport of skip rebase check for detailed merge status</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222618">Backport of &lsquo;Time to first byte degradation on list merge requests API&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222792">Backport of Update gitlab-cloud-connector gem to 1.44</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222969">Backport - Remove orphaned zoektCrossNamespaceSearch feature flag reference</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222471">Move bot avatar assets to app/assets for proper asset pipeline inclusion</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223201">Backport of &lsquo;Geo Primary Verification: Check actual verification state when checksumming&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223088">Backport of Fix introspection query</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222986">Backport PG::UntranslatableCharacter fixes for MoveCiBuildsMetadata background migration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222864">Backport optimizing of the MergeRequestResetApprovals Worker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223356">Backport of &lsquo;Remove unused retag-gdk-image CI job&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223406">Backport of &ldquo;Docs: Added support for Credits and DAP from 18.8 and later&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223398">Backport of &lsquo;Enable the disable_all_mentions FF by default &lsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222856">Backport of Validate milestone title for group import</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223122">Backport of workhorse: Return 400 from /cable without valid websocket upgrade</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224518">Skip Feature.enabled? override in test environment - 18.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223927">[Backport] Zoekt Fix the bug of includeForked</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223769">Backport of &ldquo;Bypass group membership lock for service accounts&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224478">Backport of Fix adding flows when member invites are disabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222646">Backport of Reset group_push_rules primary key sequence</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224642">Backport of Fix workspace PAT creation with short PAT lifetime</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224146">Backport Use new auth in advanced wiki search</a></li>
</ul>
<h3 id="1875">18.7.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222264">Backport of &lsquo;Fix Zoekt indexing by cleaning up replicas without indices&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222629">Backport of &lsquo;Time to first byte degradation on list merge requests API&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222859">Backport of Validate milestone title for group import</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223749">Backport of &lsquo;Remove unused retag-gdk-image CI job&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/223123">Backport of workhorse: Return 400 from /cable without valid websocket upgrade</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222645">Backport of Reset group_push_rules primary key sequence</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/224146">Backport Use new auth in advanced wiki search</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>The SLES 12.5 package is not available for GitLab 18.9.1.</p>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.8.5</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.8.4, 18.7.4, 18.6.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-4-released/</id><published>2026-02-10T00:00:00Z</published><updated>2026-02-10T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On February 10, 2026, we released versions 18.8.4, 18.7.4, 18.6.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-7659---incomplete-validation-issue-in-web-ide-impacts-gitlab-ceee">Incomplete Validation issue in Web IDE impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-8099---denial-of-service-issue-in-graphql-introspection-impacts-gitlab-ceee">Denial of Service issue in GraphQL introspection impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-0958---denial-of-service-issue-in-json-validation-middleware-impacts-gitlab-ceee">Denial of Service issue in JSON validation middleware impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-14560---cross-site-scripting-issue-in-code-flow-impacts-gitlab-ceee">Cross-site Scripting issue in Code Flow impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-0595---html-injection-issue-in-test-case-titles-impacts-gitlab-ceee">HTML Injection issue in test case titles impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-1458---denial-of-service-issue-in-markdown-processor-impacts-gitlab-ceee">Denial of Service issue in Markdown processor impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-1456---denial-of-service-issue-in-markdown-preview-impacts-gitlab-ceee">Denial of Service issue in Markdown Preview impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-1387---denial-of-service-issue-in-dashboard-impacts-gitlab-ee">Denial of Service issue in dashboard impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-12575---server-side-request-forgery-issue-in-virtual-registry-impacts-gitlab-ee">Server-Side Request Forgery issue in Virtual Registry impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-1094---improper-validation-issue-in-diff-parser-impacts-gitlab-ceee">Improper Validation issue in diff parser impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-12073---server-side-request-forgery-issue-in-git-repository-import-impacts-gitlab-ceee">Server-Side Request Forgery issue in Git repository import impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-1080---authorization-bypass-issue-in-iterations-api-impacts-gitlab-ee">Authorization Bypass issue in iterations API impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-14592---missing-authorization-issue-in-glql-api-impacts-gitlab-ceee">Missing Authorization issue in GLQL API impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2026-1282---stored-html-injection-issue-in-project-label-impacts-gitlab-ceee">Stored HTML Injection issue in project label impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-4-released/#cve-2025-14594---authorization-bypass-issue-in-pipeline-schedules-api-impacts-gitlab-ceee">Authorization Bypass issue in Pipeline Schedules API impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-7659---incomplete-validation-issue-in-web-ide-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7659">CVE-2025-7659</a> - Incomplete Validation issue in Web IDE impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to steal tokens and access private repositories by abusing incomplete validation in the Web IDE.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.2 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 8.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/cav0ur">cav0ur</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-8099---denial-of-service-issue-in-graphql-introspection-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-8099">CVE-2025-8099</a> - Denial of Service issue in GraphQL introspection impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL queries.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 10.8 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/foxribeye">foxribeye</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-0958---denial-of-service-issue-in-json-validation-middleware-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-0958">CVE-2026-0958</a> - Denial of Service issue in JSON validation middleware impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause denial of service through memory or CPU exhaustion by bypassing JSON validation middleware limits.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/elbo7">elbo7</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-14560---cross-site-scripting-issue-in-code-flow-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14560">CVE-2025-14560</a> - Cross-site Scripting issue in Code Flow impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions could have allowed an authenticated user to perform unauthorized actions on behalf of another user by injecting content into vulnerability code flow.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.1 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 7.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> and <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-0595---html-injection-issue-in-test-case-titles-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-0595">CVE-2026-0595</a> - HTML Injection issue in test case titles impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to add unauthorized email addresses to user accounts through HTML injection in test case titles.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 13.9 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 7.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1458---denial-of-service-issue-in-markdown-processor-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1458">CVE-2026-1458</a> - Denial of Service issue in Markdown processor impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an unauthenticated user to cause denial of service by uploading specifically crafted files.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 8.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/maksyche">maksyche</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1456---denial-of-service-issue-in-markdown-preview-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1456">CVE-2026-1456</a> - Denial of Service issue in Markdown Preview impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause denial of service through CPU exhaustion by submitting specially crafted markdown files that trigger exponential processing in markdown preview.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/maksyche">maksyche</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1387---denial-of-service-issue-in-dashboard-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1387">CVE-2026-1387</a> - Denial of Service issue in dashboard impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause denial of service by uploading a specially crafted file to the dashboard and repeatedly sending GraphQL queries to parse it.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 15.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12575---server-side-request-forgery-issue-in-virtual-registry-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12575">CVE-2025-12575</a> - Server-Side Request Forgery issue in Virtual Registry impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user with certain permissions to perform server-side request forgery against internal network services.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 5.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0qho">go7f0qho</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1094---improper-validation-issue-in-diff-parser-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1094">CVE-2026-1094</a> - Improper Validation issue in diff parser impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated developer to hide specially crafted file changes from the WebUI.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 4.6 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/u3mur4">u3mur4</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12073---server-side-request-forgery-issue-in-git-repository-import-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12073">CVE-2025-12073</a> - Server-Side Request Forgery issue in Git repository import impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to perform server-side request forgery against internal services by bypassing protections in the Git repository import functionality.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yunus0x">yunus0x</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1080---authorization-bypass-issue-in-iterations-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1080">CVE-2026-1080</a> - Authorization Bypass issue in iterations API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to access iteration data from private descendant groups by querying the iterations API endpoint.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 16.7 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-14592---missing-authorization-issue-in-glql-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14592">CVE-2025-14592</a> - Missing Authorization issue in GLQL API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to perform unauthorized operations by submitting GraphQL mutations through the GLQL API endpoint.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 3.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/go7f0">go7f0</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2026-1282---stored-html-injection-issue-in-project-label-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1282">CVE-2026-1282</a> - Stored HTML Injection issue in project label impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to inject content into project labels titles.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rafabd1">rafabd1</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-14594---authorization-bypass-issue-in-pipeline-schedules-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14594">CVE-2025-14594</a> - Authorization Bypass issue in Pipeline Schedules API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to view certain pipeline values by querying the API.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.11 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sndd">sndd</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1884">18.8.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2810">Backport dependency update golang/go to v1.24.12</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/221855">Backport of Fix project state getting out of sync when deletion fails</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222004">Backport of &lsquo;Add migrations for missing merge_requests stage 2 indexes for bigint&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/221891">Backport-Group/Global search should not show code tab if no zoekt nodes are available &amp; advanced search is off</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218753">[Backport 18.8] Exclude Git LFS paths from Git HTTP throttling</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222075">Backport of Add REST endpoint for seeding external agents</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222073">Backport of Update seeded third party flows descriptions</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222257">Backport of Add seed external agents button to Admin &gt; GitLab Duo</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222214">Backport of &lsquo;Fix Duo Enterprise add-on check to use seat assignment instead of namespace membership&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222204">Backport of &lsquo;Add paidTierTrial to subscriptionUsage GraphQL API&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222164">[Backport] Add preflight checks to resume_indexing rake task</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/221951">Backport: DAP onboarding UX</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222354">Backport of &lsquo;Add usage billing paid tier trial card&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222427">Backports &lsquo;Fixes duo chat visible if user does not have permission&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222263">Backport of &lsquo;Fix Zoekt indexing by cleaning up replicas without indices&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222504">Flip <code>dap_onboarding_empty_states</code> back off</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222510">Disable credits page for SM in trial</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222446">Backport of &lsquo;Update dependency gitlab-cloud-connector to 1.43.0&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9071">Backport Go 1.24.12 to 18-8-Stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9098">[18.8] Backport Mattermost Security Updates January 15, 2026</a></li>
</ul>
<h3 id="1874">18.7.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219063">Backport of &lsquo;Fix: DAP enablement setting availability&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222190">18.7 Backport of &lsquo;Fix PipelineSecurityReportFindings query timeout&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222165">[Backport] Add preflight checks to resume_indexing rake task</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9099">[18.7] Backport Mattermost Security Updates January 15, 2026</a></li>
</ul>
<h3 id="1866">18.6.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222189">18.6 Backport of &lsquo;Fix PipelineSecurityReportFindings query timeout&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/222166">[Backport] Add preflight checks to resume_indexing rake task</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9100">[18.6] Backport Mattermost Security Updates January 15, 2026</a></li>
</ul>
<h2 id="gitlab-ultimate-trials-updated-to-include-gitlab-duo-agent-platform">GitLab Ultimate trials updated to include GitLab Duo Agent Platform</h2>
<p>GitLab.com Ultimate trials now include evaluation credits for GitLab Duo Agent Platform. On GitLab.com, signing up for an Ultimate trial provides 24 evaluation credits per user for 30 days to exercise agentic AI capabilities such as autonomous task execution and multi‑step workflow orchestration. Self-managed customers should update to GitLab 18.9 upon release to get the best trial experience. GitLab.com free tier namespaces can start an Ultimate trial today.</p>
<p><a href="https://gitlab.com/-/trial_registrations/new">Start your free trial</a>. Current paid customers can request evaluation credits through their account team and begin technical setup ahead of the 18.9 release <a href="https://about.gitlab.com/sales/">contact Sales</a> to learn more.</p>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.8.4</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab AI Gateway Critical Patch Release: 18.6.2, 18.7.1, and 18.8.1</title><link href="https://docs.gitlab.com/releases/other-patches/patch-release-gitlab-ai-gateway-18-8-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/other-patches/patch-release-gitlab-ai-gateway-18-8-1-released/</id><published>2026-02-06T00:00:00Z</published><updated>2026-02-06T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On February 6, 2026, we released versions 18.6.2, 18.7.1, and 18.8.1 of the GitLab AI Gateway.</p>
<p>These versions contain a critical security fix for GitLab Duo Self-Hosted AI Gateway, and we strongly recommend that all Self Managed customers with <a href="https://docs.gitlab.com/administration/gitlab_duo_self_hosted/">GitLab Duo Self-Hosted installations</a> update to one of these versions immediately.</p>
<p>A fix has already been deployed for the GitLab-hosted AI Gateway. Customers using GitLab.com, GitLab Dedicated, and GitLab Self Managed instances with GitLab-hosted AI Gateway are protected and do not need to take action.</p>
<h2 id="recommended-action">Recommended Action</h2>
<p>We strongly recommend that all GitLab Duo Self-Hosted installations running a version of self-hosted AI Gateway affected by the issue described below are upgraded to the latest version as soon as possible.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/other-patches/patch-release-gitlab-ai-gateway-18-8-1-released/#cve-2026-1868---insecure-template-expansion-issue-impacts-gitlab-ai-gateway">Insecure Template expansion issue impacts GitLab AI Gateway</a></td>
          <td>Critical</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2026-1868---insecure-template-expansion-issue-impacts-gitlab-ai-gateway">CVE-2026-1868 - Insecure Template expansion issue impacts GitLab AI Gateway</h3>
<p>The Duo Workflow Service component of GitLab AI Gateway before versions 18.6.2, 18.7.1, and 18.8.1 is vulnerable to insecure template expansion of user supplied data via crafted Duo Agent Platform Flow definitions. Authenticated access to the GitLab instance is required. This vulnerability could be used to cause Denial of Service or gain code execution on the Gateway.</p>
<p><strong>Impacted Versions:</strong> GitLab AI Gateway: all versions from 18.1.6, 18.2.6, and 18.3.1 before 18.6.2, 18.7.1, and 18.8.1 <br>
<strong>CVSS</strong> 9.9 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</code></a>)</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">Joern Schneeweisz</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab Duo Self-Hosted, see the <a href="https://docs.gitlab.com/install/install_ai_gateway/">GitLab Duo Self-Hosted install documentation</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://about.gitlab.com/security-releases.xml">patch release RSS feed</a> or our <a href="https://about.gitlab.com/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.8.3, 18.7.3, 18.6.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-3-released/</id><published>2026-02-04T00:00:00Z</published><updated>2026-02-04T00:00:00Z</updated><author><name>Akinyele Cafe-Febrissy</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On February 4, 2026, we released versions 18.8.3, 18.7.3, and 18.6.5 for GitLab Community Edition and Enterprise Edition.</p>
<p>This patch release delivers a set of targeted fixes focused on reliability, entitlement handling, and feature-flag consistency across GitLab Duo Agent Platform deployments.</p>
<p>The updates reflect real-world usage across diverse environments and usage models, and are part of the normal hardening cycle for a platform that integrates deeply with GitLab workflows, identity, and usage controls. Core agent capabilities and behaviors are unchanged. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1883">18.8.3</h3>
<!--  DAP Fixes (reason for this out-of-band release) -->
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219349">Backport of &lsquo;Pass user id to workflow service&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219447">Backport of &lsquo;Unlock Duo Workflow foundational flows from experimental features&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220816">Backport of &lsquo;Unlock Duo Workflow foundational flows from experimental features&rsquo;</a></li>
</ul>
<!-- Other bug fixes -->
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219609">Backport of &lsquo;Fix enforced_scans sync with inject_policy&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219758">Backport of &ldquo;Open service desk issues and tickets on boards in legacy view instead of drawer&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219750">Backport of &ldquo;Add info on UI for new Ticket work item type&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219728">[Backport]Fix missing Open the file to view all results&rsquo; link in Zoekt</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219997">Refactor Redis TLS options parsing to fix ActionCable configuration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219584">Backport of &lsquo;Fix route constraint for Credits dashboards&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219717">Backport of &lsquo;Fix Zoekt filter order to avoid performance regression&rsquo; to 18.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220116">Backport: Allow to better debug initialize connection</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220133">Backport of &lsquo;Integrate work items into chat notifications as issue events&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220160">Backport of &ldquo;Fixes preserving external author on work item move and clone&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220830">[Backport] Remove search api preload for commits scope</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220931">Backport of &ldquo;Regenerate openapi docs&rdquo;</a></li>
</ul>
<h3 id="1873">18.7.3</h3>
<!-- DAP Fixes -->
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218510">Backport of &lsquo;Add FF to toggle namespace filtering for Duo Chat data&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219831">Backport of &lsquo;Remove duo_workflow_in_ci Feature Flag&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219877">Backport of &lsquo;Remove duo_workflow Feature Flag&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219985">Backport of &lsquo;Pass user id to workflow service&rsquo;</a></li>
</ul>
<!-- Other bug fixes -->
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219618">Backport of &lsquo;Fix enforced_scans sync with inject_policy&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219719">Backport of &lsquo;Fix Zoekt filter order to avoid performance regression&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220831">[Backport] Remove search api preload for commits scope</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/220694">[18.7] Only check optional ActionCable Redis instance if necessary</a></li>
</ul>
<h3 id="1865">18.6.5</h3>
<!-- DAP Fixes -->
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219978">Backport of &lsquo;Pass user id to workflow service&rsquo;</a></li>
</ul>
<!-- Other bug fixes -->
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219691">Fix MergeRequestDiff.verifiables scope</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.8.2, 18.7.2, 18.6.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-2-released/</id><published>2026-01-21T00:00:00Z</published><updated>2026-01-21T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 21, 2026, we released versions 18.8.2, 18.7.2, 18.6.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-2-released/#cve-2025-13927---denial-of-service-issue-in-jira-connect-integration-impacts-gitlab-ceee">Denial of Service issue in in Jira Connect integration impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-2-released/#cve-2025-13928---incorrect-authorization-issue-in-releases-api-impacts-gitlab-ceee">Incorrect Authorization issue in Releases API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-2-released/#cve-2026-0723---unchecked-return-value-issue-in-authentication-services-impacts-gitlab-ceee">Unchecked Return Value issue in authentication services impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-2-released/#cve-2025-13335---infinite-loop-issue-in-wiki-redirects-impacts-gitlab-ceee">Infinite Loop issue in Wiki redirects impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-8-2-released/#cve-2026-1102---denial-of-service-issue-in-api-endpoint-impacts-gitlab-ceee">Denial of Service issue in API endpoint impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-13927---denial-of-service-issue-in-jira-connect-integration-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13927">CVE-2025-13927</a> - Denial of Service issue in Jira Connect integration impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by sending crafted requests with malformed authentication data.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.9 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-13928---incorrect-authorization-issue-in-releases-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13928">CVE-2025-13928</a> - Incorrect Authorization issue in Releases API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition by exploiting incorrect authorization validation in API endpoints.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.7 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-0723---unchecked-return-value-issue-in-authentication-services-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-0723">CVE-2026-0723</a> - Unchecked Return Value issue in authentication services impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an individual with existing knowledge of a victim&rsquo;s credential ID to bypass two-factor authentication by submitting forged device responses.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.6 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 <br>
<strong>CVSS</strong> 7.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-13335---infinite-loop-issue-in-wiki-redirects-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13335">CVE-2025-13335</a> - Infinite Loop issue in Wiki redirects impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain circumstances could have allowed an authenticated user to create a denial of service condition by configuring malformed Wiki documents that bypass cycle detection.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.1 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2026-1102---denial-of-service-issue-in-api-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2026-1102">CVE-2026-1102</a> - Denial of Service issue in API endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by sending repeated malformed SSH authentication requests.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 12.3 before 18.6.4, 18.7 before 18.7.2, and 18.8 before 18.8.2 <br>
<strong>CVSS</strong> 5.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/thiagocsf">Thiago Figueiró</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1882">18.8.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219214">Backport of <code>Make external agent configurations GA</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219155">Backport Remove GitLab Dedicated support for semantic search until it&rsquo;s available</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219235">Backport of &lsquo;18.8.0: Merge Request reviewer dropdown crashes and does not send request&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219349">Backport of &lsquo;Pass user id to workflow service&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219380">Backport of rake task to seed AI Catalogs with external agents</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219447">Backport of <code>Separate policy logic for AI Catalog Flows and Foundational Flows</code></a></li>
</ul>
<h3 id="1872">18.7.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216906">Backport of <code>Fix logic for fetching occurrences related to vulnerabilties</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217917">Backport of &ldquo;Removes feature flag enablement for svc accounts&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217509">Backport of flaky import spec quarantine</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217840">Backport 18.7 - Fix searchable dropdown race condition when typing fast</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218037">Backport of <code>Recreate p_sent_notifications.reply_key index</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217768">Fix container_repositories index repair to handle 1-to-1 relationship</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218128">[18.7] Fix migration health check endpoint</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218571">Backport of &lsquo;Fix soft wrap not working due to accessibilitySupport conflict&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217993">Backport of &lsquo;Fix git push error for remote flows in self-managed instances&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218752">[Backport 18.7] Exclude Git LFS paths from Git HTTP throttling</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218940">Backport of <code>Correct Code Review Flow history for beta</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218683">Backport of &lsquo;Fix Duo Chat button visibility for Amazon Q&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218904">Backport Allow user namespaces to be indexed in Zoekt for self-managed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219407">Backport of &lsquo;Disable Sidekiq retries for ClickHouse pipeline/build sync workers&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219445">Backport of &lsquo;Disable async_insert in build and pipeline sync operations&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8986">18.7 - Remove manual from SLES-12.5-release-pulp job</a></li>
</ul>
<h3 id="1864">18.6.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217919">Backport of &ldquo;Removes feature flag enablement for svc accounts&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217510">Backport of flaky import spec quarantine</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217841">Backport 18.6 - Fix searchable dropdown race condition when typing fast</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217769">Fix container_repositories index repair to handle 1-to-1 relationship</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218625">Backport of &lsquo;Fix soft wrap not working due to accessibilitySupport conflict&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218021">Backport of &lsquo;Fix git push error for remote flows in self-managed instances&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218750">[Backport 18.6] Exclude Git LFS paths from Git HTTP throttling</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218907">Backport-Allow user namespaces to be indexed in Zoekt for self-managed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219406">Backport of &lsquo;Disable Sidekiq retries for ClickHouse pipeline/build sync workers&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/219444">Backport of &lsquo;Disable async_insert in build and pipeline sync operations&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8987">18.6 - Remove manual from SLES-12.5-release-pulp job</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/9019">Start Pulp FIPS jobs after PC FIPS jobs - 18.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8974">[CI] Fix the builder image tags for the check-packages jobs 18-6</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.7.2</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.8.1</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-8-1-released/</id><published>2026-01-19T00:00:00Z</published><updated>2026-01-19T00:00:00Z</updated><author><name>Akinyele Cafe-Febrissy</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 19, 2026, we released versions 18.8.1 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1881">18.8.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218867">Backport: Release AI Catalog External Agents</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218815">Backport of &lsquo;Fix summarize review prompt version for DAP Duo Code Review&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218920">Backport of Disallow creation of new external agents</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218850">Backport of <code>Correct Code Review Flow history for beta</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218899">Backport of &lsquo;Fix incorrectly shown limited experience alert on pipeline security tab&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/218682">Backport of &lsquo;Fix Duo Chat button visibility for Amazon Q&rsquo;</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.7.1, 18.6.3, 18.5.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-7-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-7-1-released/</id><published>2026-01-07T00:00:00Z</published><updated>2026-01-07T00:00:00Z</updated><author><name>Katherine Wu</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 7, 2026, we released versions 18.7.1, 18.6.3, 18.5.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-9222---stored-cross-site-scripting-issue-in-gitlab-flavored-markdown-placeholders-impacts-gitlab-ceee">Stored Cross-site Scripting issue in GitLab Flavored Markdown placeholders impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-13761---cross-site-scripting-issue-in-web-ide-impacts-gitlab-ceee">Cross-site scripting issue in Web IDE impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-13772---missing-authorization-issue-in-duo-workflows-api-impacts-gitlab-ee">Missing Authorization issue in Duo Workflows API impacts GitLab EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-10569---denial-of-service-issue-in-import-functionality-impacts-gitlab-ceee">Denial of Service issue in import functionality impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-13781---missing-authorization-issue-in-ai-graphql-mutation-impacts-gitlab-ee">Missing Authorization issue in AI GraphQL mutation impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-11246---insufficient-access-control-granularity-issue-in-graphql-runnerupdate-mutation-impacts-gitlab-ceee">Insufficient Access Control Granularity issue in GraphQL runnerUpdate mutation impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-7-1-released/#cve-2025-3950---information-disclosure-issue-in-mermaid-diagram-rendering-impacts-gitlab-ceee">Information Disclosure issue in Mermaid diagram rendering impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-9222---stored-cross-site-scripting-issue-in-gitlab-flavored-markdown-placeholders-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-9222">CVE-2025-9222</a> - Stored Cross-site Scripting issue in GitLab Flavored Markdown placeholders impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to achieve stored cross-site scripting by exploiting GitLab Flavored Markdown placeholder processing.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.2.2 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-13761---cross-site-scripting-issue-in-web-ide-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13761">CVE-2025-13761</a> - Cross-site Scripting issue in Web IDE impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to execute arbitrary code in the context of an authenticated user&rsquo;s browser by convincing the legitimate user to visit a specially crafted webpage.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 8.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-13772---missing-authorization-issue-in-duo-workflows-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13772">CVE-2025-13772</a> - Missing Authorization issue in Duo Workflows API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to access and utilize AI model settings from unauthorized namespaces by manipulating namespace identifiers in API requests.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 7.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/jessieay">Jessie Young</a>.</p>
<h3 id="cve-2025-13781---missing-authorization-issue-in-ai-graphql-mutation-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13781">CVE-2025-13781</a> - Missing Authorization issue in AI GraphQL mutation impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to modify instance-wide AI feature provider settings by exploiting missing authorization checks in GraphQL mutations.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.5 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-10569---denial-of-service-issue-in-import-functionality-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10569">CVE-2025-10569</a> - Denial of Service issue in import functionality impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to create a denial of service condition by providing crafted responses to external API calls.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 8.3 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-11246---insufficient-access-control-granularity-issue-in-graphql-runnerupdate-mutation-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11246">CVE-2025-11246</a> - Insufficient Access Control Granularity issue in GraphQL runnerUpdate mutation impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users with specific permissions to remove all project runners from unrelated projects by manipulating GraphQL runner associations.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.4 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 5.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-3950---information-disclosure-issue-in-mermaid-diagram-rendering-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-3950">CVE-2025-3950</a> - Information Disclosure issue in Mermaid diagram rendering impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a user to leak sensitive connection information by referencing specially crafted images that bypass asset proxy protection.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 10.3 before 18.5.5, 18.6 before 18.6.3, and 18.7 before 18.7.1 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="update-libpng-version-to-1651">Update Libpng version to 1.6.51</h3>
<p>Libpng has been updated to version 1.6.51, which contains fixes for security vulnerabilities including CVE-2025-65018 and CVE-2025-64720.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1871">18.7.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216968">Backport of &lsquo;Revert Merge branch &lsquo;582543-opinionated-duo-chat-focus&rsquo; into &lsquo;master&rsquo;&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217083">Backport of Add CI builds metadata migration configuration to 18.7 upgrade notes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216989">Backport of &ldquo;Don&rsquo;t try to return connections to the pool early in a web request&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217225">Backport of &ldquo;Clear the query cache when releasing load balancing hosts&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217116">Backport &ldquo;Fix version-skipping upgrade blocker for namespace traversal IDs backfill&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217361">Backport of &lsquo;Fix Elasticsearch pagination with null sortable field values&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217079">[Backport 18.7] No-op BackfillSlackIntegrationsScopesShardingKey BBM</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217094">Backport of &lsquo;Wrap merge_data &amp; merge_request into single transaction&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217253">Backport of &lsquo;Resolve GraphQL type mismatch in Cleanup policy type&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/5633">Backport of &lsquo;Fix 404 errors for Duo Workflow WS connection&rsquo;</a></li>
</ul>
<h3 id="1863">18.6.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8340">Log truncation to 18-6 stable branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215810">Backport of &lsquo;Add status filter argument to work items CSV export&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215588">Backport &rsquo;tskorupa/fix-check_e82ff70482-constraint-validation&rsquo; into &lsquo;18-6-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215357">Backport of Add pipeline_per_user rate limit</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215748">Backport of Dependency export fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215869">18.6 Backport: &ldquo;Add type handling for findings with locations saved as Strings&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215732">Backport: Improve handling of attachment urls and filenames, fix undercoverage 18-6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216082">Backport of Fix content and content-type mismatch in files e2e test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213644">[Backport 18.6] Exclude Git HTTP requests from authenticated web throttle</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215937">Backport &ldquo;Fix Classic Duo Chat UI is stuck&rdquo; into 18.6-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216333">Backport of: Handle updated Jira API calls to permit Jira issue imports again</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216348">Backport of Fix scan execution policy overriding YAML variables</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216440">Backport (18.6): Update dependency @gitlab/web-ide to ^0.0.1-dev-20251210140521</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216563">Backport of &lsquo;Workhorse: use upstream for DWS API requests&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216777">Backport &lsquo;Allow ClickHouse migrations to be skipped&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217127">Backport &ldquo;Fix version-skipping upgrade blocker for namespace traversal IDs backfill&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/217365">Backport of &lsquo;Fix Elasticsearch pagination with null sortable field values&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8968">[18.6] Backport Mattermost Security Updates November 21, 2025</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8946">[Backport - 18-6-stable] Disable allow_failure for the check-packages-functionality job in the tag pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/5631">Backport of &lsquo;Fix 404 errors for Duo Workflow WS connection&rsquo;</a></li>
</ul>
<h3 id="1855">18.5.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215728">Backport: Improve handling of attachment urls and filenames, fix undercoverage 18-5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215199">Backport of &lsquo;Handle 429s during github LFS import&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215788">Backport of Dependency export fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215892">Backport of &lsquo;Add status filter argument to work items CSV export&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215868">18.5 Backport: &ldquo;Add type handling for findings with locations saved as Strings&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216081">Backport of Fix content and content-type mismatch in files e2e test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213641">[Backport 18.5] Exclude Git HTTP requests from authenticated web throttle</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216334">Backport of: Handle updated Jira API calls to permit Jira issue imports again</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216441">Backport(18.5): Update dependency @gitlab/web-ide to ^0.0.1-dev-20251210140521</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/216575">Backport of &lsquo;Workhorse: use upstream for DWS API requests&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8947">[Backport - 18-5-stable] Disable allow_failure for the check-packages-functionality job in the tag pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/5632">Backport of &lsquo;Fix 404 errors for Duo Workflow WS connection&rsquo;</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.7.1</li>
<li>18.6.3</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.6.2, 18.5.4, 18.4.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-6-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-6-2-released/</id><published>2025-12-10T00:00:00Z</published><updated>2025-12-10T00:00:00Z</updated><author><name>Kayla Hagopian</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On December 10, 2025, we released versions 18.6.2, 18.5.4, 18.4.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-12716---cross-site-scripting-issue-in-wiki-impacts-gitlab-ceee">Cross-site scripting issue in Wiki impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-8405---improper-encoding-in-vulnerability-reports-impacts-gitlab-ceee">Improper encoding in vulnerability reports impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-12029---cross-site-scripting-issue-in-swagger-ui-impacts-gitlab-ceee">Cross-site scripting issue in Swagger UI impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-12562---denial-of-service-issue-in-graphql-endpoints-impacts-gitlab-ceee">Denial of service issue in GraphQL endpoints impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-11984---authentication-bypass-issue-for-webauthn-users-impacts-gitlab-ceee">Authentication bypass issue for WebAuthn users impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-4097---denial-of-service-issue-in-exiftool-processing-impacts-gitlab-ceee">Denial of service issue in ExifTool processing impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-14157---denial-of-service-issue-in-commit-api-impacts-gitlab-ceee">Denial of service issue in Commit API impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-11247---information-disclosure-issue-in-complianceframeworks-impacts-gitlab-ee">Information disclosure issue in compliance frameworks impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-13978---information-disclosure-through-error-messages-impacts-gitlab-ceee">Information disclosure through error messages impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-2-released/#cve-2025-12734---html-injection-issue-in-merge-request-titles-impacts-gitlab-ceee">HTML injection issue in merge request titles impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-12716---cross-site-scripting-issue-in-wiki-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12716">CVE-2025-12716</a> - Cross-site scripting issue in Wiki impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to perform unauthorized actions on behalf of another user by creating wiki pages with malicious content.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.4 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12029---cross-site-scripting-issue-in-swagger-ui-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12029">CVE-2025-12029</a> - Cross-site scripting issue in Swagger UI impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have, under certain circumstances, allowed an unauthenticated user to perform unauthorized actions on behalf of another user by injecting malicious external scripts into the Swagger UI.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.11 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 8.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/x0abcd_">x0abcd_</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-8405---improper-encoding-in-vulnerability-reports-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-8405">CVE-2025-8405</a> - Improper encoding in vulnerability reports impacts GitLab CE/EE</h3>
<p>GitLab has remediated a security issue that could have allowed an authenticated user to perform unauthorized actions on behalf of other users by injecting malicious HTML into vulnerability code flow displays.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12562---denial-of-service-issue-in-graphql-endpoints-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12562">CVE-2025-12562</a> - Denial of service issue in GraphQL endpoints impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by sending crafted GraphQL queries that bypass query complexity limits.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.10 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-11984---authentication-bypass-issue-for-webauthn-users-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11984">CVE-2025-11984</a> - Authentication bypass issue for WebAuthn users impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 6.8 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/jcarre">jcarre</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-4097---denial-of-service-issue-in-exiftool-processing-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-4097">CVE-2025-4097</a> - Denial of service issue in ExifTool processing impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a denial of service condition by uploading specially crafted images.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.10 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<h3 id="cve-2025-14157---denial-of-service-issue-in-commit-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-14157">CVE-2025-14157</a> - Denial of service issue in Commit API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a Denial of Service condition by sending crafted API calls with large content parameters.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 6.3 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member Thong Kuah</p>
<h3 id="cve-2025-11247---information-disclosure-issue-in-compliance-frameworks-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11247">CVE-2025-11247</a> - Information disclosure issue in compliance frameworks impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed a user to disclose sensitive information from private projects by executing specifically crafted GraphQL queries.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 13.2 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/weasterhacker">weasterhacker</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-13978---information-disclosure-through-error-messages-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13978">CVE-2025-13978</a> - Information disclosure through error messages impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to discover the names of private projects they do not have access through API requests.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.5 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member Rohit Shambhuni</p>
<h3 id="cve-2025-12734---html-injection-issue-in-merge-request-titles-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12734">CVE-2025-12734</a> - HTML injection issue in merge request titles impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to, under certain conditions, render content in dialogs to other users by injecting malicious HTML content into merge request titles.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.6 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1862">18.6.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2719">[18.6] Backport - Fix gitlab-go build by updating Go download URL</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2725">Update azcopy to v10.31.0 [Backport 18.6]</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2727">Pipeline: Fixup gitlab-base version calculation 18-6 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214102">Backport of registration banner bugfix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214334">Backport of Ensure LFS imports work correctly with nil revisions</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214517">Backport of &lsquo;Fix OAuth for relative path&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214803">Remove redundant aria roles from recycle scroller (18.6 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214769">Backport 18-6 Fix Duo Chat test to work with new feedback button UI</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215297">[18.6] CI: bump DOCKER_VERSION to 28.5.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214401">Update diff note representation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215194">Backport of &lsquo;Bump test-tooling gem version to 3.1.0&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215321">Backport MR flaky test fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215221">Backport of &lsquo;GitHub importer fails to handle rate limits when importing note attachments&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215243">Backport Fix: Restore branch protection check in cache_suffix_for</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214941">Backport of &lsquo;Use Rust parser for tasklist parsing&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215368">Backport of Fix partition missing error in project_daily_statistics backfill (18.6)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215501">Backport of &lsquo;Add migrations for missing merge_requests indexes for bigint&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215390">Backport of Make 4XX responses not retriable for attachment downloads 18-6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215197">Backport of &lsquo;Handle 429s during github LFS import&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8924">18-6 Stable Bump Container Registry to v4.31.1-gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8940">Backport Pulp support to 18.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8949">[18.6] Revert update to sshd_config mandating stronger algorithms</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8959">[18.6] Fix RHEL 10 not working with SELinux</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8962">Backport Pulp production release jobs to 18.6</a></li>
</ul>
<h3 id="1854">18.5.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2720">[18.5] Backport - Fix gitlab-go build by updating Go download URL</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2726">Update azcopy to v10.31.0 [Backport 18.5]</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2728">Pipeline: Fixup gitlab-base version calculation 18-5 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8308">middleware: Ignore non proto endpoints</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214335">Backport of Ensure LFS imports work correctly with nil revisions</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214804">Remove redundant aria roles from recycle scroller (18.5 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215300">[18.5] CI: bump DOCKER_VERSION to 28.5.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215045">Backport of registration banner bugfix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214402">Update diff note representation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215375">Backport of Fix partition missing error in project_daily_statistics backfill (18.5)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215224">Backport of &lsquo;GitHub importer fails to handle rate limits when importing note attachments&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215246">Backport fix: Restore branch protection check in cache_suffix_for</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215392">Backport Make 4XX responses not retriable for attachment downloads 18-5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8944">Backport Pulp support to 18.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8963">Backport Pulp production release jobs to 18.5</a></li>
</ul>
<h3 id="1846">18.4.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2721">[18.4] Backport - Fix gitlab-go build by updating Go download URL</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2729">Pipeline: Fixup gitlab-base version calculation 18-4 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215301">[18.4] CI: bump DOCKER_VERSION to 28.5.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215245">Backport Fix: Restore branch protection check in cache_suffix_for</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/214405">Update diff note representation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215223">Backport of &lsquo;GitHub importer fails to handle rate limits when importing note attachments&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215398">Backport Make 4XX responses not retriable for attachment downloads 18-4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/215203">Backport of &lsquo;Handle 429s during github LFS import&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8945">Backport Pulp support to 18.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8964">Backport Pulp production release jobs to 18.4</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.6.2</li>
<li>18.5.4</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.6.1, 18.5.3, 18.4.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-6-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-6-1-released/</id><published>2025-11-26T00:00:00Z</published><updated>2025-11-26T00:00:00Z</updated><author><name>Kayla Hagopian</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On November 26, 2025, we released versions 18.6.1, 18.5.3, 18.4.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-1-released/#cve-2024-9183---race-condition-issue-in-cicd-cache-impacts-gitlab-ceee">Race condition issue in CI/CD cache impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-1-released/#cve-2025-12571---denial-of-service-issue-in-json-input-validation-middleware-impacts-gitlab-ceee">Denial of Service issue in JSON input validation middleware impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-1-released/#cve-2025-12653---authentication-bypass-issue-in-account-registration-impacts-gitlab-ceee">Authentication bypass issue in account registration impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-1-released/#cve-2025-7449---denial-of-service-issue-in-http-response-processing-impacts-gitlab-ceee">Denial of Service issue in HTTP response processing impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-1-released/#cve-2025-6195---improper-authorization-issue-in-markdown-rendering-impacts-gitlab-ee">Improper authorization issue in markdown rendering impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-6-1-released/#cve-2025-13611---information-disclosure-issue-in-terraform-registry-impacts-gitlab-ceee">Information disclosure issue in terraform registry impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2024-9183---race-condition-issue-in-cicd-cache-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2024-9183">CVE-2024-9183</a> - Race condition issue in CI/CD cache impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to obtain credentials from higher-privileged users and perform actions in their context under specific conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.4 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 <br>
<strong>CVSS</strong> 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/aphantom">aphantom</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12571---denial-of-service-issue-in-json-input-validation-middleware-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12571">CVE-2025-12571</a> - Denial of Service issue in JSON input validation middleware impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a Denial of Service condition by sending specifically crafted requests containing malicious JSON payloads.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.10 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12653---authentication-bypass-issue-in-account-registration-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12653">CVE-2025-12653</a> - Authentication bypass issue in account registration impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under specific conditions could have allowed an unauthenticated user to join arbitrary organizations by changing headers on some requests.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 18.3 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-7449---denial-of-service-issue-in-http-response-processing-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7449">CVE-2025-7449</a> - Denial of Service issue in HTTP response processing impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with specific permissions to cause a denial of service condition through HTTP response processing.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 8.3 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-6195---improper-authorization-issue-in-markdown-rendering-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6195">CVE-2025-6195</a> - Improper authorization issue in markdown rendering impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to view information from security reports under certain configuration conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 13.7 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-13611---information-disclosure-issue-in-terraform-registry-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-13611">CVE-2025-13611</a> - Information disclosure issue in terraform registry impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with access to certain logs to obtain sensitive tokens under specific conditions.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 13.12 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 <br>
<strong>CVSS</strong> 2.4 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1861">18.6.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2708">18-6 stable Bump Container Registry to v4.31.1-gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213747">Backport of &lsquo;Fix custom role approvers lookup for inherited users&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213844">[18.6] Fix /admin/sidekiq not loading CSS assets in Cloud Native GitLab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213527">Backport of &lsquo;Rollout search_glql_use_routing flag&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213754">Backport of &lsquo;Fix BackfillTimelogsNamespace finalization order&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213744">Backport &lsquo;Move OAuth suite to test-on-cng&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213649">Backport &lsquo;Fix <code>commitsCount</code> variable name&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213809">Backport 18-6 E2E test: quarantine long fast quarantined e2e tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213969">Updating subscription tier for Security Analyst feature, bc it was incorrect</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213694">Backport &lsquo;Fix merge request widget polling race condition&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8916">Sidekiq role: Enable rails recipies by default [18.6 Backport]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8920">[18.6] Add nginx[&lsquo;default_server_enabled&rsquo;] configuration parameter</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8926">Backport: EL10 requires SELinux and perl packages</a></li>
</ul>
<h3 id="1853">18.5.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211774">Backport Zoekt rollout is not working properly if there is a single zoekt node available</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209563">Backport of &lsquo;Move support for license name to EE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212308">Fix missing gitaly_context forward in BranchPushService</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212202">Backport of &lsquo;Split refresh worker into new workers&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212724">Backport of Add FF to eagerly resume jobs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212851">Backport of &lsquo;Ensure project authorizations are updated on imported inheriting project memberships&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212902">E2E test: quarantine long time fast quarantined specs 18-5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212740">Backport of: Fix tags api first page pagination with search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212991">[Backport] Relax blobs complexity in favor of limiting data</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213042">Backport of &lsquo;Fix: prevent duplicate &lsquo;?&rsquo; in Download directory URL (use &lsquo;&amp;&rsquo; for extra params)&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213440">Backport of &lsquo;Update duo workflow service gem to 0.5&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213749">Backport of &lsquo;Fix custom role approvers lookup for inherited users&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213845">[18.5] Fix /admin/sidekiq not loading CSS assets in Cloud Native GitLab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213824">Backport of &lsquo;Support nested variables expention in rules:if&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213810">Backport 18-5 E2E test: quarantine long fast quarantined e2e tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213695">Backport &lsquo;Fix merge request widget polling race condition&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8905">Sidekiq role: Enable rails recipies by default [18.5 Backport]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8921">[18.5] Add nginx[&lsquo;default_server_enabled&rsquo;] configuration parameter</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8887">Backport &lsquo;fix-registry-commands-permission-for-non-docker&rsquo; into &lsquo;18-5-stable&rsquo;</a></li>
</ul>
<h3 id="1845">18.4.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211778">Backport Zoekt rollout is not working properly if there is a single zoekt node available</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209703">Backport of &lsquo;Move support for license name to EE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212904">E2E test: quarantine long time fast quarantined specs 18-4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213116">Test: quarantine wiki specs 18-4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212742">Backport of: Fix tags api first page pagination with search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/212993">[Backport] Relax blobs complexity in favor of limiting data</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213846">[18.4] Fix /admin/sidekiq not loading CSS assets in Cloud Native GitLab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/213811">Backport 18-4 E2E test: quarantine long fast quarantined e2e tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8837">Bump eventmachine-tail gem to version 0.6.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8906">Sidekiq role: Enable rails recipies by default [18.4 Backport]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8888">Backport &lsquo;fix-registry-commands-permission-for-non-docker&rsquo; into &lsquo;18-4-stable&rsquo;</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.6.1</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.5.2, 18.4.4, 18.3.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-5-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-5-2-released/</id><published>2025-11-12T00:00:00Z</published><updated>2025-11-12T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On November 12, 2025, we released versions 18.5.2, 18.4.4, 18.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-11224---cross-site-scripting-issue-in-k8s-proxy-impacts-gitlab-ceee">Cross-site scripting issue in k8s proxy impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-11865---incorrect-authorization-issue-in-workflows-impacts-gitlab-ee">Incorrect Authorization issue in workflows impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-2615---information-disclosure-issue-in-graphql-subscriptions-impacts-gitlab-ceee">Information Disclosure issue in GraphQL subscriptions impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-7000---information-disclosure-issue-in-access-control-impacts-gitlab-ceee">Information Disclosure issue in access control impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-6945---prompt-injection-issue-in-gitlab-duo-review-impacts-gitlab-ee">Prompt Injection issue in GitLab Duo review impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-6171---information-disclosure-issue-in-packages-api-endpoint-impacts-gitlab-ceee">Information Disclosure issue in packages API endpoint impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-11990---client-side-path-traversal-issue-in-branch-names-impacts-gitlab-ee">Client Side Path Traversal issue in branch names impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-7736---improper-access-control-issue-in-gitlab-pages-impacts-gitlab-ceee">Improper Access Control issue in GitLab Pages impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-2-released/#cve-2025-12983---denial-of-service-issue-in-markdown-impacts-gitlab-ceee">Denial of service issue in markdown impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-11224---cross-site-scripting-issue-in-k8s-proxy-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11224">CVE-2025-11224</a> - Cross-site scripting issue in k8s proxy impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an authenticated user to execute stored cross-site scripting through improper input validation in the Kubernetes proxy functionality.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.10 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-11865---incorrect-authorization-issue-in-workflows-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11865">CVE-2025-11865</a> - Incorrect Authorization issue in workflows impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, under certain circumstances, could have allowed a user to remove Duo flows of another user.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.1 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/DylanGriffith">Dylan Griffith</a>.</p>
<h3 id="cve-2025-2615---information-disclosure-issue-in-graphql-subscriptions-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2615">CVE-2025-2615</a> - Information Disclosure issue in GraphQL subscriptions impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a blocked user to access sensitive information by establishing GraphQL subscriptions through WebSocket connections.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.7 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-7000---information-disclosure-issue-in-access-control-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7000">CVE-2025-7000</a> - Information Disclosure issue in access control impacts GitLab CE/EE</h3>
<p>GitLab has remdiated an issue in GitLab CE/EE that under specific conditions, could have allowed unauthorized users to view confidential branch names by accessing project issues with related merge requests.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.6 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/weasterhacker">weasterhacker</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-6945---prompt-injection-issue-in-gitlab-duo-review-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6945">CVE-2025-6945</a> - Prompt Injection issue in GitLab Duo review impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to leak sensitive information from confidential issues by injecting hidden prompts in merge request comments.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 17.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-11990---client-side-path-traversal-issue-in-branch-names-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11990">CVE-2025-11990</a> - Client Side Path Traversal issue in branch names impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to gain CSRF tokens by exploiting improper input validation in repository references combined with redirect handling weaknesses.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 3.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/swiftee">swiftee</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-6171---information-disclosure-issue-in-packages-api-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6171">CVE-2025-6171</a> - Information Disclosure issue in packages API endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with reporter access to view branch names and pipeline details by accessing the packages API endpoint even when repository access was disabled.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 13.2 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 3.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-7736---improper-access-control-issue-in-gitlab-pages-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7736">CVE-2025-7736</a> - Improper Access Control issue in GitLab Pages impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to bypass access control restrictions and view GitLab Pages content intended only for project members by authenticating through OAuth providers.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 3.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-12983---denial-of-service-issue-in-markdown-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-12983">CVE-2025-12983</a> - Denial of service issue in markdown impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a denial of service condition by submitting specially crafted markdown content with nested formatting patterns.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.9 before 18.3.6, 18.4 before 18.4.4, and 18.5 before 18.5.2 <br>
<strong>CVSS</strong> 3.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/phli">phli</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="libxslt-security-updates">libxslt security updates</h3>
<p>libxslt has been updated to version 1.1.43 which contains fixes for security vulnerabilities including CVE-2024-55549 and CVE-2025-24855</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1852">18.5.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2687">[18.5] Backport of &ldquo;Rails: Add explicit ClickHouse check skip&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209319">Backport of &lsquo;rf-disable-sec-attribute-feature-flags&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209855">Backport E2E test: fix create project web ui 18-5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209249">18.5 Backport of &lsquo;Fix query for finding existing Jira issues for vulnerabilities&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209757">Backport of &lsquo;Filter out group-level rules from details page&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210364">[18.5] Reduce cached SQL queries in <code>/api/v4/internal/pages</code> endpoint</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210400">[18.5] Update dependency openssl to v3.3.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210610">Update dependency simplecov-cobertura to v3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209795">Backport of  Fix password validation exception for FIPS</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210300">Backport of &lsquo;Fix admin_project_member policy for SAML projects related to user namespaces&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210536">Backport of &lsquo;Web Agentic Chat: fix calling workflowGoal on undefined&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210353">[Backport 18.5] Turn off Duo core widget for self-managed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210747">Backport of &lsquo;Fix status mapping evaluation for non-persisted current status records&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210341">[18.5] Upgrade Rack to 2.2.20</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210737">Backport of Elastic rake tasks projects_not_indexed and index_projects_status could be confusing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210512">Backport of &lsquo;Add deleted Geo migration back&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211228">Backport of  Allow Legacy FIPS instances to Upgrade Oauth secerets</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210726">Backport of Zoekt Exclude forks and Include archived filters in the cache key</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211436">[Backport 18.5] Clear tracking queues when recreating index from scratch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211435">[18.5 Backport] Delete failed reindexing indexes created over 30 days ago</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211412">Backport of &lsquo;Fix redirect loop in Gitea rate limit`</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211537">[18.5 Backport] Set http_continue_timeout to nil for s3 client</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211571">[18.5] Fix background migration when Ghost user is missing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211409">Backport Support Jira Cloud and Server issue fetching</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211708">[18.5] Fix test failure by adjusting dates to match partition range</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211556">Backport &lsquo;Revert merge trains changes to getState GraphQL query&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211750">Backport &lsquo;Update merge request widget polling timeout intervals&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211524">[18.5] Downgrade Zeitwerk to 2.6.18</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210558">[Backport/18.5] of Fix instance bbm for mishandled nil verification token</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8808">Fix NGINX not routing traffic to the right server</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8814">[18.5] Uninstall rexml 3.4.0 and ensure 3.4.4 is used</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8820">Update redis to v7.2.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8836">Bump eventmachine-tail gem to version 0.6.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8849">[18.5] Upgrade Rack to 2.2.20</a></li>
</ul>
<h3 id="1844">18.4.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2688">[18.4] Backport of &ldquo;Rails: Add explicit ClickHouse check skip&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210365">[18.4] Reduce cached SQL queries in <code>/api/v4/internal/pages</code> endpoint</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210402">[18.4] Update dependency openssl to v3.3.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208305">Backports branch &rsquo;tachyons-remove-ff-sha512-oauth&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210395">[18.4] Update rexml to v3.4.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209793">Backport of Fix password validation exception for FIPS</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210295">Backport of &lsquo;Fix admin_project_member policy for SAML projects related to user namespaces&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210361">[Backport 18.4] Turn off Duo core widget for self-managed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210343">[18.4] Upgrade Rack to 2.2.20</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210754">Backport of Elastic rake tasks projects_not_indexed and index_projects_status could be confusing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210510">Backport of &lsquo;Add deleted Geo migration back&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210925">Backport of &lsquo;Fix: prevent duplicate &lsquo;?&rsquo; in Download directory URL (use &lsquo;&amp;&rsquo; for extra params)&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211227">Backport of  Allow Legacy FIPS instances to Upgrade Oauth secrets</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211421">Backport of &lsquo;Fix redirect loop in Gitea rate limit&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211538">[18.4 Backport] Set http_continue_timeout to nil for s3 client</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211563">Backport of Update Jira integration to use token-based pagination and Support Jira Cloud and Server issue fetching</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211555">Backport &lsquo;Revert merge trains changes to getState GraphQL query&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210729">Backport of Zoekt Exclude forks and Include archived filters in the cache key</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211751">Backport &lsquo;Update merge request widget polling timeout intervals&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210555">[Backport/18.4] of Fix instance bbm for mishandled nil verification token</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8815">[18.4] Uninstall rexml 3.4.0 and ensure 3.4.4 is used</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8821">Update redis to v7.2.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8850">[18.4] Upgrade Rack to 2.2.20</a></li>
</ul>
<h3 id="1836">18.3.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210366">[18.3] Reduce cached SQL queries in <code>/api/v4/internal/pages</code> endpoint</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210403">[18.3] Update dependency openssl to v3.3.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210394">[18.3] Update rexml to v3.4.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/210346">[18.3] Upgrade Rack to 2.2.20</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211539">[18.3 Backport] Set http_continue_timeout to nil for s3 client</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211473">Backport of &lsquo;Fix redirect loop in Gitea rate limit&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/211572">Backport of Update Jira integration to use token-based pagination and Support Jira Cloud and Server issue fetching</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8816">[18.3] Uninstall rexml 3.4.0 and ensure 3.4.4 is used</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8822">Update redis to v7.2.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8851">[18.3] Upgrade Rack to 2.2.20</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.5.2</li>
<li>18.4.4</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.5.1, 18.4.3, 18.3.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-5-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-5-1-released/</id><published>2025-10-22T00:00:00Z</published><updated>2025-10-22T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On October 22, 2025, we released versions 18.5.1, 18.4.3, 18.3.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/2020/05/20/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-11702---improper-access-control-issue-in-runner-api-impacts-gitlab-ee">Improper access control issue in runner API impacts GitLab EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-10497---denial-of-service-issue-in-event-collection-impacts-gitlab-ceee">Denial of service issue in event collection impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-11447---denial-of-service-issue-in-json-validation-impacts-gitlab-ceee">Denial of service issue in JSON validation impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-11974---denial-of-service-issue-in-upload-impacts-gitlab-ceee">Denial of service issue in upload impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-11971---incorrect-authorization-issue-in-pipeline-builds-impacts-gitlab-ee">Incorrect Authorization issue in pipeline builds impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-6601---business-logic-error-issue-in-group-memberships-impacts-gitlab-ee">Business logic error issue in group memberships impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-5-1-released/#cve-2025-11989---missing-authorization-issue-in-quick-actions-impacts-gitlab-ee">Missing authorization issue in quick actions impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-11702---improper-access-control-issue-in-runner-api-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11702">CVE-2025-11702</a> - Improper access control issue in runner API impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with specific permissions to hijack project runners from other projects.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 17.1 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 <br>
<strong>CVSS</strong> 8.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-10497---denial-of-service-issue-in-event-collection-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10497">CVE-2025-10497</a> - Denial of service issue in event collection impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition by sending specially crafted payloads.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 17.10 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-11447---denial-of-service-issue-in-json-validation-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11447">CVE-2025-11447</a> - Denial of service issue in JSON validation impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to cause a denial of service condition by sending GraphQL requests with crafted JSON payloads.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.0 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-11974---denial-of-service-issue-in-upload-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11974">CVE-2025-11974</a> - Denial of service issue in upload impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by uploading large files to specific API endpoints.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 11.7 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 <br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member David Fernandez</p>
<h3 id="cve-2025-11971---incorrect-authorization-issue-in-pipeline-builds-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11971">CVE-2025-11971</a> - Incorrect Authorization issue in pipeline builds impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to trigger unauthorized pipeline executions by manipulating commits.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 10.6 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 <br>
<strong>CVSS</strong>  6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N</code></a>)</p>
<h3 id="cve-2025-6601---business-logic-error-issue-in-group-memberships-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6601">CVE-2025-6601</a> - Business logic error issue in group memberships impacts GitLab EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed authenticated users to gain unauthorized project access by exploiting the access request approval workflow.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 18.4 before 18.4.3 and 18.5 before 18.5.1 <br>
<strong>CVSS</strong> 3.8 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> and <a href="https://hackerone.com/rhidayahh">rhidayahh</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="cve-2025-11989---missing-authorization-issue-in-quick-actions-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11989">CVE-2025-11989</a> - Missing authorization issue in quick actions impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to execute unauthorized quick actions by including malicious commands in specific descriptions.</p>
<p><strong>Impacted Versions:</strong> GitLab EE: all versions from 17.6 before 18.3.5, 18.4 before 18.4.3, and 18.5 before 18.5.1 <br>
<strong>CVSS</strong> 3.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member Eva Kadlecová</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1851">18.5.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209210">[18.5] Downgrade redis-rb gem to v5.4.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209234">[18.5] Fix connection pool errors when health check is running</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209577">Backport: Test: dismiss duo popover</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209240">Backport of &lsquo;Fix work item status fallback to use lifecycle-aware default&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/-/merge_requests/3063">Support stable branch pipelines (18.5 backport)</a></li>
</ul>
<h3 id="1843">18.4.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8221">pgbouncer: Use new bitnamilegacy container registry (18.4 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207903">[18.4] Revert discarded database pool check in load balancer</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207417">Backport &lsquo;Fix group wiki inaccessible after deleting and creating group with the same name&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208091">Backport ElasticIndexBulkCronWorker throwing NoMethodError for epics</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208242">[18.4] Fix Geo routes leaking to other specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208124">Backport Allow Zoekt in Search API for blobs scope when Elasticsearch disabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208081">Backport fix-agentic-chat-service-url-for-shm for 18.4 EE</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208083">Backport Zoekt Kaminari raises an exception if total_count gets negative</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208280">Backport (18.4) &ldquo;Update dependency @gitlab/web-ide to ^0.0.1-dev-20250925110326&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208307">Backport branch &lsquo;sh-fix-login-issues-ubuntu-fips&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208436">Backport &ldquo;Improve performance of ready to merge GraphQL query&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208601">[18.4] Fix flaky callout dismissal specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208255">Backport: Ensure consistent approval permissions between UI, API and graphql</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208805">Backport of &lsquo;Show whitespace message when there&rsquo;s nothing to show&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209204">[18.4] Downgrade redis-rb gem to v5.4.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209233">[18.4] Fix connection pool errors when health check is running</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209272">Backport &lsquo;Remove available auto merge strategies from ready to merge query&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209250">18.4 Backport of &lsquo;Fix query for finding existing Jira issues for vulnerabilities&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209578">Backport: Test: dismiss duo popover</a></li>
<li><a href="https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/-/merge_requests/3064">Support stable branch pipelines (18.4 backport)</a></li>
</ul>
<h3 id="1835">18.3.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/8222">pgbouncer: Use new bitnamilegacy container registry (18.3 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207838">[18.3] Prevent session creation for sessionless users</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206914">Backport of &lsquo;Fix Start free trial link for self-managed instances&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206733">Backport &lsquo;Fix SlackIntegration duplicate bug when inheriting from parent&rsquo; to 18.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208109">Backport ElasticIndexBulkCronWorker throwing NoMethodError for epics</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205251">Backport of &lsquo;Recreate SlackIntegration records on descendant integration on update&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207447">[18.3] Fix json validation for elasticsearch_aws_role_arn</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208605">[18.3] Fix flaky callout dismissal specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208243">[18.3] Fix Geo routes leaking to other specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208277">Backport (18.3) &ldquo;Update dependency @gitlab/web-ide to ^0.0.1-dev-20250925110326&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/208806">Backport of &lsquo;Show whitespace message when there&rsquo;s nothing to show&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209206">[18.3] Downgrade redis-rb gem to v5.4.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/209579">Backport: Test: dismiss duo popover 18-3</a></li>
<li><a href="https://gitlab.com/gitlab-org/cluster-integration/gitlab-agent/-/merge_requests/3065">Support stable branch pipelines (18.3 backport)</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>These versions do not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.4.2, 18.3.4, 18.2.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-4-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-4-2-released/</id><published>2025-10-08T00:00:00Z</published><updated>2025-10-08T00:00:00Z</updated><author><name>Kat Wu</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On October 8, 2025, we released versions 18.4.2, 18.3.4, 18.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-2-released/#cve-2025-11340---incorrect-authorization-issue-in-graphql-mutations-impacts-gitlab-ee">Incorrect authorization issue in GraphQL mutations impacts GitLab EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-2-released/#cve-2025-10004---denial-of-service-issue-in-graphql-blob-type-impacts-gitlab-ceee">Denial of Service issue in GraphQL blob type impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-2-released/#cve-2025-9825---missing-authorization-issue-in-manual-jobs-impacts-gitlab-ceee">Missing authorization issue in manual jobs impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-2-released/#cve-2025-2934---denial-of-service-issue-in-webhook-endpoints-impacts-gitlab-ceee">Denial of Service issue in webhook endpoints impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-11340---incorrect-authorization-issue-in-graphql-mutations-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11340">CVE-2025-11340</a> - Incorrect authorization issue in GraphQL mutations impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed authenticated users with read-only API tokens to perform unauthorized write operations on vulnerability records by exploiting incorrectly scoped GraphQL mutations.<br>
<strong>Impacted Versions</strong>: GitLab EE: all versions from 18.3 to 18.3.4, 18.4 to 18.4.2 <br>
<strong>CVSS</strong>: 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/bwill">Brian Williams</a>.</p>
<h3 id="cve-2025-10004---denial-of-service-issue-in-graphql-blob-type-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10004">CVE-2025-10004</a> - Denial of Service issue in GraphQL blob type impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could make the GitLab instance unresponsive or degraded by sending crafted GraphQL queries requesting large repository blobs.<br>
<strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 13.12 to 18.2.8, 18.3 to 18.3.4, and 18.4 to 18.4.2 <br>
<strong>CVSS</strong>: 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-9825---missing-authorization-issue-in-manual-jobs-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-9825">CVE-2025-9825</a> - Missing authorization issue in manual jobs impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users without project membership to view sensitive manual CI/CD variables by querying the GraphQL API.<br>
<strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 13.7 to 18.2.8, 18.3 before 18.3.4, and 18.4 before 18.4.2 <br>
<strong>CVSS:</strong> 5.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-2934---denial-of-service-issue-in-webhook-endpoints-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2934">CVE-2025-2934</a> - Denial of Service issue in webhook endpoints impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue impacting an upstream Ruby Core library that could have allowed an authenticated user to create a denial of service condition by configuring malicious webhook endpoints that send crafted HTTP responses. This issue was reported to Ruby Core maintainers on July 17, 2025.<br>
<strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 5.2 prior to 18.2.8, 18.3 prior to 18.3.4, and 18.4 prior to 18.4.2<br>
<strong>CVSS:</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/ppee">ppee</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1842">18.4.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206259">Backport of &lsquo;Added safety chaining to pipeline helper&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206057">Workhorse: Improve large HTTP handling for DWS proxy</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206161">Backport of &lsquo;Fix: no implicit conversion of String into Array&rsquo; in Geo::Event workers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206330">Backport: Fix agentic chat</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206833">[18.4] Clear detached partitions before tests run</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206915">Backport &lsquo;Fixes target projects endpoint 404 on compare revisions view&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206962">Transfer start and due dates data upon work item move or clone</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207052">Backport of &lsquo;Fix reassignment dropdown in CE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206778">Transfer health status data upon work item move or clone</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206999">Backport of Revert &ldquo;Merge branch &lsquo;ai-catalog-item-consumers-graphql&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206860">Backport of CI_MERGE_REQUEST_DIFF_BASE_SHA not updating on branch change</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206979">Backport of &ldquo;Use key-value structure in Release Environment MR label script&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206163">Backport of &lsquo;Fix Start free trial link for self-managed instances&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207013">Update dependency gitlab-fog-azure-rm to &lsquo;~&gt; 2.4.0&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207283">Backport of &lsquo;Remove non Saas instances from calling CDOT for trial duration&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206520">Backport of &lsquo;Remove check_f02a3f53bf not null constraint&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207685">18.4 backport of &lsquo;Remove unknown licenses from sbom dependency list export&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207445">[18.4] Fix json validation for elasticsearch_aws_role_arn</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207245">Backport: Change the model selection FF used for self managed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207794">[18.4] Prevent session creation for sessionless users</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8741">Add a gitlab::config alias for package::config recipe</a></li>
</ul>
<h3 id="1834">18.3.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206060">Workhorse: Improve large HTTP handling for DWS proxy</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206834">[18.3] Clear detached partitions before tests run</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206918">Backport &lsquo;Fixes target projects endpoint 404 on compare revisions view&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206961">Transfer start and due dates data upon work item move or clone</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207053">Backport of &lsquo;Fix reassignment dropdown in CE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206776">Transfer health status data upon work item move or clone</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206980">Backport of &ldquo;Use key-value structure in Release Environment MR label script&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207014">Update dependency gitlab-fog-azure-rm to &lsquo;~&gt; 2.4.0&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207288">Backport of &lsquo;Remove non Saas instances from calling CDOT for trial duration&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207687">18.3 backport of &lsquo;Remove unknown licenses from sbom dependency list export&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8755">Update docs hugo jobs&rsquo; image to use latest image</a></li>
</ul>
<h3 id="1828">18.2.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205903">[18.2] Allow elastic client adapter to be set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206835">[18.2] Clear detached partitions before tests run</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206958">Transfer start and due dates data upon work item move or clone</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207054">Backport of &lsquo;Fix reassignment dropdown in CE&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206775">Transfer health status data upon work item move or clone</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206981">Backport of &ldquo;Use key-value structure in Release Environment MR label script&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207015">Update dependency gitlab-fog-azure-rm to &lsquo;~&gt; 2.4.0&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207448">[18.2] Fix json validation for elasticsearch_aws_role_arn</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/207688">18.2 backport of &lsquo;Remove unknown licenses from sbom dependency list export&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206928">Backport of &lsquo;Fix Start free trial link for self-managed instances&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8754">Update docs hugo jobs&rsquo; image to use latest image</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.4.2</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.4.1, 18.3.3, 18.2.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-4-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-4-1-released/</id><published>2025-09-25T00:00:00Z</published><updated>2025-09-25T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 25, 2025, we released versions 18.4.1, 18.3.3, 18.2.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-9642---cross-site-scripting-issue-impacts-gitlab-ceee">Cross-site scripting issue impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-10858---denial-of-service-issue-when-uploading-specifically-crafted-json-files-impacts-gitlab-ceee">Denial of Service issue when uploading specifically crafted JSON files impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-8014---denial-of-service-issue-bypassing-query-complexity-limits-impacts-gitlab-ceee">Denial of Service issue bypassing query complexity limits impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-9958---information-disclosure-issue-in-virtual-registry-configuration-for-low-privileged-users-impacts-gitlab-ceee">Information disclosure issue in virtual registery configuration for low privileged users impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-7691---privilege-escalation-issue-from-within-the-developer-role-impacts-gitlab-ee">Privilege Escalation issue from within the Developer role impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-11042---denial-of-service-issue-in-graphql-api-via-unbounded-array-parameters-impacts-gitlab-ceee">Denial of Service issue in GraphQL API via Unbounded Array Parameters impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-10871---improper-authorization-issue-for-project-maintainers-when-assigning-roles-impacts-gitlab-ee">Improper Authorization issue for Project Maintainers when assigning roles impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-10867---denial-of-service-issue-in-graphql-api-blobsearch-impacts-gitlab-ceee">Denial of Service issue in GraphQL API blobSearch impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-5069---incorrect-ownership-assignment-via-move-issue-drop-down-impacts-gitlab-ceee">Incorrect ownership assignment via Move Issue drop-down impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-4-1-released/#cve-2025-10868---denial-of-service-issue-via-string-conversion-methods-impacts-gitlab-ceee">Denial of Service issue via string conversion methods impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-9642---cross-site-scripting-issue-in-script-gadgets-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-9642">CVE-2025-9642</a> - Cross-site scripting issue in Script Gadgets impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed an unauthenticated user to execute actions on behalf of other users by injecting malicious content.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 14.10 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1.<br>
<strong>CVSS</strong>: 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a></p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-10858---denial-of-service-issue-when-uploading-specifically-crafted-json-files-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10858">CVE-2025-10858</a> - Denial of Service issue when uploading specifically crafted JSON files impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to render a GitLab instance unresponsive to legitimate users by sending specifically crafted JSON files.</p>
<p><strong>Impacted versions:</strong> GitLab CE/EE: all versions before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<h3 id="cve-2025-8014---denial-of-service-issue-bypassing-query-complexity-limits-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-8014">CVE-2025-8014</a> - Denial of Service issue bypassing query complexity limits impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to bypass query complexity limits leading to a Denial of Service condition.</p>
<p><strong>Impacted versions:</strong> Gitlab EE/CE all versions from 11.10 prior to 18.2.7, 18.3 prior to 18.3.3, and 18.4 prior to 18.4.1<br>
<strong>CVSS:</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/foxribeye">foxribeye</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-9958---information-disclosure-issue-in-virtual-registry-configuration-for-low-privileged-users-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-9958">CVE-2025-9958</a> - Information disclosure issue in virtual registry configuration for low privileged users impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed low privileged users access to sensitive information stored in virtual registry configurations.</p>
<p><strong>Impacted versions:</strong> GitLab CE/EE all versions from 14.10 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-7691---privilege-escalation-issue-from-within-the-developer-role-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7691">CVE-2025-7691</a> - Privilege Escalation issue from within the Developer role impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed a developer with specific group management permissions to escalate their privileges and obtain unauthorized access to additional system capabilities.</p>
<p><strong>Impacted versions:</strong> GitLab EE all versions from 16.6 prior to 18.2.7, 18.3 prior to 18.3.3, and 18.4 prior to 18.4.1<br>
<strong>CVSS:</strong> 6.5 <a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-11042---denial-of-service-issue-in-graphql-api-via-unbounded-array-parameters-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-11042">CVE-2025-11042</a> - Denial of Service issue in GraphQL API via Unbounded Array Parameters impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause uncontrolled CPU consumption, potentially leading to a Denial of Service condition while using specific GraphQL queries.</p>
<p><strong>Impacted versions:</strong> GitLab CE/EE all versions starting from 17.2 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/afrnz">Alisa Frunza</a>.</p>
<h3 id="cve-2025-10871---improper-authorization-issue-for-project-maintainers-when-assigning-roles-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10871">CVE-2025-10871</a> - Improper Authorization issue for Project Maintainers when assigning roles impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could allow Project Maintainers improper authorization to assign custom roles to users exceeding the Project Maintainer&rsquo;s security boundary and achieving elevated privileges.</p>
<p><strong>Impacted versions:</strong> GitLab EE all versions from 16.6 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 3.8 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L</code></a>)</p>
<p>This vulnerability was discovered internally by a GitLab team member, <a href="https://gitlab.com/dlrussel">Diane Russel</a>.</p>
<h3 id="cve-2025-10867---denial-of-service-issue-in-graphql-api-blobsearch-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10867">CVE-2025-10867</a> - Denial of Service issue in GraphQL API blobSearch impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to create a Denial of Service condition by exploiting an unprotected GraphQL API through repeated requests.</p>
<p><strong>Impacted versions:</strong> GitLab CE/EE all versions from 18.1 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/terrichu">Terri Chu</a></p>
<h3 id="cve-2025-5069---incorrect-ownership-assignment-via-move-issue-drop-down-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-5069">CVE-2025-5069</a> - Incorrect ownership assignment via Move Issue drop-down impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to gain unauthorized access to confidential issues by creating a project with an identical name, potentially having users transfer sensitive information to the incorrect project.</p>
<p><strong>Impacted versions:</strong> GitLab CE/EE all versions from 17.10 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/foxribeye">foxribeye</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-10868---denial-of-service-issue-via-string-conversion-methods-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10868">CVE-2025-10868</a> - Denial of Service issue via string conversion methods impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause performance degradation, potentially leading to a Denial of Service condition with certain string conversion methods.</p>
<p><strong>Impacted versions:</strong> GitLab CE/EE all versions from 17.4 before 18.2.7, 18.3 before 18.3.3, and 18.4 before 18.4.1<br>
<strong>CVSS:</strong> 3.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</code></a>)</p>
<h3 id="postgresql-security-updates">postgreSQL security updates</h3>
<p><code>postgreSQL</code> has been updated to version 16.10 which contains fixes for security vulnerabilities including CVE-2025-8713, CVE-2025-8714 and CVE-2025-8715</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1841">18.4.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205266">Backport of Update the admin user for GET Release Environment QA tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205496">[18.4] Backport: Resolve &ldquo;Unable to fork project or create project if application wide lock_duo_features_enabled is true&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205374">Backport of Add Danger message to guide backport MR authors to reviewers and mergers (18.4)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205365">Backport of &lsquo;Prevent deleting group/project when ancestor is marked for deletion at the service level&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205608">18.4: Backport of &lsquo;Fix error when applying scanner suggestion&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205622">Backport of Ensure proper MCP URL OAuth Discovery for API/V4/MCP</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205735">Fix database state leak across specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205663">Optimize HandleMalformedStrings middleware for CPU and memory</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205750">Backport protected branches dropdown copy fix to 18.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205876">[18.4] Fix flaky parallel design management uploads spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205807">Backport of (Fix FetchModelDefinitionsService) !205687</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206018">Backport: Add documentation on how to add DUO_WORKFLOW_SELF_SIGNED_JWT__SIGNING_KEY for DAP installations</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206004">Backport of &lsquo;Geo: fix <code>ActiveRecord::StatementInvalid: PG::UndefinedColumn</code> when querying reverification count&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205854">Backport of Return success when status update target already matches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205899">[18.4] Allow elastic client adapter to be set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206199">Backport of Use isUnsafeLink for xcode protocol</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206229">Ensure assets get recompiled if cached-assets-hash.txt is empty</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206147">18.4 Backport of &lsquo;Resolve &ldquo;Dependency list export with API silently fails license validation&rdquo;&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8733">CI: Make Ubuntu 22.04 FIPS check EE-only (Backport)</a></li>
</ul>
<h3 id="1833">18.3.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203969">Backport &lsquo;Bump default ruby version to 3.2.9&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204752">Backport of &ldquo;Use release-environment project id instead of canonical&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204767">Backport of &lsquo;Danger to not warn in maintained stable branches&rsquo; to 18.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204681">Backport of &ldquo;Upgrade duo workflow client protocol version&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204568">Backport of &ldquo;Filter out duplicate values from the variable options dropdown&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204897">18.3: Backport of &lsquo;Fix security widget polling indefinitely when there are sboms&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204902">[18.3 backport] Remove CVE-2025-8714 commands from structure.sql</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204635">Backport 18.3: Do not trim deployment filename in geo secondary</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204370">[Backport-18.3]Wiki search throws 500 error for some wiki content</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204361">[18.3] Fix search admin page error when ES server returns forbidden</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205149">Backport of &ldquo;Hide secrets manager settings behind feature flag instead of just the license&rdquo; to 18.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205265">Backport of Update the admin user for GET Release Environment QA tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205498">[18.3] Backport: Resolve &ldquo;Unable to fork project or create project if application wide lock_duo_features_enabled is true&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205372">Backport of Add Danger message to guide backport MR authors to reviewers and mergers (18.3)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205541">[Backport 18-3] Skip secret push protection for as-if-foss pipeline</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205610">18.3: Backport of &lsquo;Fix error when applying scanner suggestion&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205625">Backport of Ensure proper MCP URL OAuth Discovery for API/V4/MCP</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205731">Optimize HandleMalformedStrings middleware for CPU and memory</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205700">Backport to 18.3 of Add job project claims to CI ID Tokens</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205849">Backport of Return success when status update target already matches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205877">[18.3] Fix flaky parallel design management uploads spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206171">Backport &lsquo;Fix branches autocomplete paths in the merge request list app&rsquo; to 18-3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206173">Backport &lsquo;Fix Linked file not being on top of the list&rsquo; to 18-3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205902">[18.3] Allow elastic client adapter to be set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206204">Backport of Use isUnsafeLink for xcode protocol</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/206144">18.3 Backport of &lsquo;Resolve &ldquo;Dependency list export with API silently fails license validation&rdquo;&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8699">Backport: Fix registry matadata database password creation</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8720">Fall back to c_rehash if there are multiple TLS certificates</a></li>
</ul>
<h3 id="1827">18.2.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204431">Backport of diff comment suggestions line range fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204362">[18.2] Fix search admin page error when ES server returns forbidden</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204372">[Backport 18.2] Wiki search throws 500 error for some wiki content</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204768">Backport of &lsquo;Danger to not warn in maintained stable branches&rsquo; to 18.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204636">Backport 18.2: Do not trim deployment filename in geo secondary</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204785">Backport of &ldquo;Use release-environment project id instead of canonical&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204900">18.2: Backport of &lsquo;Fix security widget polling indefinitely when there are sboms&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205264">Backport of Update the admin user for GET Release Environment QA tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205542">[Backport 18-2] Skip secret push protection for as-if-foss pipeline</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205370">Backport of Add Danger message to guide backport MR authors to reviewers and mergers (18.2)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205612">18.2: Backport of &lsquo;Fix error when applying scanner suggestion&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205733">Optimize HandleMalformedStrings middleware for CPU and memory</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205705">Backport to 18.2 of Add job project claims to CI ID Tokens</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205500">[18.2] Backport: Resolve &ldquo;Unable to fork project or create project if application wide lock_duo_features_enabled is true&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/205879">[18.2] Fix flaky parallel design management uploads spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8721">Fall back to c_rehash if there are multiple TLS certificates</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>These versions do not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.3.2, 18.2.6, 18.1.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-3-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-3-2-released/</id><published>2025-09-10T00:00:00Z</published><updated>2025-09-10T00:00:00Z</updated><author><name>Kat Wu</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 10, 2025, we released versions 18.3.2, 18.2.6, 18.1.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-2-released/#cve-2025-2256---denial-of-service-issue-in-saml-responses-impacts-gitlab-ceee">Denial of Service issue in SAML Responses impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-2-released/#cve-2025-6454---server-side-request-forgery-issue-in-webhook-custom-header-impacts-gitlab-ceee">Server-Side Request Forgery issue in Webhook custom header impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-2-released/#cve-2025-1250---denial-of-service-issue-in-user-controllable-fields-impacts-gitlab-ceee">Denial of Service issue in User-Controllable Fields impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-2-released/#cve-2025-7337---denial-of-service-issue-in-endpoint-file-upload-impacts-gitlab-ceee">Denial of Service issue in endpoint file upload impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-2-released/#cve-2025-10094---denial-of-service-issue-in-token-listing-operations-impacts-gitlab-ceee">Denial of Service issue in token listing operations impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-2-released/#cve-2025-6769---information-disclosure-issue-in-runner-endpoints-impacts-gitlab-ceee">Information disclosure issue in runner endpoints impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-2256---denial-of-service-issue-in-saml-responses-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2256">CVE-2025-2256</a> - Denial of Service issue in SAML Responses impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed unauthorized users to render the GitLab instance unresponsive to legitimate users by sending multiple concurrent large SAML responses.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 7.12 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 <br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yuki_osaki">yuki_osaki</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-6454---server-side-request-forgery-issue-in-webhook-custom-header-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6454">CVE-2025-6454</a> - Server-Side Request Forgery issue in Webhook custom header impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to make unintended internal requests through proxy environments by injecting crafted sequences.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 16.11 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 <br>
<strong>CVSS</strong> 8.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/ppee">ppee</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-1250---denial-of-service-issue-in-user-controllable-fields-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-1250">CVE-2025-1250</a> - Denial of Service issue in User-Controllable Fields impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to stall background job processing by sending specially crafted commit messages, merge request descriptions, or notes.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.0 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 <br>
<strong>CVSS:</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-7337---denial-of-service-issue-in-endpoint-file-upload-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7337">CVE-2025-7337</a> - Denial of Service issue in endpoint file upload impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user with Developer-level access to cause a persistent denial of service affecting all users on a GitLab instance by uploading large files.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 7.8 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 <br>
<strong>CVSS:</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-10094---denial-of-service-issue-in-token-listing-operations-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-10094">CVE-2025-10094</a> - Denial of Service issue in token listing operations impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to disrupt access to token listings and related administrative operations by creating tokens with excessively large names.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 10.7 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 <br>
<strong>CVSS:</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-6769---information-disclosure-issue-in-runner-endpoints-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6769">CVE-2025-6769</a> - Information disclosure issue in runner endpoints impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to view administrator-only maintenance notes by accessing runner details through specific interfaces.</p>
<p><strong>Impacted Versions:</strong> GitLab CE/EE: all versions from 15.1 before 18.1.6, 18.2 before 18.2.6, and 18.3 before 18.3.2 <br>
<strong>CVSS:</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1832">18.3.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202271">Backport of &lsquo;Ignore silent_mode in clickhouse http calls&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202828">Backport of &lsquo;Update gitlab-shell to v14.45.0&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201943">Revert &ldquo;Merge branch &lsquo;marina.mosti-543725-reviewer-dropdown-ce&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203071">Backport of &ldquo;Only create ToC for headings with links&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202992">Backport of fix webauthn authentication in Firefox - 18.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202953">Backport of move delayed deletion cronjob settings to CE</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203308">Backport &lsquo;Disable gdk-update job in stable branch pipelines&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203290">Backport update to gitlab-sshd to relax allowed algorithms for FIPS</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202829">Backport of &lsquo;Display MCP settings for root groups only&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202994">Backport of &lsquo;Fix shared group access for advanced code search&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203413">Backport: Fix nil error in Gitlab:Auth:IpRateLimiter</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203676">Backport &lsquo;Add Compare link to submodule diffs&rsquo; to 18.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203422">Backport of &ldquo;Revert &lsquo;New projects don&rsquo;t automatically inherit from group-level&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203718">Backport of &ldquo;Fix syncing remote stored Blobs with filenames with plus sign&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203722">Backport of &lsquo;Make FileLocationType.endLine nullable&rsquo; for 18.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203538">Backport of Update csp_enabled? to always return a boolean value</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203686">Backport of Fix LdapAllAddOnSeatSyncWorker removing seats when no groups configured</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203966">Backport &lsquo;Revert gem caching only in specific pipelines&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203933">Update gitlab-shell to v14.45.2 to allow ED25519 for FIPS</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204239">[18.3] Remove flaky spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203954">Backport of diff comment suggestions line range fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8714">Adds checksum for ruby 3.2.9</a></li>
</ul>
<h3 id="1826">18.2.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202827">Update gitlab-shell to v14.45.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203072">Backport of &ldquo;Only create ToC for headings with links&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203288">Backport update to gitlab-sshd to relax allowed algorithms for FIPS</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203309">Backport &lsquo;Disable gdk-update job in stable branch pipelines&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202995">Backport of &lsquo;Fix shared group access for advanced code search&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203525">Backport of &lsquo;Fix Bitbucket Server Importer enqueued job count&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203587">Backport of &lsquo;Fix: Geo::ModelMapper flakiness&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203675">Backport &lsquo;Add Compare link to submodule diffs&rsquo; to 18.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203724">Backport of &lsquo;Make FileLocationType.endLine nullable&rsquo; for 18.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203539">Backport of Update csp_enabled? to always return a boolean value</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203720">Backport of &ldquo;Fix syncing remote stored Blobs with filenames with plus sign&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203932">Update gitlab-shell to v14.45.2 to allow ED25519 for FIPS</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/204241">[18.2] Remove flaky spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8664">Backport 18-2: Fix spec tag name source</a></li>
</ul>
<h3 id="1816">18.1.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202675">Backport of &lsquo;Fix cannot load such file &ndash; gitlab&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203530">Backport of Fix &lsquo;Bitbucket Server Importer enqueued job count&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/203726">Backport of &lsquo;Make FileLocationType.endLine nullable&rsquo; for 18.1</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>These versions do not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.3.1, 18.2.5, 18.1.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-3-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-3-1-released/</id><published>2025-08-27T00:00:00Z</published><updated>2025-08-27T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 27, 2025, we released versions 18.3.1, 18.2.5, 18.1.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-1-released/#cve-2025-3601---allocation-of-resources-without-limits-issue-in-import-function-impacts-gitlab-ceee">Allocation of Resources Without Limits issue in import function impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-1-released/#cve-2025-2246---missing-authentication-issue-in-graphql-endpoint-impacts-gitlab-ceee">Missing authentication issue in GraphQL endpoint impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-1-released/#cve-2025-4225---allocation-of-resources-without-limits-issue-in-graphql-impacts-gitlab-ceee">Allocation of Resources Without Limits issue in GraphQL impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-3-1-released/#cve-2025-5101---code-injection-issue-in-gitlab-repositories-impacts-gitlab-ceee">Code injection issue in GitLab repositories impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-3601---allocation-of-resources-without-limits-issue-in-import-function-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-3601">CVE-2025-3601</a> - Allocation of Resources Without Limits issue in import function impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a Denial of Service (DoS) condition by submitting URLs that generate excessively large responses. <br></p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 8.15 before 18.1.5, 18.2 before 18.2.5, and 18.3 before 18.3.1 <br>
<strong>CVSS</strong>: 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/nermalt">nermalt</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-2246---missing-authentication-issue-in-graphql-endpoint-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2246">CVE-2025-2246</a> - Missing authentication issue in GraphQL endpoint impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed unauthenticated users to access sensitive manual CI/CD variables by querying the GraphQL API. <br></p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions before 18.1.5, 18.2 before 18.2.5, and 18.3 before 18.3.1 <br>
<strong>CVSS</strong>: 5.8 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-4225---allocation-of-resources-without-limits-issue-in-graphql-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-4225">CVE-2025-4225</a> - Allocation of Resources Without Limits issue in GraphQL impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an unauthenticated attacker to cause a denial-of-service condition affecting all users by sending specially crafted GraphQL requests. <br></p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 14.1 before 18.1.5, 18.2 before 18.2.5, and 18.3 before 18.3.1 <br>
<strong>CVSS</strong>: 5.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5101---code-injection-issue-in-gitlab-repositories-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-5101">CVE-2025-5101</a> - Code injection issue in GitLab repositories impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed an authenticated attacker to distribute malicious code that appears harmless in the web interface by taking advantage of ambiguity between branches and tags during repository imports. <br></p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions before 18.1.5, 18.2 before 18.2.5, and 18.3 before 18.3.1 <br>
<strong>CVSS</strong>: 5.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N"><code>CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N</code></a>).</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1831">18.3.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2626">[Backport 18.3] Making changes for container scanning for SBOMs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202294">Backport of &lsquo;Fix cannot load such file &ndash; gitlab&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202065">Backport: Fix namespace issue preventing Ci::Build filtering optimization</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202363">Backport of &ldquo;Dependency Path creation with path caching&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202656">Fix trusted proxies regression when hostname is specified</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202706">Backport of E2E test: use correct checkbox method</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8677">Update Mattermost to v10.10.2</a></li>
</ul>
<h3 id="1825">18.2.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2627">[Backport 18.2] Making changes for container scanning for SBOMs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201853">[18.2] Fix flaky specs due to label ordering</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201990">Backport &lsquo;Danger to fail backport MRs without descriptive title&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201270">Backport bug - Fix mutations of frozen object in feature_setting.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201937">Add stage check for agentic chat</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202418">Backport of &lsquo;update the active_add_on_purchase check to include self-managed check&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202564">Backport of &ldquo;Create noop pipeline template compatible with test-on-omnibus&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202673">Backport of &lsquo;Fix cannot load such file &ndash; gitlab&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202705">Backport of E2E test: use correct checkbox method</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202570">Backport of &lsquo;Ignore silent_mode in clickhouse http calls&rsquo;</a></li>
</ul>
<h3 id="1815">18.1.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201046">Backport &ldquo;Danger to not error when e2e:test-on-omnibus-ee job not present for only QA changes&rdquo; to 18.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196606">Backport Set :throttled urgency for GlobalAdvisoryScanWorker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201245">Backport &lsquo;Add job and script to update backport MR label after deployment&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201425">Backport &lsquo;Update gitlab-chart digest to 9d9e150&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201655">Backport of &lsquo;fix missing ref attribute&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201854">[18.1] Fix flaky specs due to label ordering</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201992">Backport &lsquo;Danger to fail backport MRs without descriptive title&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202419">Backport of &lsquo;update the active_add_on_purchase check to include self-managed check&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202540">Backport of E2E test: use correct checkbox method</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/202565">Backport of &ldquo;Create noop pipeline template compatible with test-on-omnibus&rdquo;</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>These versions do not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.2.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-2-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-2-4-released/</id><published>2025-08-18T00:00:00Z</published><updated>2025-08-18T00:00:00Z</updated><author><name>Reuben Pereira</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 18, 2025, we released versions 18.2.4 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1824">18.2.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8658">Build with Go 1.24.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2619">Update golang-fips/go</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201780">Update gitlab-shell to v14.44.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200626">Backport &ldquo;Use projectRootPath to compose breadcrumb links&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201083">Backport &ldquo;Add custom encoding for repository path for commit data&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201159">Backport &lsquo;Fixes reviewer drawer not opening when installed under relative URL&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201346">Backport-Invalid search request resets the project/group selections in sidebar</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201424">Backport &lsquo;Update gitlab-chart digest to 9d9e150&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201296">Exclude deleted projects from job token authorization logs graphql and csv export service backport to 18.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201243">Backport &lsquo;Add job and script to update backport MR label after deployment&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201366">Backport of &ldquo;Fix undefined method markdown_placeholders_feature_flag_enabled? for a ProjectNamespace&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201654">Backport of &lsquo;fix missing ref attribute&rsquo;</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<p>Note: GitLab releases have skipped 18.2.3. There is no patch with that version number.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.11.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-11-7-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-11-7-released/</id><published>2025-08-15T00:00:00Z</published><updated>2025-08-15T00:00:00Z</updated><author><name>Reuben Pereira</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 15, 2025, we released version 17.11.7 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="17117">17.11.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201388">Backport &lsquo;Replace test-on-gdk with test-on-cng in backport mr pipelines&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201373">Quarantine failing DORA Metrics dashboard tests (target single context)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201345">Backport of &ldquo;Ensure docs hugo_build CI job uses docs-gitlab-com stable branches&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200741">Backport of &lsquo;Make sure cache is clear to prevent failure during upgrade from 17.11&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8544">Update dependency container-registry to v4.19.2-gitlab</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.2.2, 18.1.4, 18.0.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-2-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-2-2-released/</id><published>2025-08-13T00:00:00Z</published><updated>2025-08-13T00:00:00Z</updated><author><name>Nikhil George</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 13, 2025, we released versions 18.2.2, 18.1.4, 18.0.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-7734---cross-site-scripting-issue-in-blob-viewer-impacts-gitlab-ceee">Cross-site scripting issue in blob viewer impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-7739---cross-site-scripting-issue-in-labels-impacts-gitlab-ceee">Cross-site scripting issue in labels impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-6186---cross-site-scripting-issue-in-workitem-impacts-gitlab-ceee">Cross-site scripting issue in Workitem impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-8094---improper-handling-of-permissions-issue-in-project-api-impacts-gitlab-ceee">Improper Handling of Permissions issue in project API impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2024-12303---incorrect-privilege-assignment-issue-in-delete-issues-operation-impacts-gitlab-ceee">Incorrect Privilege Assignment issue in delete issues operation impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-2614---allocation-of-resources-without-limits-issue-in-release-name-creation-impacts-gitlab-ceee">Allocation of Resources Without Limits issue in release name creation impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2024-10219---incorrect-authorization-issue-in-jobs-api-impacts-gitlab-ceee">Incorrect Authorization issue in jobs API impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-8770---authorization-issue-in-merge-request-approval-policy-impacts-gitlab-ee">Authorization issue in Merge request approval policy impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-2937---inefficient-regular-expression-complexity-issue-in-wiki-impacts-gitlab-ceee">Inefficient Regular Expression Complexity issue in wiki impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-1477---allocation-of-resources-without-limits-issue-in-mattermost-integration-impacts-gitlab-ceee">Allocation of Resources Without Limits issue in Mattermost integration impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-5819---incorrect-permission-assignment-issue-in-id-token-impacts-gitlab-ceee">Incorrect Permission Assignment issue in ID token impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-2-released/#cve-2025-2498---insufficient-access-control-issue-in-ip-restriction-impacts-gitlab-ee">Insufficient Access Control issue in IP Restriction impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-7734---cross-site-scripting-issue-in-blob-viewer-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7734">CVE-2025-7734</a> - Cross-site scripting issue in blob viewer impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed a successful attacker to execute actions on behalf of users by injecting malicious content.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 14.2 before 18.0.6, 18.1 before 18.1.4 and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-7739---cross-site-scripting-issue-in-labels-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7739">CVE-2025-7739</a> - Cross-site scripting issue in labels impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed authenticated users to achieve stored cross-site scripting by injecting malicious HTML content in scoped label descriptions.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-6186---cross-site-scripting-issue-in-workitem-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6186">CVE-2025-6186</a> - Cross-site scripting issue in Workitem impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to achieve account takeover by injecting malicious HTML into work item names.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-8094---improper-handling-of-permissions-issue-in-project-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-8094">CVE-2025-8094</a> - Improper Handling of Permissions issue in project API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed authenticated users with maintainer privileges to cause denial of service to other users&rsquo; CI/CD pipelines by manipulating shared infrastructure resources beyond their intended access level.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions 18.0 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/abdelrahman_maged">abdelrahman_maged</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2024-12303---incorrect-privilege-assignment-issue-in-delete-issues-operation-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2024-12303">CVE-2024-12303</a> - Incorrect Privilege Assignment issue in delete issues operation impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed authenticated users with specific roles and permissions to delete issues including confidential ones by inviting users with a specific role.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 17.7 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 6.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yuki_osaki">yuki_osaki</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-2614---allocation-of-resources-without-limits-issue-in-release-name-creation-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2614">CVE-2025-2614</a> - Allocation of Resources Without Limits issue in release name creation impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to cause a denial of service condition by creating specially crafted content that consumes excessive server resources when processed.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 11.6 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2024-10219---incorrect-authorization-issue-in-jobs-api-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2024-10219">CVE-2024-10219</a> - Incorrect Authorization issue in jobs API impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed authenticated users to bypass access controls and download private artifacts by accessing specific API endpoints.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 15.6 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>:  6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/albatraoz">albatraoz</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-8770---authorization-issue-in-merge-request-approval-policy-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-8770">CVE-2025-8770</a> - Authorization issue in Merge request approval policy impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users with specific access to bypass merge request approval policies by manipulating approval rule identifiers.</p>
<p><strong>Impacted Versions</strong>: GitLab EE: all versions from 18.0 prior to 18.0.6, 18.1 prior to 18.1.4, and 18.2 prior to 18.2.2 <br>
<strong>CVSS</strong>: 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/bauerdominic">Dominic Bauer</a>.</p>
<h3 id="cve-2025-2937---inefficient-regular-expression-complexity-issue-in-wiki-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2937">CVE-2025-2937</a> - Inefficient Regular Expression Complexity issue in wiki impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to create a denial of service condition by sending specially crafted markdown payloads to the Wiki feature.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 13.2 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yuki_osaki">yuki_osaki</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-1477---allocation-of-resources-without-limits-issue-in-mattermost-integration-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-1477">CVE-2025-1477</a> - Allocation of Resources Without Limits issue in Mattermost integration impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthenticated user to create a denial of service condition by sending specially crafted payloads to specific integration API endpoints.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 8.14 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 <br>
<strong>CVSS</strong>: 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5819---incorrect-permission-assignment-issue-in-id-token-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-5819">CVE-2025-5819</a> - Incorrect Permission Assignment issue in ID token impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users with developer access to obtain ID tokens for protected branches under certain circumstances.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 15.7 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2 <br>
<strong>CVSS</strong>: 5.0 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/skybound">skybound</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-2498---insufficient-access-control-issue-in-ip-restriction-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2498">CVE-2025-2498</a> - Insufficient Access Control issue in IP Restriction impacts GitLab EE</h3>
<p>GitLab has remediated an issue that under certain conditions could have allowed users to view assigned issues from restricted groups by bypassing IP restrictions.</p>
<p><strong>Impacted Versions</strong>: GitLab EE: all versions from 12.0 prior to 18.0.6, 18.1 prior to 18.1.4, and 18.2 prior to 18.2.2 <br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1822">18.2.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198502">[backport] bug: Fixed double message bug</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198679">Backport of &lsquo;Remove full instance test suite execution from omnibus pipeline&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198865">Backport &lsquo;Replace test-on-gdk with test-on-cng in backport mr pipelines&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198939">[18.2] Fix hardcoded GitLab version in spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198867">Backport of &lsquo;Exclude release environments from QA live envs&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198440">[18.2 backport] Fix flaky epic deletion specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198970">[Backport 18.2] Add pause_control to Elastic delete workers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199095">Backport of Skip Geo secondary for SyncProjectPolicyWorker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198965">Backport of &ldquo;Add outbound allowlist to allowed endpoints for SSRF filter&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199295">Backport of Revert &ldquo;Remove FF for SSRF protection for dependency proxy&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199514">Backport of &lsquo;New projects inherit parent value for duo_features_enabled&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199556">Backport of &lsquo;Add missing elasticsearch_indexing checks to workers&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199665">[18.2] Fix flaky work item spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199462">[backport] of Fix: include relative URL root in PDF worker and cMap paths</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200120">Ensure <code>docs hugo_build</code> CI job uses docs-gitlab-com stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200005">Backport of &lsquo;Fix: validation errors for Duo settings when creating project&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200300">Backport quarantine broken user signups cap alert test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200160">Backport ruby gem caching improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200266">Fix another case where Sidekiq can take too long to shut down</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200056">Backport of &lsquo;Filter out NULL values&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200371">Backport &lsquo;Decouple node-modules caching from any specific branch&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199911">Backport of &lsquo;Simplify db:check-schema CI job&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200448">backport fix to use right primary key for ci_job_artifact_states</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200501">[Backport 18.2] Fix shared group access in advanced search code scope</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200708">Backport &lsquo;Danger to allow backport of maintenance type changes&rsquo; to 18-2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200630">backport: Fix Web IDE loading race condition</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200583">Backport of Fix numpad enter not working for revision compare dropdown</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200644">Backport[18.2]: Removing check for project and framework for self managed instances</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200598">Backport fix case insensitivity in codeowners</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200942">[18.2] Fix flaky note scope spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201018">Backport 556582-link-to-project-not-working-when-gitlab-hosted-in-subpath-after-upgrade-to-18-2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200485">Backport fix: Detect CORS problems in Web IDE</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/201045">Backport &ldquo;Danger to not error when e2e:test-on-omnibus-ee job not present for only QA changes&rdquo; to 18.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200626">Backport &ldquo;Use projectRootPath to compose breadcrumb links&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8597">Backport of &lsquo;Use CI_COMMIT_TAG to check on_tag?&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8619">Fix deprecation check failing on nil values</a></li>
</ul>
<h3 id="1814">18.1.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198678">Backport of &lsquo;Remove full instance test suite execution from omnibus pipeline&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198869">Backport &lsquo;Replace test-on-gdk with test-on-cng in backport mr pipelines&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198441">[18.1 backport] Fix flaky epic deletion specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199082">Backport of &lsquo;Exclude release environments from QA live envs&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199094">Backport of Skip Geo secondary for SyncProjectPolicyWorker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198971">[Backport 18.1] Add pause_control to Elastic delete workers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199294">Backport of  Revert &ldquo;Remove FF for SSRF protection for dependency proxy&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199460">Backport of &ldquo;Update VERSION file for 18.1.3-internal0&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199557">Backport of &lsquo;Add missing elasticsearch_indexing checks to workers&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199709">[18.1] Fix flaky work item spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199465">[backport] of Fix: include relative URL root in PDF worker and cMap paths</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200052">Backport of &ldquo;Add repair index tool&rdquo;, Backport of &ldquo;Filter out NULL values&rdquo;, Backport of &ldquo;Add documentation for IndexRepair task&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200119">Ensure <code>docs hugo_build</code> CI job uses docs-gitlab-com stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200161">Backport ruby gem caching improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200267">Fix another case where Sidekiq can take too long to shut down</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199912">Backport of &lsquo;Simplify db:check-schema CI job&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200443">Backport &lsquo;Decouple node-modules caching from any specific branch&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200449">backport fix to use right primary key for ci_job_artifact_states</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200586">Backport of Fix numpad enter not working for revision compare dropdown</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200710">Backport &lsquo;Danger to allow backport of maintenance type changes&rsquo; to 18-1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200645">Backport[18.1]: Removing check for project and framework for self managed instances</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200628">Backport &ldquo;Use projectRootPath to compose breadcrumb links&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200613">Backport fix case insensitivity in codeowners</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8598">Backport of &lsquo;Use CI_COMMIT_TAG to check on_tag?&rsquo;</a></li>
</ul>
<h3 id="1806">18.0.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198442">[18.0 backport] Fix flaky epic deletion specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199084">Backport of &lsquo;Exclude release environments from QA live envs&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199135">Backport of &lsquo;Run QA on GET release environment&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198973">[Backport 18.0] Add pause_control to Elastic delete workers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199711">[18.0] Fix flaky work item spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200261">Ensure <code>docs hugo_build</code> CI job uses docs-gitlab-com stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200268">Fix another case where Sidekiq can take too long to shut down</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200048">Backport of &ldquo;Add repair index tool&rdquo;, Backport of &ldquo;Filter out NULL values&rdquo;, Backport of &ldquo;Add documentation for IndexRepair task&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/199913">Backport of &lsquo;Simplify db:check-schema CI job&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197809">[backport] &rsquo;tbulva-zoekt-url-reset&rsquo; into 18.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200450">backport fix to use right primary key for ci_job_artifact_states</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200298">Backport ruby gem caching improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200711">Backport &lsquo;Danger to allow backport of maintenance type changes&rsquo; to 18-0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200646">Backport[18.0] Removing check for project and framework for self managed instances</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200761">Backport &lsquo;Decouple node-modules caching from any specific branch&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/200636">Backport fix case insensitivity in codeowners</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8599">Backport of &lsquo;Use CI_COMMIT_TAG to check on_tag?&rsquo;</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This patch includes database migrations that may impact your upgrade process.</p>
<h3 id="impact-on-your-installation">Impact on your installation:</h3>
<ul>
<li><strong>Single-node instances</strong>: This patch will cause downtime during the upgrade as migrations must complete before GitLab can start.</li>
<li><strong>Multi-node instances</strong>: With proper <a href="https://docs.gitlab.com/ee/update/zero_downtime.html">zero-downtime upgrade procedures</a>, this patch can be applied without downtime.</li>
</ul>
<h3 id="regular-migrations">Regular migrations</h3>
<p>The following versions include regular migrations that run during the upgrade process:</p>
<ul>
<li>18.2.2</li>
<li>18.1.4</li>
<li>18.0.6</li>
</ul>
<h3 id="post-deploy-migrations">Post-deploy migrations</h3>
<p>The following versions include post-deploy migrations that can run after the upgrade:</p>
<ul>
<li>18.2.2</li>
<li>18.1.4</li>
<li>18.0.6</li>
</ul>
<p>To learn more about the impact of upgrades on your installation, see:</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/update/zero_downtime.html">Zero-downtime upgrades</a> for multi-node deployments</li>
<li><a href="https://docs.gitlab.com/update/package/#downtime">Standard upgrades</a> for single-node installations</li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.2.1, 18.1.3, 18.0.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-2-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-2-1-released/</id><published>2025-07-23T00:00:00Z</published><updated>2025-07-23T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On July 23, 2025, we released versions 18.2.1, 18.1.3, 18.0.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-1-released/#cve-2025-4700---cross-site-scripting-issue-impacts-kubernetes-proxy-in-gitlab-ceee">Cross-site scripting (XSS) impacts k8s proxy in GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-1-released/#cve-2025-4439---cross-site-scripting-issue-impacts-kubernetes-proxy-in-gitlab-ceee-using-cdns">Cross-site scripting (XSS) impacts k8s proxy in GitLab CE/EE using CDNs</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-1-released/#cve-2025-7001---exposure-of-sensitive-information-to-an-unauthorized-actor-issue-impacts-gitlab-ceee-using-cdns">Exposure of Sensitive Information to an Unauthorized Actor issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-1-released/#cve-2025-4976---improper-access-control-issue-impacts-gitlab-ee">Improper Access Control issue impacts GitLab EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-1-released/#cve-2025-0765---exposure-of-sensitive-information-to-an-unauthorized-actor-issue-impacts-gitlab-ceee">Exposure of Sensitive Information to an Unauthorized Actor issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-2-1-released/#cve-2025-1299---improper-access-control-issue-impacts-gitlab-ceee">Improper Access Control issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-4700---cross-site-scripting-issue-impacts-kubernetes-proxy-in-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-4700">CVE-2025-4700</a> - Cross-site scripting issue impacts Kubernetes Proxy in GitLab CE/EE</h3>
<p>GitLab has remediated an issue affecting a Kubernetes proxy feature that, under specific circumstances, could have potentially allowed a successful attacker to trigger unintended content rendering leading to XSS.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 15.10 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1. <br>
<strong>CVSS</strong>: 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-4439---cross-site-scripting-issue-impacts-kubernetes-proxy-in-gitlab-ceee-using-cdns"><a href="https://www.cve.org/CVERecord?id=CVE-2025-4439">CVE-2025-4439</a> - Cross-site scripting issue impacts Kubernetes Proxy in GitLab CE/EE using CDNs</h3>
<p>GitLab has remediated an issue that could have allowed an authenticated user to perform cross-site scripting attacks when the instance is served through certain content delivery networks.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 15.10 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1. <br>
<strong>CVSS</strong>: 7.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-7001---exposure-of-sensitive-information-to-an-unauthorized-actor-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-7001">CVE-2025-7001</a> - Exposure of Sensitive Information to an Unauthorized Actor issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed privileged users to access certain <code>resource_group</code> information through the API which should have been unavailable.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 15.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1. <br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-4976---improper-access-control-issue-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-4976">CVE-2025-4976</a> - Improper Access Control issue impacts GitLab EE</h3>
<p>GitLab has remediated an issue that, under certain circumstances, could have allowed an attacker to access internal notes in GitLab Duo responses.</p>
<p><strong>Impacted Versions</strong>: GitLab EE: all versions from 17.0 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1. <br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-0765---exposure-of-sensitive-information-to-an-unauthorized-actor-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-0765">CVE-2025-0765</a> - Exposure of Sensitive Information to an Unauthorized Actor issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed an unauthorized user to access custom service desk email addresses.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 17.9 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1. <br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-1299---improper-access-control-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-1299">CVE-2025-1299</a> - Improper Access Control issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under circumstances, could have allowed an unauthorized user to read deployment job logs by sending a crafted request.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE affecting all versions starting from 15.4 before 18.0.5, all versions starting from 18.1 before 18.1.3, all versions starting from 18.2 before 18.2.1. <br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1821">18.2.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2530">Fix double-path issue for COM_REGISTRY</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198503">Update VERSION files</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198464">Backport of &lsquo;[Agentic Chat] Do not response to NewCheckpoint message&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198481">Backport of Delete the search_refactor_membership_filter feature flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198465">Backport of &lsquo;Fix S3 compatibility in Workhorse uploads for non-AWS S3 providers&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198504">[Backport] Allow users to resume/continue previous chat sessions in Agentic Chat instead of forcing new chat creation.</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198517">Send workflow metadata for Agentic Chat</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198424">Backport of Fix Github Import E2E</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198595">Backport fix for Workhorse race test: ignore EOF error for Duo Workflow send stream</a></li>
</ul>
<h3 id="1813">18.1.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197029">Merge branch &lsquo;jk/cache-assets-security-mirror&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196999">[backport] &rsquo;tbulva-zoekt-url-reset&rsquo; into &lsquo;18.1&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197168">Revert &ldquo;Merge branch &lsquo;cherry-pick-54ec1758&rsquo; into &lsquo;18-1-stable-ee&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197184">Merge branch &lsquo;dattang/pass-omnibus-package-to-release-environment-pipeline&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197285">Merge branch &lsquo;dattang/run-qa-on-get-release-environment&rsquo; into &lsquo;18-1-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197027">[backport] Add check for allowlist when configuring Elasticsearch URL</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197355">Backport of &ldquo;Backport of &lsquo;Disable directory_code_dropdown_updates flag&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197829">Revert &ldquo;Enable assets caching on security stable branches&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197648">Backport of &lsquo;Fixed branches loading on group merge request list&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198177">Backport of <code>Trigger webhook events on vulnerability dismissal</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8554">Backport GitLab Exporter 15.6.0 to 18.1.x</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8547">Update dependency container-registry to v4.23.2-gitlab</a></li>
</ul>
<h3 id="1805">18.0.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197141">[Backport 18.0] Zoekt: Only enable global search when nodes are online</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197766">Run GET Release Environments on 18-0-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197650">Backport of &lsquo;Fixed branches loading on group merge request list&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197967">Backport &lsquo;dattang/fix-syntax-release-env-pipeline&rsquo; into &lsquo;18-0-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/197886">[backport to 18.0] Add check for allowlist when configuring Elasticsearch URL</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/198180">Backport of <code>Trigger webhook events on vulnerability dismissal</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8546">Update dependency container-registry to v4.21.4-gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8574">Build Omnibus package for GET Release Environments - 18.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8575">Merge branch &lsquo;cb-fix-prein-version-parse&rsquo; into &lsquo;18-0-stable&rsquo;</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.1.2, 18.0.4, 17.11.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-1-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-1-2-released/</id><published>2025-07-09T00:00:00Z</published><updated>2025-07-09T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On July 9, 2025, we released versions 18.1.2, 18.0.4, 17.11.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-2-released/#cve-2025-6948---cross-site-scripting-issue-impacts-gitlab-ceee">Cross-site scripting issue impacts GitLab CE/EE</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-2-released/#cve-2025-3396---improper-authorization-issue-impacts-gitlab-ceee">Incorrect authorization issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-2-released/#cve-2025-4972---improper-authorization-issue-impacts-gitlab-ee">Incorrect authorization issue impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-2-released/#cve-2025-6168---improper-authorization-issue-impacts-gitlab-ee">Incorrect authorization issue impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-6948---cross-site-scripting-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6948">CVE-2025-6948</a> - Cross-site scripting issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed a successful attacker to execute actions on behalf of users by injecting malicious content.</p>
<p><strong>Impacted Versions</strong>: all versions from 17.11 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2. <br>
<strong>CVSS</strong>: 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a></p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-3396---improper-authorization-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-3396">CVE-2025-3396</a> - Improper authorization issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated project owners to bypass group-level forking restrictions by manipulating API requests.</p>
<p><strong>Impacted Versions</strong>: all versions from 13.3 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2. <br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-4972---improper-authorization-issue-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-4972">CVE-2025-4972</a> - Improper authorization issue impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users with invitation privileges to bypass group-level user invitation restrictions by manipulating group invitation functionality.</p>
<p><strong>Impacted Versions</strong>: all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2. <br>
<strong>CVSS</strong>: 2.7(<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-6168---improper-authorization-issue-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-6168">CVE-2025-6168</a> - Improper authorization issue impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated maintainers to bypass group-level user invitation restrictions by sending crafted API requests.</p>
<p><strong>Impacted Versions</strong>: all versions from 18.0 before 18.0.4 and 18.1 before 18.1.2. <br>
<strong>CVSS</strong>: 2.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/hunter0xp7">hunter0xp7</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="rsync-security-updates">rsync security updates</h3>
<p><code>rsync</code> has been updated to version 3.4.1 which contains fixes for security vulnerabilities including CVE-2024-12084 and CVE-2024-12088.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1812">18.1.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2477">Backport Exporter 15.5.0 to 18.1 stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2474">update gitlab-org/container-registry to v4.23.2-gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195410">Merge branch &lsquo;550037-set-static-glab-version-for-release-qa-tests&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195314">Quarantine a flaky test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195649">Fix code owner validation for roles</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195703">Enable using glab for CI release</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195818">Remove Sidekiq shutdown delay in ConcurrencyLimitSampler</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196086">Refactor blob commit info section (18.1 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195999">Backport &lsquo;Upload cached frontend stable packages&rsquo; to 18-1-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196131">[Backport 18.1] Reintroduce body for redirect responses</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196232">Show both author and committer in last commit (18.1 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196113">Fix creation of PATs using UI on relative installations</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195487">[Backport] Zoekt: Only enable global search when nodes are online</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196241">Fix title on empty projects (18.1 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196358">Rake Doctor Secrets: Fix WebHook error</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196460">Fix comment typos to trigger asset compilation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196504">Fix E2E test service_ping_default_enabled_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196273">Fix catalog data loader memoization problem in specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196167">Backport &ldquo;Disable the edit button, instead of not rendering it&rdquo; to 18.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195871">Add a redirect status as a success backport to 18.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196586">Make sure to load correct loader on every request</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196472">Merge branch &lsquo;dattang/build-omnibus-for-release-environment&rsquo; into &lsquo;18-1-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196440">Backport &lsquo;dattang/export-release-environment-package-name&rsquo; into &lsquo;18-1-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196588">Quarantine a flaky test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196825">Backport: &lsquo;revert-grpc-1.72&rsquo; into 18-1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196613">Merge branch &lsquo;jk/cache-assets-for-stable-branch&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196503">Fix the owner for sequence ci_builds_id_seq</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8519">Backport GitLab Exporter 15.5.0 to 18.1 stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8522">Merge branch &lsquo;dattang/upload-package-for-release-environment&rsquo; into &lsquo;18-1-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8527">Merge branch &lsquo;dattang/build-release-environment-package&rsquo; into &lsquo;18-1-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8533">Merge branch &lsquo;dattang/fix-release-environment-package-name&rsquo; into &lsquo;18-1-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8540">Stable branch builds: Fix versions parsing</a></li>
</ul>
<h3 id="1804">18.0.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2473">update gitlab-org/container-registry to v4.21.4-gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195409">Use 1.59.2 version of glab in release_with_glab_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195315">Quarantine a flaky test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195199">Remove checksum length expectation from the Gitlab::Git::Repository#checksum</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195561">Fix Protected Tags show page</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195650">Fix code owner validation for roles</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195819">Remove Sidekiq shutdown delay in ConcurrencyLimitSampler</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196089">Refactor blob commit info section (18.0 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196001">Backport &lsquo;Upload cached frontend stable packages&rsquo; to 18-0-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196132">[Backport 18.0] Reintroduce body for redirect responses</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196234">Show both author and committer in last commit (18.0 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196166">Backport &ldquo;Add a spinner for a loading elipsis menu&rdquo; to 18.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196243">Fix title on empty projects (18.0 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195727">No-op ValidateCiBuildNeedsProjectIdNotNull</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196467">Fix comment typos to trigger asset compilation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196701">[Backport 18.0] Fix incorrect redirect when branch doesn&rsquo;t include files</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196676">Fix creation of PATs using UI on relative installations</a></li>
</ul>
<h3 id="17116">17.11.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2475">update gitlab-org/container-registry to v4.19.2-gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195408">Use 1.59.2 version of glab in release_with_glab_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195316">Quarantine a flaky test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195200">Remove checksum length expectation from the Gitlab::Git::Repository#checksum</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195652">Fix code owner validation for roles</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195925">Revert &ldquo;Merge branch &lsquo;backport-fix/547265-code-owner-roles-validation-17-11&rsquo;&hellip;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196002">Backport &lsquo;Upload cached frontend stable packages&rsquo; to 17-11-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196468">Fix comment typos to trigger asset compilation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196238">Backport 1465f38a to 17.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195445">Fix incompatible Rails cache version from 7.1 to 6.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196678">Fix creation of PATs using UI on relative installations</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/196702">[Backport 17.11] Fix incorrect redirect when branch doesn&rsquo;t include files</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.1.1, 18.0.3, 17.11.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-1-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-1-1-released/</id><published>2025-06-25T00:00:00Z</published><updated>2025-06-25T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 25, 2025, we released versions 18.1.1, 18.0.3, 17.11.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. To maintain good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-1-released/#cve-2025-3279---denial-of-service-impacts-gitlab-ceee">Denial of Service impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-1-released/#cve-2025-1754---missing-authentication-issue-impacts-gitlab-ceee">Missing Authentication issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-1-released/#cve-2025-5315---improper-access-control-issue-impacts-gitlab-ceee">Improper access control issue impacts GitLab CE/EE</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-1-released/#cve-2025-2938---elevation-of-privilege-impacts-gitlab-ceee">Elevation of Privilege impacts GitLab CE/EE</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-1-1-released/#cve-2025-5846---improper-access-control-issue-impacts-gitlab-ee">Improper access control issue impacts GitLab EE</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-3279---denial-of-service-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-3279">CVE-2025-3279</a> - Denial of Service impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed authenticated attackers to create a DoS condition by sending crafted GraphQL requests.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 10.7 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1. <br>
<strong>CVSS</strong>: 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-1754---missing-authentication-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-1754">CVE-2025-1754</a> - Missing Authentication issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed unauthenticated attackers to upload arbitrary files to public projects by sending crafted API requests, potentially leading to resource abuse and unauthorized content storage.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 17.2 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1. <br>
<strong>CVSS</strong>: 5.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/abdelrahman_maged">abdelrahman_maged</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5315---improper-access-control-issue-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-5315">CVE-2025-5315</a> - Improper access control issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users with Guest role permissions to add child items to incident work items by sending crafted API requests that bypassed UI-enforced role restrictions.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 17.2 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1.<br>
<strong>CVSS</strong>: 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/rhidayahh">rhidayahh</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-2938---elevation-of-privilege-impacts-gitlab-ceee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-2938">CVE-2025-2938</a> - Elevation of Privilege impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to gain elevated project privileges by requesting access to projects where role modifications during the approval process resulted in unintended permission grants.</p>
<p><strong>Impacted Versions</strong>: GitLab CE/EE: all versions from 17.3 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1. <br>
<strong>CVSS</strong>: 3.1 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5846---improper-access-control-issue-impacts-gitlab-ee"><a href="https://www.cve.org/CVERecord?id=CVE-2025-5846">CVE-2025-5846</a> - Improper access control issue impacts GitLab EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to assign unrelated compliance frameworks to projects by sending crafted GraphQL mutations that bypassed framework-specific permission checks.</p>
<p><strong>Impacted Versions</strong>: GitLab EE: all versions from 16.10 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 <br>
<strong>CVSS</strong>: 2.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code></a>)</p>
<p>This vulnerability was reported internally by a GitLab team member, <a href="https://gitlab.com/joernchen">Joern Schneeweisz</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1811">18.1.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2454">(Backport to 18.1) fix: Don&rsquo;t unset IMAGE_TAG_EXT passed by gitlab-org/gitlab</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2450">Backport: Drop ubi-assets-release CI job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195172">[backport] 18.1: Merge branch &lsquo;dj-exclude-stable-branch-coverage&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194913">fix: Backport fix on git over ssh</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194784">Check if Amazon Q should be enabled at project level</a></li>
</ul>
<h3 id="1803">18.0.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194052">[backport] Fix line number in zoekt response</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194127">Restrict LFS file download to project-bound objects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194237">Backport &ldquo;E2E test: account for Duo Core behaviour in code suggestion tests&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194238">Backport &ldquo;E2E test: disable elasticsearch omnibus jobs&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194179">Backport &ldquo;Fix Self Hosted Duo Beta features not being available&rdquo; to 18.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194181">Backport &lsquo;Move up release-environments stage in CI&rsquo; to 18-0-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194518">Projects::TransferService should be more reliable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194558">Merge branch &lsquo;jmc-549650&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194161">backport &rsquo;tbulva-zoekt-flashing-no-results&rsquo; into 18.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194177">Merge branch &rsquo;tbulva-search-page-scope-fix&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194494">Backport attribute_methods.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194391">Backport &ldquo;Fix losing wiki comments on some wiki page slug changes&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195084">Backport to 18.0: Set glab version for release QA tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194193">Backport vulnerability_namespace_historical_statistic fix to 18.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195173">[backport] 18.0: Merge branch &lsquo;dj-exclude-stable-branch-coverage&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194866">Support markdown anchors and multi-line in permalink</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194944">fix: Backport fix on git over ssh</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195216">Backport flaky logger test fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194989">Revert &ldquo;Merge branch &lsquo;backport-bugfix-restrict-LFS-download&ndash;18-0&rsquo; into &lsquo;18-0-stable-ee&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195322">Merge branch &lsquo;dattang/build-internal-release-qa-image&rsquo; into &lsquo;18-0-stable-ee&rsquo;</a></li>
</ul>
<h3 id="17115">17.11.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2460">Merge branch &lsquo;350883-update-to-use-live-trace-application-setting&rsquo; into &lsquo;17-11-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194141">Restrict LFS file download to project-bound objects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194186">Backport &lsquo;Move up release-environments stage in CI&rsquo; to 17-11-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194568">Merge branch &lsquo;jmc-549650&rsquo; into &lsquo;17-11-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194196">Backport &lsquo;Update Import::ValidateRemoteGitEndpoint Service&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195085">Backport to 17.11: Set glab version for release QA tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194189">Backport vulnerability_namespace_historical_statistic fix to 17.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195174">[backport] 17.11: Merge branch &lsquo;dj-exclude-stable-branch-coverage&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195075">fix: Backport fix on git over ssh</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/194988">Revert &ldquo;Merge branch &lsquo;backport-bugfix-restrict-LFS-download&ndash;17-11&rsquo; into &lsquo;17-11-stable-ee&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/195323">Merge branch &lsquo;dattang/build-internal-release-qa-image&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8481">[Backport - 17.11.x] Removing postponed deprecation from omnibus</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.0.2, 17.11.4, 17.10.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-0-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-0-2-released/</id><published>2025-06-11T00:00:00Z</published><updated>2025-06-11T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 11, 2025, we released versions 18.0.2, 17.11.4, 17.10.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases: scheduled releases and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays. For more information, please visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> page and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of GitLab’s release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are committed to ensuring that all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. To maintain good security hygiene, it is highly recommended that all customers upgrade to the latest patch release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, it means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th style="text-align: left">Title</th>
          <th style="text-align: left">Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-4278---html-injection-impacts-gitlab-ceee">HTML injection impacts GitLab CE/EE</a></td>
          <td style="text-align: left">High</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-2254---cross-site-scripting-issue-impacts-gitlab-ceee">Cross-site scripting issue impacts GitLab CE/EE</a></td>
          <td style="text-align: left">High</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-5121---missing-authorization-issue-impacts-gitlab-ultimate-ee">Missing authorization issue impacts GitLab Ultimate EE</a></td>
          <td style="text-align: left">High</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-0673---denial-of-service-impacts-gitlab-ceee">Denial of Service impacts GitLab CE/EE</a></td>
          <td style="text-align: left">High</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-1516---denial-of-service-via-unbounded-webhook-token-names-impacts-gitlab-ceee">Denial of Service via unbounded Webhook token names impacts GitLab CE/EE</a></td>
          <td style="text-align: left">Medium</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-1478---denial-of-service-via-unbounded-board-names-impacts-gitlab-ceee">Denial of Service via unbounded Board Names impacts GitLab CE/EE</a></td>
          <td style="text-align: left">Medium</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2024-9512---information-disclosure-issue-impacts-gitlab-ceee">Information disclosure issue impacts GitLab CE/EE</a></td>
          <td style="text-align: left">Medium</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-5996---denial-of-service-dos-via-uncontrolled-http-response-processing--impacts-gitlab-ceee">Denial of Service (DoS) via uncontrolled HTTP Response Processing impacts GitLab CE/EE</a></td>
          <td style="text-align: left">Medium</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-5195---information-disclosure-via-authorization-bypass-impacts-gitlab-ceee">Information disclosure via authorization bypass impacts GitLab CE/EE</a></td>
          <td style="text-align: left">Medium</td>
      </tr>
      <tr>
          <td style="text-align: left"><a href="/releases/patches/patch-release-gitlab-18-0-2-released/#cve-2025-5982---sensitive-information-disclosure-via-group-ip-restriction-bypass">Sensitive information disclosure via Group IP restriction bypass</a></td>
          <td style="text-align: left">Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-4278---html-injection-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4278">CVE-2025-4278</a> - HTML injection impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed a successful attacker to achieve account takeover by injecting code into the search page.
<strong>Impacted versions</strong> GitLab CE/EE:  all versions starting with 18.0 before 18.0.2.
<strong>CVSS:</strong> 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-2254---cross-site-scripting-issue-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2254">CVE-2025-2254</a> - Cross-site scripting issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed a successful attacker to act in the context of a legitimate user by injecting a malicious script into the snippet viewer.<br>
<strong>Impacted versions</strong> GitLab CE/EE: all versions from 17.9 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2<br>
<strong>CVSS</strong> 8.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5121---missing-authorization-issue-impacts-gitlab-ultimate-ee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5121">CVE-2025-5121</a> - Missing authorization issue impacts GitLab Ultimate EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed a successful attacker with authenticated access to a GitLab instance with a GitLab Ultimate license applied (paid customer or trial) to inject a malicious CI/CD job into all future CI/CD pipelines of any project.<br>
<strong>Impacted versions</strong> GitLab Ultimate EE from 17.11 before 17.11.4 and 18.0 before 18.0.2.
<strong>CVSS</strong> 8.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/jean_d-ou">jean_d-ou</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-0673---denial-of-service-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0673">CVE-2025-0673</a> - Denial of Service impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a successful attacker to deny access to legitimate users of the targeted system by triggering an infinite redirect loop causing memory exhaustion on the server.</p>
<p><strong>Impacted versions</strong> GitLab CE/EE: all versions from 17.7 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2<br>
<strong>CVSS</strong> 7.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-1516---denial-of-service-via-unbounded-webhook-token-names-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1516">CVE-2025-1516</a> - Denial of Service via unbounded Webhook token names impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a successful attacker to deny access to legitimate users of the targeted system by generating tokens with sufficiently large names.
<strong>Impacted versions</strong> GitLab CE/EE: all versions from 8.7 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2<br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-1478---denial-of-service-via-unbounded-board-names-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1478">CVE-2025-1478</a> - Denial of Service via unbounded Board Names impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a successful attacker to deny access to legitimate users of the targeted system by crafting Board Names with sufficiently large sizes.<br>
<strong>Impacted versions</strong> GitLab CE/EE: all versions from 8.13 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1<br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2024-9512---information-disclosure-issue-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9512">CVE-2024-9512</a> - Information disclosure issue impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that, under certain conditions, could have allowed a successful attacker to clone a legitimate user’s private repository by sending a timed clone request when a secondary node is out of sync.</p>
<p><strong>Impacted versions</strong> GitLab CE/EE: all versions prior to 17.10.8, 17.11 prior to 17.11.4, and 18.0 prior to 18.0.2<br>
<strong>CVSS</strong> 5.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</code></a>)</p>
<p>Thanks <a href="https://hackerone.com/hdtran">hdtran</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5996---denial-of-service-dos-via-uncontrolled-http-response-processing--impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5996">CVE-2025-5996</a> - Denial of Service (DoS) via uncontrolled HTTP Response Processing  impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed a successful attacker to deny access to legitimate users of the targeted system by integrating a malicious third-party component into a GitLab project.<br>
<strong>Impacted versions</strong> GitLab CE/EE:  versions from 2.1.0 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2<br>
<strong>CVSS</strong> 6.5 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>)</a></p>
<p>Thanks  <a href="https://hackerone.com/joaxcar">joaxcar</a> and <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cve-2025-5195---information-disclosure-via-authorization-bypass-impacts-gitlab-ceee"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5195">CVE-2025-5195</a> - Information disclosure via authorization bypass impacts GitLab CE/EE</h3>
<p>GitLab has remediated an issue that could have allowed authenticated users to gain access to data beyond their privilege boundaries by accessing arbitrary compliance frameworks.
<strong>Impacted versions</strong> GitLab CE/EE:  all versions from 17.9 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1<br>
<strong>CVSS</strong> 4.3 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by a member of the GitLab team.</p>
<h3 id="cve-2025-5982---sensitive-information-disclosure-via-group-ip-restriction-bypass"><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5982">CVE-2025-5982</a> - Sensitive information disclosure via Group IP restriction bypass</h3>
<p>GitLab has remediated an issue that could have allowed a successful attacker to bypass IP access restrictions and view sensitive group information.
<strong>Impacted versions</strong> GitLab EE: versions from 12.0 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2.<br>
<strong>CVSS</strong> 3.7 (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">@joernchen</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1802">18.0.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191955">Move fork_networks organization_id NOT NULL to post-migrate</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191961">[Backport] Zoekt: Only enable search when nodes are online</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192132">18-0-stable-ee: Trim pages deployment file name to 60 characters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192013">Fix gitpod button is missing in the edit dropdown</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192019">[Backport] Elastic::MigrationWorker should not create migrations index</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192418">Backport operational data_category for duo_core_features_enabled metric on service ping</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192820">[Backport] Fix IDE links returns about:blank in old code dropdow</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192406">Fix the title/body issue for todo apis when it is a duo todo</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191537">Add 18.0 &ldquo;What&rsquo;s New&rdquo; entries</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193180">[Backport] mark_all_as_completed! method should drop halted cache &amp; save halted: false</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192175">Fix &ldquo;No such column: geo_nodes.verification_max_capacity&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193477">[backport] 18.0: Merge branch &lsquo;dj-stable-branch-dont-fail-e2e&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193625">[backport] 18.0: Merge branch &lsquo;dj-refactor-semgrep-ci&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193514">[backport] 18.0: Remove e2e:test-on-omnibus-ee from tier 1 backport MRs</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8440">Fix libarchive checksum script (Backport 18.0)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8435">Warn on changes to tag only CI job definitions</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8454">Backport postponing deprecation to 19.0</a></li>
</ul>
<h3 id="17114">17.11.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191558">[backport] 17.11: Remove jest vue3 check quarantine jobs from backport MR pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192133">17-11-stable-ee: Trim pages deployment file name to 60 characters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193285">Fix gitpod button is missing in the edit dropdown</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193317">[backport] 17.11: Merge branch &lsquo;dj-stable-branch-dont-fail-e2e&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193232">Merge &lsquo;535187-fix-console-errors&rsquo; into &lsquo;17-11-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192963">Attempt to migrate ci_runner_taggings table (try 2)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192932">[backport] 17.11: Remove e2e:test-on-omnibus-ee from tier 1 backport MRs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193626">[backport] 17.11: Merge branch &lsquo;dj-refactor-semgrep-ci&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8441">Fix libarchive checksum script (Backport 17.11)</a></li>
</ul>
<h3 id="17108">17.10.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191560">[backport] 17.10: Remove jest vue3 check quarantine jobs from backport MR pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193304">Fix gitpod button is missing in the edit dropdown</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193318">[backport] 17.10: Merge branch &lsquo;dj-stable-branch-dont-fail-e2e&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192962">Attempt to migrate ci_runner_taggings table (try 2)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/193627">[backport] 17.10: Merge branch &lsquo;dj-refactor-semgrep-ci&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/192933">[backport] 17.10: Remove e2e:test-on-omnibus-ee from tier 1 backport MRs</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8442">Fix libarchive checksum script (Backport 17.10)</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>. To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page. To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 18.0.1, 17.11.3, 17.10.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-0-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-0-1-released/</id><published>2025-05-21T00:00:00Z</published><updated>2025-05-21T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On May 21, 2025, we released versions 18.0.1, 17.11.3, 17.10.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#unprotected-large-blob-endpoint-in-gitlab-allows-denial-of-service">Unprotected large blob endpoint in GitLab allows Denial of Service</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#improper-xpath-validation-allows-modified-saml-response-to-bypass-2fa-requirement">Improper XPath validation allows modified SAML response to bypass 2FA requirement</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#a-discord-webhook-integration-may-cause-dos">A Discord webhook integration may cause DoS</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#unbounded-kubernetes-cluster-tokens-may-lead-to-dos">Unbounded Kubernetes cluster tokens may lead to DoS</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#unvalidated-notes-position-may-lead-to-denial-of-service">Unvalidated notes position may lead to Denial of Service</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#hiddenmasked-variables-may-get-exposed-in-the-ui">Hidden/masked variables may get exposed in the UI</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#two-factor-authentication-requirement-bypass">Two-factor authentication requirement bypass</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#view-full-email-addresses-that-should-be-partially-obscured">View full email addresses that should be partially obscured</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#branch-name-confusion-in-confidential-mrs">Branch name confusion in confidential MRs</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-18-0-1-released/#unauthorized-access-to-job-data-via-a-graphql-query">Unauthorized access to job data via a GraphQL query</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="unprotected-large-blob-endpoint-in-gitlab-allows-denial-of-service">Unprotected large blob endpoint in GitLab allows Denial of Service</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. This could allow an authenticated attacker to cause a denial of service condition by exhausting server resources.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>, 7.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0993">CVE-2025-0993</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="improper-xpath-validation-allows-modified-saml-response-to-bypass-2fa-requirement">Improper XPath validation allows modified SAML response to bypass 2FA requirement</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 11.1 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Improper XPath validation allowed modified SAML responses to bypass 2FA requirement under specialized conditions.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</code></a>, 6.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12093">CVE-2024-12093</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="a-discord-webhook-integration-may-cause-dos">A Discord webhook integration may cause DoS</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 11.6 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A Discord webhook integration may cause DoS.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7803">CVE-2024-7803</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unbounded-kubernetes-cluster-tokens-may-lead-to-dos">Unbounded Kubernetes cluster tokens may lead to DoS</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 10.2 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A lack of input validation in the Kubernetes integration could allow an authenticated user to cause denial of service.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3111">CVE-2025-3111</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unvalidated-notes-position-may-lead-to-denial-of-service">Unvalidated notes position may lead to Denial of Service</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A lack of proper validation in GitLab could allow an authenticated user to cause a denial of service condition.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2853">CVE-2025-2853</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="hiddenmasked-variables-may-get-exposed-in-the-ui">Hidden/masked variables may get exposed in the UI</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. An attacker may be able to reveal masked or hidden CI variables (that they did not author) in the WebUI, by simply creating their own variable and observing the HTTP response.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</code></a>, 4.9).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4979">CVE-2025-4979</a>.</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="two-factor-authentication-requirement-bypass">Two-factor authentication requirement bypass</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.8 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Group access controls could allow certain users to bypass two-factor authentication requirements.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N</code></a>, 4.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0605">CVE-2025-0605</a>.</p>
<p>Thanks <a href="https://hackerone.com/salh4ckr">salh4ckr</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="view-full-email-addresses-that-should-be-partially-obscured">View full email addresses that should be partially obscured</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 17.1 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Under certain conditions un-authorised users can view full email addresses that should be partially obscured.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0679">CVE-2025-0679</a>.</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="branch-name-confusion-in-confidential-mrs">Branch name confusion in confidential MRs</h3>
<p>A business logic error in GitLab CE/EE affecting all versions starting from 12.1 prior to 17.10.7, 17.11 prior to 17.11.3 and 18.0 prior to 18.0.1 where an attacker can cause a branch name confusion in confidential MRs.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>, 3.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9163">CVE-2024-9163</a>.</p>
<p>Thanks <a href="https://hackerone.com/foxribeye">foxribeye</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthorized-access-to-job-data-via-a-graphql-query">Unauthorized access to job data via a GraphQL query</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 18.0 before 18.0.1. In certain circumstances, a user with limited permissions could access Job Data via a crafted GraphQL query.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</code></a>, 2.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1110">CVE-2025-1110</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="mattermost-security-updates-april-29-2025">Mattermost Security Updates April 29, 2025</h3>
<p>Mattermost has been updated to apply the latest patches for low and medium level security issues.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1801">18.0.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2388">Fix CI_COMMIT_REF tags of FIPS build images</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191256">Bump gitlab-shell to v14.42.0 - 18.0 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191699">[Backport] Do not run index integrity worker for zoekt search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191890">Update gitlab-qa to 15.5.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191824">Add outbound allowlist to allowed endpoints for SSRF filter</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191907">Apply Rails 7-1-stable patches to fix type map init issues</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8423">KAS: remove unsupported GitOps config (18.0 backport)</a></li>
</ul>
<h3 id="17113">17.11.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190731">Backport 17.11: Generate separate project and group work items fixtures</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190703">[BACKPORT] Fix flaky specs in Import::GitHubService</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190354">[backport] Fixed command palette edge case</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190802">Delete BBM backfill_project_id_for_projects_with_pipeline_variables backport to 17.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190828">Add backport to fix shortSHA uniqueness</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191038">[backport] 17.11:  Enable FF_TIMESTAMPS for stable branch pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191191">[backport] Add a ping? check before hitting Elasticsearch in admin</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191092">[Backport]Autocomplete: Change user authorization to use terms query for projects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191257">Bump gitlab-shell to v14.42.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191293">Respect product usage data setting from charts</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191177">Merge branch &rsquo;tbulva-zoekt-global-search-bug&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191334">Add outbound allowlist to allowed endpoints for SSRF filter</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191711">Drop ci_runner_machines_archived table</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191686">17.11: Use no_longer_detected_ids when auto-resolving vulnerabilities</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab-pages/-/merge_requests/1156">Update outdated test certificates [17.11]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8395">Revert &ldquo;Merge branch &lsquo;renovate/pgbouncer-pgbouncer-1.x&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8400">Ensure correct version of Nginx modules gets included in the package</a></li>
</ul>
<h3 id="17107">17.10.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190733">Backport 17.10: Generate separate project and group work items fixtures</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190705">[BACKPORT] Fix flaky specs in Import::GitHubService</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191039">[backport] 17.10: Enable FF_TIMESTAMPS for stable branch pipelines</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191258">Bump gitlab-shell to v14.42.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/191843">Drop ci_runner_machines_archived table</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab-pages/-/merge_requests/1155">Update outdated test certificates [17.10]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8401">Ensure correct version of Nginx modules gets included in the package</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.11.2, 17.10.6, 17.9.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-11-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-11-2-released/</id><published>2025-05-07T00:00:00Z</published><updated>2025-05-07T00:00:00Z</updated><author><name>Daniel Hauenstein</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On May 7, 2025, we released versions 17.11.2, 17.10.6, 17.9.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-2-released/#partial-bypass-for-device-oauth-flow-using-cross-window-forgery">Partial Bypass for Device OAuth flow using Cross Window Forgery</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-2-released/#denial-of-service-by-abusing-github-import-api">Denial of service by abusing Github import API</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-2-released/#group-ip-restriction-bypass-allows-disclosing-issue-title-of-restricted-project">Group IP restriction bypass allows disclosing issue title of restricted project</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="partial-bypass-for-device-oauth-flow-using-cross-window-forgery">Partial Bypass for Device OAuth flow using Cross Window Forgery</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.3 prior to 17.9.8, from 17.10 prior to 17.10.6, and from 17.11 prior to 17.11.2. Under certain conditions Device OAuth flow protections could be bypassed, enabling authorization form submission through minimal user interaction.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0549">CVE-2025-0549</a>.</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-by-abusing-github-import-api">Denial of service by abusing Github import API</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.1 prior to 17.9.8, from 17.10 prior to 17.10.6, and from 17.11 prior to 17.11.2. It was possible to cause a DoS condition via GitHub import requests using a malicious crafted payload.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8973">CVE-2024-8973</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="group-ip-restriction-bypass-allows-disclosing-issue-title-of-restricted-project">Group IP restriction bypass allows disclosing issue title of restricted project</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 12.0 before 17.9.8, 17.10 before 17.10.6, and 17.11 before 17.11.2. Under certain conditions users could bypass IP access restrictions of a group, enabling them to disclose sensitive information.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1278">CVE-2025-1278</a>.</p>
<p>Thanks <a href="https://hackerone.com/iamgk808">iamgk808</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="17112">17.11.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188874">Merge branch &lsquo;renovate-e2e/gitlab-qa-15.x&rsquo; into &lsquo;17-11-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188885">[backport] Fix subgroup search redirect if SAML auth expired</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188846">Fix MR diffs endpoint to respond with pagination headers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188922">Fix token prefix change when PAT prefix is nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188895">[backport] Respect fork filter for global zoekt search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189318">[17.11] Bump graphql gem to 2.4.13</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189452">[Backport] Allow SSO enforcer to skip root owner check</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189039">[17.11] Only check records with encrypted data in gitlab:doctor:encryption_keys</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189624">Change to async_delete for ci_running_builds.runner_id</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189806">Merge branch &lsquo;pb-fix-matrix-use-case&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190008">Update gitlab-development-kit digest to 59037d8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189983">Backport (17.11): Bump Devfile gem to 0.4.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190095">Backport (17.11): Ensure all LFK&rsquo;s are processed regardless of duration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190294">[17.11 Backport]  Change the travel date for analytics/dashboards_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8365">config/git: Fix misdetected shell path (17.11 backport)</a></li>
</ul>
<h3 id="17106">17.10.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189317">[17.10] Bump graphql gem to 2.4.13</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189041">[17.10] Only check records with encrypted data in gitlab:doctor:encryption_keys</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189622">Change to async_delete for ci_running_builds.runner_id</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190009">Update gitlab-development-kit digest to 59037d8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189980">Backport (17.10): Bump Devfile gem to 0.4.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8342">Cherry pick &lsquo;8995-json-parse-utf8&rsquo; into &lsquo;17-10-stable&rsquo;</a></li>
</ul>
<h3 id="1798">17.9.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189313">[17.9] Bump graphql gem to 2.4.13</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/189042">[17.9] Only check records with encrypted data in gitlab:doctor:encryption_keys</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190010">Update gitlab-development-kit digest to 59037d8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/190116">Backport (17.9): Bump devfile gem to v0.4.3</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.11.1, 17.10.5, 17.9.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-11-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-11-1-released/</id><published>2025-04-23T00:00:00Z</published><updated>2025-04-23T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 23, 2025, we released versions 17.11.1, 17.10.5, 17.9.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-1-released/#cross-site-scripting-xss-in-maven-dependency-proxy-through-csp-directives">Cross Site Scripting (XSS) in Maven Dependency Proxy through CSP directives</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-1-released/#cross-site-scripting-xss-in-maven-dependency-proxy-through-cache-headers">Cross Site Scripting (XSS) in Maven dependency proxy through cache headers</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-1-released/#network-error-logging-nel-header-injection-in-maven-dependency-proxy-allows-browser-activity-monitoring">Network Error Logging (NEL) Header Injection in Maven Dependency Proxy Allows Browser Activity Monitoring</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-1-released/#denial-of-service-dos-via-issue-preview">Denial of service (DOS) via issue preview.</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-11-1-released/#unauthorized-access-to-branch-names-when-repository-assets-are-disabled-in-the-project">Unauthorized access to branch names when Repository assets are disabled in the project</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="cross-site-scripting-xss-in-maven-dependency-proxy-through-csp-directives">Cross Site Scripting (XSS) in Maven Dependency Proxy through CSP directives</h3>
<p>An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user&rsquo;s browser under specific conditions, affecting all versions from 16.6 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1763">CVE-2025-1763</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cross-site-scripting-xss-in-maven-dependency-proxy-through-cache-headers">Cross Site Scripting (XSS) in Maven dependency proxy through cache headers</h3>
<p>An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user&rsquo;s browser under specific conditions, affecting all versions from 16.6 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2443">CVE-2025-2443</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="network-error-logging-nel-header-injection-in-maven-dependency-proxy-allows-browser-activity-monitoring">Network Error Logging (NEL) Header Injection in Maven Dependency Proxy Allows Browser Activity Monitoring</h3>
<p>An issue has been discovered in GitLab EE/CE that could allow an attacker to track users&rsquo; browsing activities, potentially leading to full account take-over, affecting all versions from 16.6 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 7.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1908">CVE-2025-1908</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-dos-via-issue-preview">Denial of service (DOS) via issue preview.</h3>
<p>An issue has been discovered affecting service availability via issue preview in GitLab CE/EE affecting all versions from 16.7 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0639">CVE-2025-0639</a>.</p>
<p>Thanks <a href="https://hackerone.com/sigitsetiawansss">sigitsetiawansss</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthorized-access-to-branch-names-when-repository-assets-are-disabled-in-the-project">Unauthorized access to branch names when Repository assets are disabled in the project</h3>
<p>An issue has been discovered in access controls that could allow users to view certain restricted project information even when related features are disabled in GitLab EE, affecting all versions from 17.7 prior to 17.9.7, 17.10 prior to 17.10.5, and 17.11 prior to 17.11.1.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12244">CVE-2024-12244</a>.</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="17111">17.11.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188122">Put allow_composite_identities_to_run_pipelines behind ff</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188630">Backporting doc fix for Amazon Q</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188405">[BP]last_rollout_failed_at should be set for failures namespaces also</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188604">Fix Amazon Q disconnect for already destroyed app</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188127">Fix string conversion for CI Inputs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188074">Backport fix for latest DS template in combination with Static Reachability</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188721">Merge branch &lsquo;535633-new-look-causes-attach-file-to-ignore-external_url&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188234">Patch in 17.11: Sync Cloud Connector tokens hourly</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188131">Update Workhorse Gitaly client dependency</a></li>
</ul>
<h3 id="17105">17.10.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2318">Backport &lsquo;fix-ubi-mailroom-location&rsquo; into &lsquo;17-10-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7765">backport update-go-grpc-to-1.71.1 to 17-10-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187346">[Backport 17.10] Bulk indexing cron workers should respect pause setting</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187347">[17.10] Backport: Zoekt: Fix incorrect project filtering in Zoekt initial indexing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187380">Backport: Zoekt: Rollout is considering offline nodes as well</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187382">Backport: Zoekt Newly created indices are instantly evicted</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187376">Backport NoMethodError: zoekt_nodes is null in some instances</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187679">Fix workspaces reconciliation to send inventory config map correctly</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187370">[17.10 Backport] Clean up the FinalizeBackfillCiRunnerMachinesPartitionedTable migration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187562">Introduce a new gitlab:doctor:encryption_keys task</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187902">Backport &ldquo;Resolve &ldquo;/api/v4/todos returns 500 when has wiki todo&rdquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187420">Update workhorse gitalyclient dependency update backport to 17.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187890">[17.10 Backport] Clear session cookie when browser is closed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187865">Backport AI events backfill from PG to ClickHouse</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/188236">Patch in 17.10: Sync Cloud Connector tokens hourly</a></li>
</ul>
<h3 id="1797">17.9.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2322">Backport setting FIPS and UBI pipeline name to 17-9-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2319">Backport &lsquo;fix-ubi-mailroom-location&rsquo; into &lsquo;17-9-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7772">backport update-go-grpc-to-1.71.1 to 17-9-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187368">[17.9 Backport] Clean up the FinalizeBackfillCiRunnerMachinesPartitionedTable migration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187566">Introduce a new gitlab:doctor:encryption_keys task</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/187765">Update workhorse gitalyclient dependency backport to 17.9</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.10.4, 17.9.6, 17.8.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-10-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-10-4-released/</id><published>2025-04-09T00:00:00Z</published><updated>2025-04-09T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 9, 2025, we released versions 17.10.4, 17.9.6, 17.8.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-4-released/#denial-of-service-via-ci-pipelines">Denial of service via CI pipelines</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-4-released/#unintentionally-authorizing-sensitive-actions-on-users-behalf">Unintentionally authorizing sensitive actions on users behalf</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-4-released/#ip-restriction-bypass-through-graphql-subscription">IP Restriction Bypass through GraphQL Subscription</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-4-released/#unauthorized-users-can-list-the-number-of-confidential-issues">Unauthorized users can list the number of confidential issues</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-4-released/#debugging-information-disclosed">Debugging Information Disclosed</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="denial-of-service-via-ci-pipelines">Denial of service via CI pipelines</h3>
<p>A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4. A denial of service could occur upon injecting oversized payloads into CI pipeline exports.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1677">CVE-2025-1677</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unintentionally-authorizing-sensitive-actions-on-users-behalf">Unintentionally authorizing sensitive actions on users behalf</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 7.7 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions, an attacker could potentially trick users into unintentionally authorizing sensitive actions on their behalf.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0362">CVE-2025-0362</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ip-restriction-bypass-through-graphql-subscription">IP Restriction Bypass through GraphQL Subscription</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 13.12 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions users could bypass IP access restrictions and view sensitive information.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2408">CVE-2025-2408</a>.</p>
<p>Thanks <a href="https://hackerone.com/rogerace">rogerace</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthorized-users-can-list-the-number-of-confidential-issues">Unauthorized users can list the number of confidential issues</h3>
<p>An issue has been discovered in GitLab EE affecting all versions from 17.1 before 17.8.7, 17.9 before  17.9.6, and 17.10 before 17.10.4, This allows attackers to perform targeted searches with sensitive keywords to get the count of issues containing the searched term.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11129">CVE-2024-11129</a></p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="debugging-information-disclosed">Debugging Information Disclosed</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 before 17.9.6, and 17.10 before 17.10.4. The runtime profiling data of a specific service was accessible to unauthenticated users.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 3.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2469">CVE-2025-2469</a>.</p>
<p>Thanks <a href="https://hackerone.com/ap-wtioit">ap-wtioit</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="17104">17.10.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186586">Cherry-picks multiple fixes into 17.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186124">Fix invalid pipelines for scan execution policies</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186658">Move group.cluster_agents field to CE</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185812">Fixes merge requests updating URL with reports project</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186987">Update approval rules name validation to include approval policy</a></li>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/4912">Workhorse golang-jwt/jwt upgrade to 5.2.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/4893">Golang Oauth2 upgrade to 0.27.0</a></li>
</ul>
<h3 id="1796">17.9.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/4913">Workhorse golang-jwt/jwt upgrade to 5.2.2</a></li>
</ul>
<h3 id="1787">17.8.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2305">CI: Use gcr mirror in DinD (17.8 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185302">No-op ci_runner_machines_687967fa8a batched migrations - 17.8 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186588">Cherry-picks bug fixes into 17.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8267">Backport fix in libarchive for CI</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8263">CI: Use gcr mirror for DinD (17.8 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8278">[17.8 Backport] Check packages does not have .dind job in scope</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8283">CI: Optionally enable dependency proxy (Backport 17.8)</a></li>
<li><a href="https://gitlab.com/gitlab-org/security/gitlab/-/merge_requests/4914">Workhorse golang-jwt/jwt upgrade to 5.2.2</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.10.3</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-10-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-10-3-released/</id><published>2025-04-02T00:00:00Z</published><updated>2025-04-02T00:00:00Z</updated><author><name>Reuben Pereira</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 2, 2025, we released versions 17.10.3 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="17103">17.10.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2303">CI: Use gcr mirror in DinD (17.10 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185304">No-op ci_runner_machines_687967fa8a batched migrations - 17.10 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186279">Ensure runner taggings are copied from taggings</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186166">Fix free push limit on non-saas</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8265">Backport fix in libarchive for CI</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8261">CI: Use gcr mirror for DinD (17.10 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8276">[17.10 Backport] Check packages does not have .dind job in scope</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version includes new post deployment migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any
downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<p>Note: GitLab releases have skipped 17.10.2. There is no patch with that version number.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.9.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-9-5-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-9-5-released/</id><published>2025-04-02T00:00:00Z</published><updated>2025-04-02T00:00:00Z</updated><author><name>Mayra Cabrera</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 2, 2025, we released versions 17.9.5 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1795">17.9.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2304">CI: Use gcr mirror in DinD (17.9 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185303">No-op ci_runner_machines_687967fa8a batched migrations - 17.9 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/186278">Ensure runner taggings are copied from taggings</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8266">Backport fix in libarchive for CI</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8262">CI: Use gcr mirror for DinD (17.9 Backport)</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version includes new post deployment migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<p>Note: GitLab releases have skipped 17.9.4. There is no patch with that version number.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.10.1, 17.9.3, 17.8.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-10-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-10-1-released/</id><published>2025-03-26T00:00:00Z</published><updated>2025-03-26T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On March 26, 2025, we released versions 17.10.1, 17.9.3, 17.8.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#cross-site-scripting-xss-through-merge-request-error-messages">Cross-site Scripting (XSS) through merge-request error messages</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#cross-site-scripting-xss-through-improper-rendering-of-certain-file-types">Cross-site Scripting (XSS) through improper rendering of certain file types</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#admin-privileges-persists-after-role-is-revoked">Admin Privileges Persists After Role is Revoked</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#external-user-can-access-internal-projects">External user can access internal projects</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#prompt-injection-in-amazon-q-integration-may-allow-unauthorized-actions">Prompt injection in Amazon Q integration may allow unauthorized actions</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#uncontrolled-resource-consumption-via-a-maliciously-crafted-terraform-file-in-merge-request">Uncontrolled Resource Consumption via a maliciously crafted terraform file in merge request</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-10-1-released/#maintainer-can-inject-shell-code-in-harbor-project-name-configuration-when-using-helper-scripts">Maintainer can inject shell code in Harbor project name configuration when using helper scripts</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cross-site-scripting-xss-through-merge-request-error-messages">Cross-site Scripting (XSS) through merge-request error messages</h3>
<p>An issue has been discovered in Gitlab EE/CE affecting all versions from 13.5.0 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. Certain error messages could allow Cross-Site Scripting attacks (XSS).
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2255">CVE-2025-2255</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cross-site-scripting-xss-through-improper-rendering-of-certain-file-types">Cross-site Scripting (XSS) through improper rendering of certain file types</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 17.7 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. Improper rendering of certain file types leads to cross-site scripting.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0811">CVE-2025-0811</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="admin-privileges-persists-after-role-is-revoked">Admin Privileges Persists After Role is Revoked</h3>
<p>An improper access control vulnerability in GitLab CE/EE affecting all versions from 17.4 prior to 17.8.6, 17.9 prior to 17.9.3, and 17.10 prior to 17.10.1 allows a user who was an instance admin before but has since been downgraded to a regular user to continue to maintain elevated privileges to groups and projects.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/#vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</code></a>, 7.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2242">CVE-2025-2242</a>.</p>
<h3 id="external-user-can-access-internal-projects">External user can access internal projects</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1, allowing internal users to gain unauthorized access to internal projects.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N</code></a>, 5.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12619">CVE-2024-12619</a>.</p>
<p>Thanks <a href="https://hackerone.com/aituglo">aituglo</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="prompt-injection-in-amazon-q-integration-may-allow-unauthorized-actions">Prompt injection in Amazon Q integration may allow unauthorized actions</h3>
<p>An issue has been discovered in the GitLab Duo with Amazon Q affecting all versions from 17.8 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A specifically crafted issue could manipulate AI-assisted development features to potentially expose sensitive project data to unauthorized users.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>, 4.4).
We have requested a CVE ID and will update this blog post when it is assigned.</p>
<p>This vulnerability has been discovered internally by GitLab team member Félix Veillette-Potvin.</p>
<h3 id="uncontrolled-resource-consumption-via-a-maliciously-crafted-terraform-file-in-merge-request">Uncontrolled Resource Consumption via a maliciously crafted terraform file in merge request</h3>
<p>An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10307">CVE-2024-10307</a>.</p>
<p>Thanks <a href="https://hackerone.com/l33thaxor">l33thaxor</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="maintainer-can-inject-shell-code-in-harbor-project-name-configuration-when-using-helper-scripts">Maintainer can inject shell code in Harbor project name configuration when using helper scripts</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 14.9 before 17.8.6, all versions starting from 17.9 before 17.9.3, all versions starting from 17.10 before 17.10.1. An input validation issue in the Harbor registry integration could have allowed a maintainer to add malicious code to the CLI commands shown in the UI.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N</code></a>, 3.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9773">CVE-2024-9773</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="17101">17.10.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2275">Merge branch &lsquo;fixup-non-based-ubi&rsquo; into &lsquo;17-10-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185392">Changes for storing value of bypass_two_factor to session</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8252">Correct incorrect PG version in CHANGELOG</a></li>
</ul>
<h3 id="1793">17.9.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2264">Bump go to v1.23.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2276">Merge branch &lsquo;fixup-non-based-ubi&rsquo; into &lsquo;17-9-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7692">17.9 Backport: jliu/gitaly-dns-tls</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7708">17.9 backport: Update build-proto-gem</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184083">[Backport 17.9] Fix frozen array error with custom analyzers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184190">Update dependency gitlab-mail_room to v0.0.27</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184158">[backport] Fixed regex and syntax options button under some conditions</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/183491">[17.9] Backport: Zoekt: Index pending delete projects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184162">[Backport 17.9] Update truncato gem</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184345">Reorder runners backfill migrations - 17.9 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185157">[Backport 17.9] Replace #test-platform in favour of #s_developer_experience</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184639">Update Gitaly client dependency to include DNS lookup change (backport to 17.9)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8232">Backport &lsquo;ci-internal-release-docker-branch-dev&rsquo; into &lsquo;17-9-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8243">Backport 17.9: Update container-registry to v4.15.2-gitlab</a></li>
</ul>
<h3 id="1786">17.8.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2278">UBI/FIPS: Fixup container_version when not using gitlab-base</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7693">17.8 Backport: jliu/gitaly-dns-tls</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184916">Fix a spec typo in merge_requests_controller_spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184643">Update Gitaly client dependency to include DNS lookup change (backport 17.8)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/185156">[Backport 17.8] Replace #test-platform in favour of #s_developer_experience</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184302">Fix SPP worker bug in 17.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/184347">Reorder runners backfill migrations - 17.8 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8233">Backport &lsquo;ci-internal-release-docker-branch-dev&rsquo; into &lsquo;17-8-stable&rsquo;</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 17.9.2, 17.8.5, 17.7.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-9-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-9-2-released/</id><published>2025-03-12T00:00:00Z</published><updated>2025-03-12T00:00:00Z</updated><author><name>Kevin Morrison</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On March 12, 2025, we released versions 17.9.2, 17.8.5, 17.7.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action and will be notified once their instance has been patched.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#cve-2025-25291-and-cve-2025-25292-third-party-gem-ruby-saml">CVE-2025-25291 and CVE-2025-25292 (third party gem <code>ruby-saml</code>)</a></td>
          <td>Critical</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#cve-2025-27407-third-party-gem-graphql">CVE-2025-27407 (third party gem <code>graphql</code>)</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#denial-of-service-due-to-inefficient-processing-of-untrusted-input">Denial of Service Due to Inefficient Processing of Untrusted Input</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#credentials-disclosed-when-repository-mirroring-fails">Credentials disclosed when repository mirroring fails</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#denial-of-service-vulnerability-in-gitlab-approval-rules-due-to-unbounded-field">Denial of Service Vulnerability in GitLab Approval Rules due to Unbounded Field</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#internal-notes-in-merge-requests-are-emailed-to-non-members-upon-review-submission">Internal Notes in Merge Requests Are Emailed to Non-Members Upon Review Submission</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#maintainer-can-inject-shell-code-in-google-integrations">Maintainer can inject shell code in Google integrations</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-2-released/#guest-with-custom-admin-group-member-permissions-can-approve-the-users-invitation-despite-user-caps">Guest with custom <code>Admin group member</code> permissions can approve the users invitation despite user caps</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="cve-2025-25291-and-cve-2025-25292-third-party-gem-ruby-saml">CVE-2025-25291 and CVE-2025-25292 (third party gem <code>ruby-saml</code>)</h3>
<p>GitLab has remediated two privately disclosed security issues (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25291">CVE-2025-25291</a>, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25292">CVE-2025-25292</a>) identified in the <code>ruby-saml</code> library which GitLab uses when SAML SSO authentication is enabled at the instance or group level. These issues have been remediated on GitLab.com, and in GitLab CE/EE versions 17.7.7, 17.8.5, and 17.9.2.</p>
<p>On GitLab CE/EE instances using SAML authentication, under certain circumstances, an attacker with access to a valid signed SAML document from the IdP could authenticate as another valid user within the environment&rsquo;s SAML IdP.</p>
<h4 id="self-managed-gitlab-known-mitigations">Self Managed GitLab: Known Mitigations</h4>
<p>Affected customers who cannot immediately update GitLab CE/EE to address these issues may choose to perform the following mitigation steps:</p>
<p><em>Note: This vulnerability requires the attacker to have compromised a valid user account to perform the authentication bypass.</em></p>
<ol>
<li>Enable GitLab <a href="https://docs.gitlab.com/user/profile/account/two_factor_authentication/">two-factor authentication</a> for <a href="https://docs.gitlab.com/security/two_factor_authentication/#enforce-2fa-for-all-users">all user accounts</a> on the GitLab self-managed instance (NOTE: Enabling identity provider multi-factor authentication does not mitigate this vulnerability) <strong>and</strong></li>
<li>Do not allow the <a href="https://docs.gitlab.com/integration/saml/#bypass-two-factor-authentication">SAML two-factor bypass</a> option in GitLab <strong>and</strong></li>
<li><a href="https://docs.gitlab.com/integration/omniauth/#configure-common-settings">Require admin approval for automatically created new users</a> (<code>gitlab_rails['omniauth_block_auto_created_users'] = true</code>)</li>
</ol>
<h4 id="gitlab-thanks">GitLab Thanks:</h4>
<ul>
<li><a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting <code>CVE-2025-25291</code> through our HackerOne bug bounty program</li>
<li><a href="https://github.com/p-">Peter Stöckli</a> (GitHub) for identifying <code>CVE-2025-25292</code> and contacting GitLab to coordinate disclosure and remediation across vendors</li>
<li>Sixto Martin Garcia (maintainer of the <code>ruby-saml</code> RubyGem) for their collaboration on remediation and coordinating disclosure</li>
</ul>
<h3 id="cve-2025-27407-third-party-gem-graphql">CVE-2025-27407 (third party gem <code>graphql</code>)</h3>
<p>GitLab has remediated a privately disclosed security issue (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27407">CVE-2025-27407</a>) identified in the Ruby <code>graphql</code> library, which affects and has been remediated in GitLab.com, and in GitLab CE/EE versions 17.7.7, 17.8.5, and 17.9.2.</p>
<p>Under certain circumstances, if an attacker-controlled authenticated user account attempted to transfer a maliciously-crafted project via the Direct Transfer feature (note: Direct transfer is in beta stage and is disabled by default for all self-managed Gitlab instances), remote code execution is possible. Disabling Direct Transfer removes risk of exploitation from this issue.</p>
<h4 id="self-managed-gitlab-known-mitigations-1">Self-managed GitLab: Known Mitigations</h4>
<p>Affected customers who cannot immediately update their GitLab CE/EE to address these issues may choose to perform the following mitigation steps:</p>
<ul>
<li>Disable <a href="http://docs.gitlab.com/administration/settings/import_and_export_settings/#enable-migration-of-groups-and-projects-by-direct-transfer">migration of groups and projects by direct transfer</a>, if enabled (disabled by default)</li>
</ul>
<h4 id="gitlab-thanks-1">GitLab Thanks:</h4>
<ul>
<li><a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program</li>
<li><a href="https://github.com/rmosolgo">Robert Mosolgo</a> (ruby-graphql) for their collaboration on cross-vendor disclosure and remediation</li>
</ul>
<h3 id="denial-of-service-due-to-inefficient-processing-of-untrusted-input">Denial of Service Due to Inefficient Processing of Untrusted Input</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions before 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2. where a denial of service vulnerability could allow an attacker to cause a system reboot under certain conditions.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 5.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13054">CVE-2024-13054</a>.</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="credentials-disclosed-when-repository-mirroring-fails">Credentials disclosed when repository mirroring fails</h3>
<p>An issue was discovered in GitLab EE/CE affecting all versions starting from 11.5 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2. Certain user inputs in repository mirroring settings could potentially expose sensitive authentication information.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</code></a>, 4.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12380">CVE-2024-12380</a>.</p>
<p>Thanks <a href="https://hackerone.com/sigitsetiawansss">sigitsetiawansss</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-vulnerability-in-gitlab-approval-rules-due-to-unbounded-field">Denial of Service Vulnerability in GitLab Approval Rules due to Unbounded Field</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting with 12.3 before 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2. A vulnerability in certain GitLab instances could allow an attacker to cause a denial of service condition by manipulating specific API inputs. This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1257">CVE-2025-1257</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="internal-notes-in-merge-requests-are-emailed-to-non-members-upon-review-submission">Internal Notes in Merge Requests Are Emailed to Non-Members Upon Review Submission</h3>
<p>An issue has been discovered in GitLab EE/CE affecting all versions starting from 16.9 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2 could allow unauthorized users to access confidential information intended for internal use only. This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0652">CVE-2025-0652</a>.</p>
<p>Thanks <a href="https://hackerone.com/foxribeye">foxribeye</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="maintainer-can-inject-shell-code-in-google-integrations">Maintainer can inject shell code in Google integrations</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 17.2 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2. An input validation issue in the Google Cloud IAM integration feature could have enabled a Maintainer to introduce malicious code.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N</code></a>, 3.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8402">CVE-2024-8402</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="guest-with-custom-admin-group-member-permissions-can-approve-the-users-invitation-despite-user-caps">Guest with custom <code>Admin group member</code> permissions can approve the users invitation despite user caps</h3>
<p>An issue was discovered in GitLab EE affecting all versions from 16.5 prior to 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2  which allowed a user with a custom permission to approve pending membership requests beyond the maximum number of allowed users.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code></a>, 2.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7296">CVE-2024-7296</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="bump-postgresql-versions-to-1417-and-168">Bump PostgreSQL versions to 14.17 and 16.8</h3>
<p>The PostgreSQL project released an update so we are updating to versions 14.17 and 16.8.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1792">17.9.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2239">PG: Upgrade client libraries and programs to 16.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182632">Use correct project when fetching managed resources templates</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182677">E2E test fix: web ide spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182666">Prevent deletion of project_bot users with non-expiring access tokens</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/183361">Backport: Fix missing repo logic</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/183373">Backport: Search times out with certain special characters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182319">Backport: Fix to support custom pipcompile requirement file with the new DS analyzer</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/183982">Update gitlab-development-kit digest to 1305f9b</a></li>
</ul>
<h3 id="1785">17.8.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182441">Fixes typo on profiles controller spec</a></li>
</ul>
<h3 id="1777">17.7.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182443">Fixes typo on issues controller spec</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">Update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.9.1, 17.8.4, 17.7.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-9-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-9-1-released/</id><published>2025-02-26T00:00:00Z</published><updated>2025-02-26T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On February 26, 2025, we released versions 17.9.1, 17.8.4, 17.7.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-1-released/#xss-in-k8s-proxy-endpoint">XSS in k8s proxy endpoint</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-1-released/#xss-in-maven-dependency-proxy">XSS Maven Dependency Proxy</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-1-released/#html-injection-leads-to-xss-on-self-hosted-instances">HTML injection leads to XSS on self hosted instances</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-1-released/#improper-authorisation-check-allows-guest-user-to-read-security-policy">Improper Authorisation Check Allows Guest User to Read Security Policy</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-9-1-released/#planner-role-can-read-code-review-analytics-in-private-projects">Planner role can read code review analytics in Private Projects</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="xss-in-k8s-proxy-endpoint">XSS in k8s proxy endpoint</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0475">CVE-2025-0475</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="xss-maven-dependency-proxy">XSS Maven Dependency Proxy</h3>
<p>A Cross Site Scripting (XSS) vulnerability in GitLab-EE affecting all versions from 16.6 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows an attacker to bypass security controls and execute arbitrary scripts in a user&rsquo;s browser under specific conditions.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 7.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0555">CVE-2025-0555</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="html-injection-leads-to-xss-on-self-hosted-instances">HTML injection leads to XSS on self hosted instances</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.6 before 17.7.6, 17.8 before 17.8.4, and 17.9 before 17.9.1. An attacker could inject HMTL into the child item search potentially leading to XSS in certain situations.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>, 5.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8186">CVE-2024-8186</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="improper-authorisation-check-allows-guest-user-to-read-security-policy">Improper Authorisation Check Allows Guest User to Read Security Policy</h3>
<p>A vulnerability in GitLab-EE affecting all versions from 16.2 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows a Guest user to read Security policy YAML.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10925">CVE-2024-10925</a>.</p>
<p>Thanks <a href="https://hackerone.com/yuki_osaki">yuki_osaki</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="planner-role-can-read-code-review-analytics-in-private-projects">Planner role can read code review analytics in private projects</h3>
<p>Improper authorization in GitLab EE affecting all versions from 17.7 prior to 17.7.6, 17.8 prior to 17.8.4, 17.9 prior to 17.9.1 allow users with limited permissions to access potentially sensitive project analytics data.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0307">CVE-2025-0307</a>.</p>
<p>Thanks <a href="https://hackerone.com/weasterhacker">weasterhacker</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1791">17.9.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182032">Backport - Merge branch &lsquo;revert-e78b1a9f&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181864">Backport/fix ambiguous pipeline 17 9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182126">Make it possible for ignore unexpected EOFs in SSL connections</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182179">Allow Duo Chat to be resizable on self-managed (backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182385">Merge branch &lsquo;mdc/include-build-assets-image-job-sync-pipelines&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182121">Fix instance level dashboard by default severity override</a></li>
</ul>
<h3 id="1784">17.8.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2233">Bump gitlab-exporter to v15.2.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181136">[Backport] Return false for pending_migrations? if indexing disabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181267">Merge branch &lsquo;10443-fix-workhorse-verify&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181358">Revert stricter workhorse route regexes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181872">Use primary DB when authenticating via job token in jobs API</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181865">Backport/fix ambiguous pipeline 17 8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182098">Backport add more custom exit codes for CI/CD failures MRs and fix assets caching in scheduled cache-assets:production job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181534">Backport fix CH version incompatibility</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182388">Merge branch &lsquo;mdc/include-build-assets-image-job-sync-pipelines&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182128">Make it possible for ignore unexpected EOFs in SSL connections</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8187">Update dependency gitlab-exporter to v15.2.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181136">[Backport] Return false for pending_migrations? if indexing disabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181267">Merge branch &lsquo;10443-fix-workhorse-verify&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181358">Revert stricter workhorse route regexes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181872">Use primary DB when authenticating via job token in jobs API</a></li>
</ul>
<h3 id="1776">17.7.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181268">Merge branch &lsquo;10443-fix-workhorse-verify&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181359">Revert stricter workhorse route regexes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182151">Fix failed jobs widget polling issue</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181863">Backport fix for ambiguous created_at</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182104">Backport add more custom exit codes for CI/CD failures MRs and fix assets caching in scheduled cache-assets:production job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182390">Merge branch &lsquo;mdc/include-build-assets-image-job-sync-pipelines&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/182129">Make it possible for ignore unexpected EOFs in SSL connections</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181268">Merge branch &lsquo;10443-fix-workhorse-verify&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/181359">Revert stricter workhorse route regexes</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<p>Note: GitLab releases have skipped 17.7.5 and 17.8.3. There are no patches with these version numbers.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.8.2, 17.7.4, 17.6.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-8-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-8-2-released/</id><published>2025-02-12T00:00:00Z</published><updated>2025-02-12T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On February 12, 2025, we released versions 17.8.2, 17.7.4, 17.6.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#a-csp-bypass-xss-in-merge-request-page">A CSP-bypass XSS in merge-request page</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#denial-of-service-due-to-unbounded-symbol-creation">Denial of Service due to Unbounded Symbol Creation</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#exfiltrate-content-from-private-issues-using-prompt-injection">Exfiltrate content from private issues using Prompt Injection</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#internal-http-header-leak-via-route-confusion-in-workhorse">Internal HTTP header leak via route confusion in workhorse</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#ssrf-via-workspaces">SSRF via workspaces</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#unauthorized-incident-closure-and-deletion-by-planner-role-in-gitlab">Unauthorized Incident Closure and Deletion by Planner Role in GitLab</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#actioncable-does-not-invalidate-tokens-after-revocation">ActionCable does not invalidate tokens after revocation</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#a-custom-permission-may-allow-overriding-repository-settings">A custom permission may allow overriding Repository settings</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-2-released/#saml-authentication-misconfigures-external-user-attribute">SAML Authentication Misconfigures External User Attribute</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="a-csp-bypass-xss-in-merge-request-page">A CSP-bypass XSS in merge-request page</h3>
<p>An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0376">CVE-2025-0376</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-due-to-unbounded-symbol-creation">Denial of Service due to Unbounded Symbol Creation</h3>
<p>A denial of service vulnerability in GitLab CE/EE affecting all versions from 14.1 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to impact the availability of GitLab via unbounded symbol creation via the scopes parameter in a Personal Access Token.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12379">CVE-2024-12379</a>.</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="exfiltrate-content-from-private-issues-using-prompt-injection">Exfiltrate content from private issues using Prompt Injection</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.6.5, starting from 17.7 prior to 17.7.4, and starting from 17.8 prior to 17.8.2, which allows an attacker to exfiltrate contents of a private issue using prompt injection.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3303">CVE-2024-3303</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="internal-http-header-leak-via-route-confusion-in-workhorse">Internal HTTP header leak via route confusion in workhorse</h3>
<p>An information disclosure vulnerability in GitLab CE/EE affecting all versions from 8.3 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send a crafted request to a backend server to reveal sensitive information.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1212">CVE-2025-1212</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">Joern Schneeweisz</a>.</p>
<h3 id="ssrf-via-workspaces">SSRF via workspaces</h3>
<p>An external service interaction vulnerability in GitLab EE affecting all versions from 15.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send requests from the GitLab server to unintended services.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9870">CVE-2024-9870</a>.</p>
<p>Thanks <a href="https://hackerone.com/retr02332">retr02332</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthorized-incident-closure-and-deletion-by-planner-role-in-gitlab">Unauthorized Incident Closure and Deletion by Planner Role in GitLab</h3>
<p>Improper Authorization in GitLab CE/EE affecting all versions from 17.7 prior to 17.7.4, 17.8 prior to 17.8.2 allow users with limited permissions to perform unauthorized actions on critical project data.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/#vector=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0516">CVE-2025-0516</a>.</p>
<p>Thanks <a href="https://hackerone.com/sp4rrow">sp4rrow</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="actioncable-does-not-invalidate-tokens-after-revocation">ActionCable does not invalidate tokens after revocation</h3>
<p>An issue discovered in GitLab CE/EE affecting all versions from 16.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 meant that long-lived connections in ActionCable potentially allowed revoked Personal Access Tokens access to streaming results.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/#vector=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N</code></a>, 4.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1198">CVE-2025-1198</a>.</p>
<p>This vulnerability has been discovered internally by a GitLab team member <a href="https://gitlab.com/DylanGriffith">Dylan Griffith</a>.</p>
<h3 id="a-custom-permission-may-allow-overriding-repository-settings">A custom permission may allow overriding Repository settings</h3>
<p>An improper access control vulnerability in GitLab EE affecting all versions from 15.7 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows a user with a custom permission to view contents of a repository even if that access is not authorized.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</code></a>, 2.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1042">CVE-2025-1042</a>.</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="saml-authentication-misconfigures-external-user-attribute">SAML Authentication Misconfigures External User Attribute</h3>
<p>An issue has been discovered in GitLab CE/EE for Self-Managed and Dedicated instances affecting all versions from 17.5 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2. It was possible for a user manually designated as an External without configuring them as such in SAML response to lose that designation, and to read and clone internal projects under certain circumstances. After upgrading to a patched version, please review and re-designate any externals users.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1540">CVE-2025-1540</a>.</p>
<p>Thanks <a href="https://gitlab.com/unode">Renato Alves</a> for reporting this vulnerability.</p>
<h3 id="mattermost-security-updates-january-22-2025">Mattermost Security Updates January 22, 2025</h3>
<p>Mattermost has been updated to versions 10.2.3, which contains several patches and security fixes.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1782">17.8.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178514">Fix Workhorse failing on 64-bit unaligned access on Raspberry Pi 32-bit</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178575">[Backport] Fixed css bug for command palette file names too long</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178596">Merge branch &lsquo;fix-environment-check-user-creation&rsquo; into &lsquo;17-8-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178452">17.8: Ensure user external attribute is preserved and not set to nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178961">Backporting the bug: Remove feature flag for multiple approvals</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179349">Merge branch &lsquo;dattang/do-not-allow-release-environment-to-fail&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179180">Fix Approval widget for project merge request settings</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179527">Enable ai tracking without move_ai_tracking_to_instrumentation_layer flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179948">Add import_vulnerabilities feature flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180252">Update build-gdk-image version</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180216">Backport: Zoekt code search always performs regex search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180274">Fix storing incorrect policy index in scan_result_policies</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180206">[Backport] Only check pending migrations if indexing enabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180306">Updating Duo functionality note</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180237">[backport] Fix command palette keybindings propagation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180553">Backport into 17.8: Decrease log level of false error</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180783">[Backport] Fix info and list_pending_migration rake tasks if search cluster unreachable</a></li>
</ul>
<h3 id="1774">17.7.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178457">17.7: Ensure user external attribute is preserved and not set to nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179058">Merge branch &lsquo;fix-environment-check-user-creation&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179350">Merge branch &lsquo;dattang/do-not-allow-release-environment-to-fail&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179735">Fixes typo on profiles_controller_spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179933">Add import_vulnerabilities feature flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180305">Updating Duo functionality note</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/180574">Backport into 17.7: Decrease log level of false error</a></li>
</ul>
<h3 id="1765">17.6.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2199">Backport internal release support to 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/178458">17.6: Ensure user external attribute is preserved and not set to nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179351">Merge branch &lsquo;dattang/do-not-allow-release-environment-to-fail&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/179736">Fixes typo on profiles_controller_spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/8137">Backport internal release support to 17.6</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.8.1, 17.7.3, 17.6.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-8-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-8-1-released/</id><published>2025-01-22T00:00:00Z</published><updated>2025-01-22T00:00:00Z</updated><author><name>Ottilia Westerlund</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On January 22, 2025, we released versions 17.8.1, 17.7.3, 17.6.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-1-released/#stored-xss-via-asciidoctor-render">Stored XSS via Asciidoctor render</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-1-released/#developer-could-exfiltrate-protected-cicd-variables-via-ci-lint">Developer could exfiltrate protected CI/CD variables via CI lint</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-8-1-released/#cyclic-reference-of-epics-leads-resource-exhaustion">Cyclic reference of epics leads resource exhaustion</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="stored-xss-via-asciidoctor-render">Stored XSS via Asciidoctor render</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1. Improper rendering of certain file types lead to cross-site scripting.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0314">CVE-2025-0314</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="developer-could-exfiltrate-protected-cicd-variables-via-ci-lint">Developer could exfiltrate protected CI/CD variables via CI lint</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.6.4, from 17.7 prior to 17.7.3, and from 17.8 prior to 17.8.1. Under certain conditions, it may have been possible for users with developer role to exfiltrate protected CI/CD variables via CI lint.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11931">CVE-2024-11931</a>.</p>
<p>This vulnerability was internally discovered and reported by GitLab team member <a href="https://gitlab.com/greg/">Greg Myers</a>.</p>
<h3 id="cyclic-reference-of-epics-leads-resource-exhaustion">Cyclic reference of epics leads resource exhaustion</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 15.7 prior to 17.6.4, starting from 17.7 prior to 17.7.3, and starting from 17.8 prior to 17.8.1. It was possible to trigger a DoS by creating cyclic references between epics.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6324">CVE-2024-6324</a>.</p>
<p>Thanks <a href="https://hackerone.com/xorz">xorz</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1781">17.8.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/475063">Private profiles showed account creation dates although documentation stated they shouldn&rsquo;t</a></li>
</ul>
<h3 id="1773">17.7.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/475063">Private profiles showed account creation dates although documentation stated they shouldn&rsquo;t</a></li>
</ul>
<h3 id="1764">17.6.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2160">Toolbox: update URLs for AzCopy (upstream change) - 17-6-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/475063">Private profiles showed account creation dates although documentation stated they shouldn&rsquo;t</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.7.2</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-7-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-7-2-released/</id><published>2025-01-15T00:00:00Z</published><updated>2025-01-15T00:00:00Z</updated><author><name>Mayra Cabrera</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 15, 2025, we released versions 17.7.2 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1772">17.7.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2159">Merge branch &lsquo;azcopy-url-20250108&rsquo; into &lsquo;17-7-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/177296">Fixes issue</a> where some merge request diffs with associated comments were not visible. This does not correct the display issue for existing records, but does prevent new instances of this occurrence.</li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176667">Remove <code>download_code</code> dependency from access to read merge requests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/177633">Fix handling of short gzip metadata files</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>If you had previously upgraded to GitLab 17.7.0 or 17.7.1 this patch is recommended to prevent any further occurrences of merge request comments being unable to be displayed. A future release will correct the display issue for affected records.</p>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-7-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-7-1-released/</id><published>2025-01-08T00:00:00Z</published><updated>2025-01-08T00:00:00Z</updated><author><name>Greg Alfaro</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 8, 2025, we released versions 17.7.1, 17.6.3, 17.5.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h2 id="changes-to-imports">Changes to Imports</h2>
<p>GitLab released a new user contribution and membership mapping feature for GitLab importers, including Direct Transfer, GitHub, Bitbucket Server, and Gitea importers. This feature is available by default from GitLab 17.7.1. More information on the feature and availability can be found in a <a href="https://about.gitlab.com/blog/streamline-migrations-with-user-contribution-and-membership-mapping/">blog post</a> and in the documentation <a href="https://docs.gitlab.com/ee/user/project/import/index.html#user-contribution-and-membership-mapping">here</a>.</p>
<h3 id="why-gitlab-changed-its-importer-functionality">Why GitLab changed its importer functionality</h3>
<p>Vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-5655">CVE-2024-5655</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6385">CVE-2024-6385</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6678">CVE-2024-6678</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8970">CVE-2024-8970</a>) affecting import functionality were discovered through our HackerOne bug bounty program. To address these vulnerabilities and further enhance security, GitLab redesigned the importers’ user contribution mapping functionality.</p>
<h3 id="whats-changing">What’s changing?</h3>
<ol>
<li><strong>Post-import mapping</strong>: Previously unavailable, this feature allows you to assign imported contributions and memberships to users on the destination instance after completing the import. Imported memberships and contributions are first mapped to placeholder users. Until they are reassigned, contributions will be displayed as associated with placeholders.</li>
<li><strong>Email-independent mapping</strong>: The new process doesn&rsquo;t rely on email addresses, allowing you to map contributions for users with different email addresses on source and destination instances.</li>
<li><strong>User control</strong>: Each user on the destination instance assigned a contribution mapping must <a href="https://docs.gitlab.com/ee/user/project/import/#accept-contribution-reassignment">accept the assignment</a> before any imported contributions are attributed to them. They can also <a href="https://docs.gitlab.com/ee/user/project/import/#reject-contribution-reassignment">reject the assignment</a>.</li>
</ol>
<p>Full details describing improved user contribution and membership mapping features are available in the GitLab docs <a href="https://docs.gitlab.com/ee/user/project/import/#user-contribution-and-membership-mapping">here</a>.</p>
<h3 id="guidance-for-gitlab-self-managed--dedicated-customers">Guidance for GitLab Self-Managed &amp; Dedicated Customers</h3>
<ol>
<li>
<p>Exploitation requires that an attacker have an authenticated user account on the target GitLab instance. Therefore, the risk is primarily limited to insider threats unless you allow open internet access <strong>and</strong> public registrations.</p>
</li>
<li>
<p>GitLab strongly recommends disabling importers until your GitLab instance is upgraded to version 17.7.1 or later. You can disable import features by:</p>
<ol>
<li>Logging in as a GitLab instance administrator user</li>
<li>Go to Admin &gt; Settings &gt; General &gt; Import and Export settings</li>
<li>Uncheck the box next to each enabled importer</li>
<li>Click Save Changes</li>
</ol>
</li>
<li>
<p>If you must enable an importer, GitLab recommends temporarily enabling it during an import and disabling the feature after the import is complete.</p>
</li>
<li>
<p>GitLab Self-Managed with Direct Transfer (beta feature) or GitHub, Bitbucket Server, or Gitea importers enabled may be vulnerable and should be upgraded immediately.</p>
</li>
</ol>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-7-1-released/#possible-access-token-exposure-in-gitlab-logs">Possible access token exposure in GitLab logs</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-7-1-released/#cyclic-reference-of-epics-leads-resource-exhaustion">Cyclic reference of epics leads resource exhaustion</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-7-1-released/#unauthorized-user-can-manipulate-status-of-issues-in-public-projects">Unauthorized user can manipulate status of issues in public projects</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-7-1-released/#instance-saml-does-not-respect-external_provider-configuration">Instance SAML does not respect <code>external_provider</code> configuration</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="possible-access-token-exposure-in-gitlab-logs">Possible access token exposure in GitLab logs</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0194">CVE-2025-0194</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/tkuah">Thong Kuah</a>.</p>
<h3 id="cyclic-reference-of-epics-leads-resource-exhaustion">Cyclic reference of epics leads resource exhaustion</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 15.7 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. It was possible to trigger a DoS by creating cyclic references between epics.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6324">CVE-2024-6324</a>.</p>
<p>Thanks <a href="https://hackerone.com/xorz">xorz</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthorized-user-can-manipulate-status-of-issues-in-public-projects">Unauthorized user can manipulate status of issues in public projects</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 15.5 before 17.5.5, 17.6 before 17.6.3, and 17.7 before 17.7.1, in which unauthorized users could manipulate the status of issues in public projects.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12431">CVE-2024-12431</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="instance-saml-does-not-respect-external_provider-configuration">Instance SAML does not respect <code>external_provider</code> configuration</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. When a user is created via the SAML provider, the external groups setting overrides the external provider configuration. As a result, the user may not be marked as external thereby giving those users access to internal projects or groups.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13041">CVE-2024-13041</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/dblessing">Drew Blessing</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1771">17.7.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2151">Cherry pick fix for gsutil into &lsquo;17-7-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7533">backport 17.7.x: Downgrade grpc-go to v1.66.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176091">Backport  Revert &ldquo;Merge branch &lsquo;improve_reference_rewriter_to_work_cross_groups&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176128">17.7 Backport Reject system notes when indexing notes on work items</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176577">Merge branch &lsquo;andrey-fix-qa-spec&rsquo; into 17.7</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176356">Merge branch &lsquo;release-unique-users&rsquo; into 17.7</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176507">Fix CI job token signing key not always generated</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176508">Update acme-client to v2.0.19</a></li>
</ul>
<h3 id="1763">17.6.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2125">Cherry pick &lsquo;2125-base-force-upgrade-ubi&rsquo; into &lsquo;17-6-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2152">Cherry pick fix for gsutil into &lsquo;17-6-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7535">backport 17.6.x: Downgrade grpc-go to v1.66.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175367">Backport Advanced Search: Set engine for OpenSearch indices</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175272">17.6: Fix ability to use password for Git when password for Web is disabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175307">Backport running release-environments QA from the stable branch to 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175596">Backport &lsquo;fix-env-var-for-release-environments-qa&rsquo; 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175859">Backport &lsquo;dattang/fix-build-gdk-image-script&rsquo; to 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175657">Backport fix for diff_files highlights preload to 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176514">Quarantines iteration qa spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176738">Quarantine outdated user_views_iteration_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176754">Quarantine date sensitive specs 17.6</a></li>
</ul>
<h3 id="1755">17.5.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2126">Cherry pick &lsquo;2125-base-force-upgrade-ubi&rsquo; into &lsquo;17-5-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2153">Cherry pick fix for gsutil into &lsquo;17-5-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7536">backport 17.5.x: Update changelog for 17.5.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175308">Backport running release-environments QA from the stable branch to 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175364">Backport &lsquo;dattang/allow-release-environments-to-fail&rsquo; to 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175733">Backport fix for diff_files highlights preload to 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175858">Backport &lsquo;dattang/fix-build-gdk-image-script&rsquo; to 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176596">Quarantines iteration qa spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176739">Quarantine outdated user_views_iteration_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176753">Quarantine date sensitive specs 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/176568">bump devfile gem to 0.0.28 patch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175274">17.5: Fix ability to use password for Git when password for Web is disabled</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.6.2, 17.5.4, 17.4.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-6-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-6-2-released/</id><published>2024-12-11T00:00:00Z</published><updated>2024-12-11T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On December 11, 2024, we released versions 17.6.2, 17.5.4, 17.4.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#injection-of-network-error-logging-nel-headers-in-kubernetes-proxy-response-could-lead-to-ato-abusing-oauth-flows">Injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to account takeover abusing OAuth flows</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#denial-of-service-by-repeatedly-sending-unauthenticated-requests-for-diff-files">Denial of Service by repeatedly sending unauthenticated requests for diff-files</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#ci_job_token-could-be-used-to-obtain-gitlab-session">CI_JOB_TOKEN could be used to obtain GitLab session</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#open-redirect-in-releases-api">Open redirect in releases API</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#client-side-path-traversal-in-harbor-artifact-links">Client-Side Path Traversal in Harbor artifact links</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#html-injection-in-vulnerability-details-could-lead-to-cross-site-scripting">HTML injection in vulnerability details could lead to Cross Site Scripting</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#leak-branch-names-of-projects-with-confidential-repository">Leak branch names of projects with confidential repository</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#non-member-can-view-unresolved-threads-marked-as-internal-notes">Non member can view unresolved threads marked as internal notes</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#uncontrolled-resource-consumption-through-a-maliciously-crafted--file">Uncontrolled Resource Consumption through a maliciously crafted  file</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#certain-sensitive-information-passed-as-literals-inside-graphql-mutations-retained-in-graphql-logs">Certain sensitive information passed as literals inside GraphQL mutations retained in GraphQL logs</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#information-disclosure-of-confidential-incidents-details-to-a-group-member-in-gitlab-wiki">Information disclosure of confidential incidents details to a group member in Gitlab Wiki</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-2-released/#domain-confusion-in-gitlab-pages-unique-domain-implementation">Domain Confusion in GitLab Pages Unique Domain Implementation</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="injection-of-network-error-logging-nel-headers-in-kubernetes-proxy-response-could-lead-to-ato-abusing-oauth-flows">Injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to ATO abusing OAuth flows</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 before 17.4.6, starting from 17.5 before 17.5.4, and starting from 17.6 before 17.6.2, injection of Network Error Logging (NEL) headers in kubernetes proxy response could lead to session data exfiltration.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11274">CVE-2024-11274</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-by-repeatedly-sending-unauthenticated-requests-for-diff-files">Denial of Service by repeatedly sending unauthenticated requests for diff-files</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 9.4 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could cause a denial of service with requests for diff files on a commit or merge request.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>, 7.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8233">CVE-2024-8233</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ci_job_token-could-be-used-to-obtain-gitlab-session">CI_JOB_TOKEN could be used to obtain GitLab session</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 before 17.4.6, from 17.5 before 17.5.4, and from 17.6 before 17.6.2. It may have been possible for an attacker with a victim&rsquo;s <code>CI_JOB_TOKEN</code> to obtain a GitLab session token belonging to the victim.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L</code></a>, 6.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12570">CVE-2024-12570</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="open-redirect-in-releases-api">Open redirect in releases API</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions from 11.8 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. An attacker could potentially perform an open redirect against a given releases API endpoint.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9387">CVE-2024-9387</a>.</p>
<p>Thanks <a href="https://hackerone.com/swiftee">swiftee</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="client-side-path-traversal-in-harbor-artifact-links">Client-Side Path Traversal in Harbor artifact links</h3>
<p>An issue was discovered in GitLab affecting all versions starting 15.2 before 17.4.6, 17.5 before  17.5.4, and 17.6 before 17.6.2. On self hosted installs, it was possible to leak the cross site request forgery (CSRF) token to an external site while the Harbor integration was enabled.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>, 5.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8647">CVE-2024-8647</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="html-injection-in-vulnerability-details-could-lead-to-cross-site-scripting">HTML injection in vulnerability details could lead to Cross Site Scripting</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 17.3 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. Improper output encoding could lead to Cross Site Scripting (XSS) if Content Security Policy (CSP) is not enabled.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>, 5.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8179">CVE-2024-8179</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="leak-branch-names-of-projects-with-confidential-repository">Leak branch names of projects with confidential repository</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.9 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2. By using a specific GraphQL query, under specific conditions an unauthorised user can retrieve branch names.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8116">CVE-2024-8116</a>.</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="non-member-can-view-unresolved-threads-marked-as-internal-notes">Non member can view unresolved threads marked as internal notes</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions from 15.0 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2 that allowed non-member users to view unresolved threads marked as internal notes in public projects merge requests.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8650">CVE-2024-8650</a>.</p>
<p>Thanks <a href="https://hackerone.com/salh4ckr">salh4ckr</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="uncontrolled-resource-consumption-through-a-maliciously-crafted--file">Uncontrolled Resource Consumption through a maliciously crafted  file</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 13.9 before 17.4.6, 17.5 before 17.5.4, and 17.6 before 17.6.2, that allows an attacker to cause uncontrolled resource consumption, potentially leading to a Denial of Service (DoS) condition while parsing templates to generate changelogs.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9367">CVE-2024-9367</a>.</p>
<p>Thanks <a href="https://hackerone.com/l33thaxor">l33thaxor</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="certain-sensitive-information-passed-as-literals-inside-graphql-mutations-retained-in-graphql-logs">Certain sensitive information passed as literals inside GraphQL mutations retained in GraphQL logs</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 11.0 before 17.4.6, starting from 17.5 before 17.5.4, and starting from 17.6 before 17.6.2, where sensitive information passed in GraphQL mutations may have been retained in GraphQL logs.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.0).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12292">CVE-2024-12292</a>.</p>
<p>This issue was discovered internally by GitLab team member <a href="https://gitlab.com/radbatnag">Radamanthus Batnag</a>.</p>
<h3 id="information-disclosure-of-confidential-incidents-details-to-a-group-member-in-gitlab-wiki">Information disclosure of confidential incidents details to a group member in Gitlab Wiki</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 17.4.6, all versions starting from 17.5 before 17.5.4 all versions starting from 17.6 before 17.6.2, that allows group users to view confidential incident title through the Wiki History Diff feature, potentially leading to information disclosure.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10043">CVE-2024-10043</a>.</p>
<p>Thanks <a href="https://hackerone.com/mateuszek">mateuszek</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="domain-confusion-in-gitlab-pages-unique-domain-implementation">Domain Confusion in GitLab Pages Unique Domain Implementation</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.3 before 17.4.2, all versions starting from 17.5 before 17.5.4, all versions starting from 17.6 before 17.6.2. This issue allows an attacker to create a group with a name matching an existing unique Pages domain, potentially leading to domain confusion attacks.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9633">CVE-2024-9633</a>.</p>
<p>Thanks <a href="https://hackerone.com/psycho_012">psycho_012</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1762">17.6.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2120">Upgrade to Postgres 16.6 for client libraries, openssl 3.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173193">Fix 401 errors when installing the GitLab for Jira app</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174008">Backport &lsquo;dattang/allow-release-environments-to-fail&rsquo; to 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174254">Backport &lsquo;always-build-qa-image-for-release-environments&rsquo; to 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174291">Add guard clause to Wiki#find_page when title is nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174583">Merge branch &lsquo;498768-graphql-subscriptions-ignore-unauthorized-error&rsquo; into &lsquo;17-6-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174512">Merge branch &rsquo;nd/fix-progressbar-progress&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174700">Backport 17-6 Remove unused matched_lines_count</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174701">Backport Zoekt indices without zoekt_repositories stuck in initializing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174549">Backport &lsquo;Zoekt: Do not process failed repos&rsquo; into 17.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174214">Bump devfile gem to 0.1.1</a></li>
</ul>
<h3 id="1754">17.5.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2121">Upgrade to Postgres 16.6 for client libraries, openssl 3.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173196">Fix 401 errors when installing the GitLab for Jira app</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174255">Backport &lsquo;always-build-qa-image-for-release-environments&rsquo; to 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174581">Merge branch &lsquo;498768-graphql-subscriptions-ignore-unauthorized-error&rsquo; into &lsquo;17-5-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171140">Backport https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170141 into 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/175190">Quarantine Custom model features specs</a></li>
</ul>
<h3 id="1746">17.4.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2122">Upgrade to Postgres 16.6 for client libraries, openssl 3.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173428">Add param filtering to avoid error while saving project settings</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173197">Fix 401 errors when installing the GitLab for Jira app</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174256">Backport &lsquo;always-build-qa-image-for-release-environments&rsquo; to 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/174756">Backport fix for flaky tests in search_results spec</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.6.1, 17.5.3, 17.4.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-6-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-6-1-released/</id><published>2024-11-26T00:00:00Z</published><updated>2024-11-26T00:00:00Z</updated><author><name>Ottilia Westerlund</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On November 26, 2024, we released versions 17.6.1, 17.5.3, 17.4.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-1-released/#privilege-escalation-via-lfs-tokens">Privilege Escalation via LFS Tokens</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-1-released/#dos-through-uncontrolled-resource-consumption-when-viewing-a-maliciously-crafted-cargotoml-file">DoS through uncontrolled resource consumption when viewing a maliciously crafted cargo.toml file.</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-1-released/#unintended-access-to-usage-data-via-scoped-tokens">Unintended access to Usage Data via Scoped Tokens</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-1-released/#gitlab-dos-via-harbor-registry-integration">Gitlab DOS via Harbor registry integration</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-1-released/#resource-exhaustion-and-denial-of-service-with-test_report-api-calls">Resource exhaustion and denial of service with test_report API calls</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-6-1-released/#streaming-endpoint-did-not-invalidate-tokens-after-revocation">Streaming endpoint did not invalidate tokens after revocation</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="privilege-escalation-via-lfs-tokens">Privilege Escalation via LFS Tokens</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 8.12 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. This issue allows an attacker with access to a victim&rsquo;s Personal Access Token (PAT) to escalate privileges.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N </code></a>, 8.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8114">CVE-2024-8114</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="dos-through-uncontrolled-resource-consumption-when-viewing-a-maliciously-crafted-cargotoml-file">DoS through uncontrolled resource consumption when viewing a maliciously crafted cargo.toml file.</h3>
<p>A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions prior to 12.6 prior to 17.4.5, 17.5 prior to 17.5.3, and 17.6 prior to 17.6.1. An attacker could cause a denial of service with a crafted cargo.toml file.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8237">CVE-2024-8237</a>.</p>
<p>Thanks <a href="https://hackerone.com/l33thaxor">l33thaxor</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unintended-access-to-usage-data-via-scoped-tokens">Unintended Access to Usage Data via Scoped Tokens</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions from 16.9.8 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. Certain API endpoints could potentially allow unauthorized access to sensitive data due to overly broad application of token scopes.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11669">CVE-2024-11669</a>.</p>
<p>This vulnerability has been discovered internally by a GitLab team member, <a href="https://gitlab.com/DylanGriffith">Dylan Griffith</a>.</p>
<h3 id="gitlab-dos-via-harbor-registry-integration">Gitlab DOS via Harbor registry integration</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 15.6 prior to 17.4.5, starting from 17.5 prior to 17.5.3, starting from 17.6 prior to 17.6.1 which could cause Denial of Service via integrating a malicious harbor registry.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8177">CVE-2024-8177</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="resource-exhaustion-and-denial-of-service-with-test_report-api-calls">Resource exhaustion and denial of service with test_report API calls</h3>
<p>A denial of service (DoS) condition was discovered in GitLab CE/EE affecting all versions from 13.2.4 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11828">CVE-2024-11828</a>.</p>
<p>Thanks <a href="https://hackerone.com/luryus">luryus</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="streaming-endpoint-did-not-invalidate-tokens-after-revocation">Streaming endpoint did not invalidate tokens after revocation</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.11 before 17.4.5, 17.5 before 17.5.3, and 17.6 before 17.6.1. Long-lived connections could potentially bypass authentication controls, allowing unauthorized access to streaming results.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N</code></a>, 4.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11668">CVE-2024-11668</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team members, <a href="https://gitlab.com/DylanGriffith">Dylan Griffith</a> and <a href="https://gitlab.com/engwan">Heinrich Lee Yu</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1761">17.6.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173427">Revert &ldquo;Merge branch &lsquo;include-sec-in-sidekiq-worker-attributes-concern&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173288">Revert &ldquo;Merge branch &lsquo;421376-part-1-move-history-button&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173464">Backport to 17.6 the fix for sbom ingestion failure when license spdx id is nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173593">Cherry-pick &lsquo;jennli-patch-compile-prod-assets-rules&rsquo; into 17-6-stable-ee</a></li>
</ul>
<h3 id="1753">17.5.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172339">Disable http router in tests</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171715">Ensure auto_merge_enabled is set when validating merge trains</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172391">Backport Index work items when project visibility level changes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172767">Backport fix for token revocation to 17.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172871">Backport Publish AuthorizationsAddedEvent with multiple projects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173185">Make assertion order independent</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/173594">Cherry-pick &lsquo;jennli-patch-compile-prod-assets-rules&rsquo; into 17-5-stable-ee</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.5.2, 17.4.4, 17.3.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-5-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-5-2-released/</id><published>2024-11-13T00:00:00Z</published><updated>2024-11-13T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On November 13, 2024, we released versions 17.5.2, 17.4.4, 17.3.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-2-released/#unauthorized-access-to-kubernetes-cluster-agent">Unauthorized access to Kubernetes cluster agent</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-2-released/#device-oauth-flow-allows-for-cross-window-forgery">Device OAuth flow allows for cross window forgery</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-2-released/#denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload">Denial of Service by importing malicious crafted FogBugz import payload</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-2-released/#stored-xss-through-javascript-url-in-analytics-dashboards">Stored XSS through javascript URL in Analytics dashboards</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-2-released/#html-injection-in-vulnerability-code-flow-could-lead-to-xss-on-self-hosted-instances">HTML injection in vulnerability Code flow could lead to XSS on self hosted instances</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-2-released/#information-disclosure-through-an-api-endpoint">Information disclosure through an API endpoint</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="unauthorized-access-to-kubernetes-cluster-agent">Unauthorized access to Kubernetes cluster agent</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.0 prior to 17.3.7, starting from 17.4 prior to 17.4.4, and starting from 17.5 prior to 17.5.2, which could have allowed unauthorized access to the Kubernetes agent in a cluster under specific configurations.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</code></a>, 8.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9693">CVE-2024-9693</a>.</p>
<p>This vulnerability was found internally by a GitLab team member <a href="https://gitlab.com/tigerwnz">Tiger Watson</a>.</p>
<h3 id="device-oauth-flow-allows-for-cross-window-forgery">Device OAuth flow allows for cross window forgery</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 17.2 prior to 17.3.7, starting from 17.4 prior to 17.4.4 and starting from 17.5 prior to 17.5.2, which could have allowed an attacker gaining full API access as the victim via the Device OAuth flow.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7404">CVE-2024-7404</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload">Denial of Service by importing malicious crafted FogBugz import payload</h3>
<p>A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14.1 prior to 17.3.7, 17.4 prior to 17.4.4, and 17.5 prior to 17.5.2. A denial of service could occur upon importing maliciously crafted content using the Fogbugz importer.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
We have requested a CVE ID and will update this blog post when it is assigned.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="stored-xss-through-javascript-url-in-analytics-dashboards">Stored XSS through javascript URL in Analytics dashboards</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. The vulnerability could allow an attacker to inject malicious JavaScript code in Analytics Dashboards through a specially crafted URL.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</code></a>, 6.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8648">CVE-2024-8648</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="html-injection-in-vulnerability-code-flow-could-lead-to-xss-on-self-hosted-instances">HTML injection in vulnerability Code flow could lead to XSS on self hosted instances</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 17.3 before 17.3.7, 17.4 before 17.4.4, and 17.5 before 17.5.2. Improper output encoding could lead to XSS if CSP is not enabled.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code></a>, 5.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8180">CVE-2024-8180</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="information-disclosure-through-an-api-endpoint">Information disclosure through an API endpoint</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 17.3 before 17.3.7, all versions starting from 17.4 before 17.4.4, all versions starting from 17.5 before 17.5.2 in which an unauthenticated user may be able to read some information about an MR in a private project, under certain circumstances.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10240">CVE-2024-10240</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/patrickbajao">Patrick Bajao</a>.</p>
<h3 id="mattermost-security-updates-october-28-2024">Mattermost Security Updates October 28, 2024</h3>
<p>Mattermost has been updated to versions 10.1.2, which contains several patches and security fixes.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1752">17.5.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170051">Security patch upgrade alert: Only expose to admins 17-5</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170814">[backport] Add epic to the scope and fix the flaky spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170641">[Backport] Fix indexing subgroup associations</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170777">Skip creating tables as partitions if any partition exists</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170058">Add knn index setting for workitem index for opensearch clusters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/169904">[Backport]Fix new project group templates pagination</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170981">Update pdf worker file path in pdf viewer</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170961">[backport] Fix issue label facet can overwrite selected labels</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171634">Fix workitem job in 17-5-stable-ee branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171703">[Backport] Go-get: return 404 error code when personal token is invalid</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171554">Add param filtering to avoid error while saving project settings</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171926">Skip multi-version upgrade migration spec on default branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171891">Fix group wiki activity events breaking the user feed</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172133">Destroy merge train car after branch deletion</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171585">Backport: Remove permissions JSONB column from the condition</a></li>
</ul>
<h3 id="1744">17.4.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7400">Backport fix for incorrect error classification to 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7414">Backport 17-4: Update GoCloud to a version that supports s3ForcePathStyle</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170209">Use dump from 17.3.5 since 17.3 is the previous required stop</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170055">Security patch upgrade alert: Only expose to admins 17-4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171630">Fix workitem job in 17-4-stable-ee branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171784">Don&rsquo;t run e2e:test-product-analytics</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171736">Ensure auto_merge_enabled is set when validating merge trains</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172134">Destroy merge train car after branch deletion</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/172135">Fix broken merge train merge when target branch deleted</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171586">Backport: Remove permissions JSONB column from the condition</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170978">Update pdf worker file path in pdf viewer</a></li>
</ul>
<h3 id="1737">17.3.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7396">Backport dragonboat&rsquo;s file permission error to 17.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170208">Use dump from 16.11.8 since 16.11 is the previous required stop</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/171632">Fix workitem job in 17-3-stable-ee branch</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.5.1, 17.4.3, 17.3.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-5-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-5-1-released/</id><published>2024-10-23T00:00:00Z</published><updated>2024-10-23T00:00:00Z</updated><author><name>Kevin Morrison</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On October 23, 2024, we released versions 17.5.1, 17.4.3, 17.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-1-released/#html-injection-in-global-search-may-lead-to-xss">HTML injection in Global Search may lead to XSS</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-5-1-released/#dos-via-xml-manifest-file-import">DoS via XML manifest file import</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="html-injection-in-global-search-may-lead-to-xss">HTML injection in Global Search may lead to XSS</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 before 17.3.6, 17.4 before 17.4.3, and 17.5 before 17.5.1. An attacker could inject HTML into the Global Search field on a diff view leading to XSS.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code></a>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8312">CVE-2024-8312</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="dos-via-xml-manifest-file-import">DoS via XML manifest file import</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 11.2 before 17.3.6, 17.4 before 17.4.3, and 17.5 before 17.5.1. A denial of service could occur via importing a malicious crafted XML manifest file.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6826">CVE-2024-6826</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="update-regarding-helm-charts-devkit-and-analytics-stack">Update regarding helm charts, devkit and analytics stack</h3>
<p><code>Helm charts</code>, <code>devkit</code> and <code>analytics stack</code> have been patched to no longer support dynamic funnels.</p>
<h3 id="bump-ingress-nginx-controller-image-to-1112">Bump Ingress NGINX Controller image to 1.11.2</h3>
<p>The GitLab chart bundles a forked Ingress NGINX Controller subchart. We&rsquo;ve updated its image version to 1.11.2.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1751">17.5.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/170051">Security patch upgrade alert: Only expose to admins</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7995">Backport: Ensure postgresql_new is included in GitLab CE</a></li>
</ul>
<h3 id="1743">17.4.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2058">Resolve &ldquo;UBI FIPS: Error in bashrc due to hardening script&rdquo; (17.4)</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2044">Backport: fix: Allow non-root user to run the bundle-certificates script 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7351">Backport gocloud.dev update to 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7362">Backport bundle fetch fsck fix to 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168691">Backport Stable Branch Danger Checks to 17-4-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168669">Add version to pdf.js file in webpack builds</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168793">Backport: Skip rspec fail-fast jobs if pipeline:skip-rspec-fail-fast label is set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168569">Backport fix Zoekt global code search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168776">Set author on issuable to current user if it is not already set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/169190">Backport LabKit v1.21.2 update to fix broken dependency</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/169625">Fix broken duo chat spec after free access cutoff [17.4]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7998">Backport: Ensure postgresql_new is included in GitLab CE</a></li>
</ul>
<h3 id="1736">17.3.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2057">Resolve &ldquo;UBI FIPS: Error in bashrc due to hardening script&rdquo; (17.3)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7339">Backport CreateRepositoryFromURL error handling to 17.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168938">Set author on issuable to current user if it is not already set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/169627">Fix broken duo chat spec after free access cutoff [17.3]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168818">Backport Stable Branch Danger Checks to 17-3-stable-ee</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 17.4.2, 17.3.5, 17.2.9</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-4-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-4-2-released/</id><published>2024-10-09T00:00:00Z</published><updated>2024-10-09T00:00:00Z</updated><author><name>Nikhil George</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On October 9, 2024, we released versions 17.4.2, 17.3.5, 17.2.9 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. <strong>GitLab Dedicated customers do not need to take action.</strong></p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#run-pipelines-on-arbitrary-branches">Run pipelines on arbitrary branches</a></td>
          <td>Critical</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#an-attacker-can-impersonate-arbitrary-user">An attacker can impersonate arbitrary user</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#ssrf-in-analytics-dashboard">SSRF in Analytics Dashboard</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#viewing-diffs-of-mr-with-conflicts-can-be-slow">Viewing diffs of MR with conflicts can be slow</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#htmli-in-oauth-page">HTMLi in  OAuth page</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#deploy-keys-can-push-changes-to-an-archived-repository">Deploy Keys can push changes to an archived repository</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#guests-can-disclose-project-templates">Guests can disclose project templates</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-2-released/#gitlab-instance-version-disclosed-to-unauthorized-users">GitLab instance version disclosed to unauthorized users</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="run-pipelines-on-arbitrary-branches">Run pipelines on arbitrary branches</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 12.5 prior to 17.2.9, starting from 17.3, prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows running pipelines on arbitrary branches.
This is a critical severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N</code></a>, 9.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9164">CVE-2024-9164</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="an-attacker-can-impersonate-arbitrary-user">An attacker can impersonate arbitrary user</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 11.6 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N</code></a>, 8.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8970">CVE-2024-8970</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ssrf-in-analytics-dashboard">SSRF in Analytics Dashboard</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 15.10 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. Instances with Product Analytics Dashboard configured and enabled could be vulnerable to SSRF attacks.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N</code></a>, 8.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8977">CVE-2024-8977</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="viewing-diffs-of-mr-with-conflicts-can-be-slow">Viewing diffs of MR with conflicts can be slow</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 13.6 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, were viewing diffs of MR with conflicts can be slow. This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9631">CVE-2024-9631</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="htmli-in-oauth-page">HTMLi in OAuth page</h3>
<p>A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 17.1 prior 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2. When authorising a new application, it can be made to render as HTML under specific circumstances.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 7.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6530">CVE-2024-6530</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="deploy-keys-can-push-changes-to-an-archived-repository">Deploy Keys can push changes to an archived repository</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.2.9, starting from 17.3 prior to 17.3.5, and starting from 17.4 prior to 17.4.2, which allows deploy keys to push to an archived repository. This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</code></a>, 4.9).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9623">CVE-2024-9623</a>.</p>
<p>Thanks <a href="https://gitlab.com/stevenorman">stevenorman</a> for reporting this vulnerability.</p>
<h3 id="guests-can-disclose-project-templates">Guests can disclose project templates</h3>
<p>An issue has been discovered in GitLab EE/CE affecting all versions starting from 11.4 before 17.2.9, all versions starting from 17.3 before 17.3.5, all versions starting from 17.4 before 17.4.2. It was possible for guest users to disclose project templates using the API.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5005">CVE-2024-5005</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="gitlab-instance-version-disclosed-to-unauthorized-users">GitLab instance version disclosed to unauthorized users</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.2.9, from 17.3 prior to 17.3.5, and from 17.4 prior to 17.4.2. It was possible for an unauthenticated attacker to determine the GitLab version number for a GitLab instance.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 3.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9596">CVE-2024-9596</a>.</p>
<p>This issue was discovered internally by GitLab team member <a href="https://gitlab.com/pgascouvaillancourt">Paul Gascou-Vaillancourt</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1742">17.4.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2041">Backport: fix: Specify an absolute directory for SCHEMA_VERSIONS_DIR to 17-4-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7323">Backport grpc-go v1.67.1 upgrade to 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/167033">Update expected vulnerability in enable_advanced_sast_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166877">Skip multi-version upgrade job for stable branch MRs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168099">Backport 17.4 Fix label filter by name for search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168238">Restrict duo pro assignment email to duo pro for sm</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168156">Drop project_id not null constraint ci_deleted_objects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/167937">[Backport] Go-get: fix 401 error for unauthenticated requests</a></li>
</ul>
<h3 id="1735">17.3.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2042">Backport: fix: Specify an absolute directory for SCHEMA_VERSIONS_DIR to 17-3-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2045">Backport: fix: Allow non-root user to run the bundle-certificates script 17.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166881">Skip multi-version upgrade job for stable branch MRs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168015">Ensure restricted visibility levels is an array - 17.3 backport</a></li>
</ul>
<h3 id="1729">17.2.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166883">Skip multi-version upgrade job for stable branch MRs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/168016">Ensure restricted visibility levels is an array - 17.2 backport</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 16.10.10, 16.9.11, 16.8.10, 16.7.10, 16.6.10, 16.5.10, 16.4.7, 16.3.9, 16.2.11, 16.1.8, 16.0.10</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-10-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-10-released/</id><published>2024-09-25T00:00:00Z</published><updated>2024-09-25T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 25, 2024, we released versions 16.10.10, 16.9.11, 16.8.10, 16.7.10, 16.6.10, 16.5.10, 16.4.7, 16.3.9, 16.2.11, 16.1.8, and 16.0.10 for GitLab Community Edition (CE) and Enterprise Edition (EE). This extends the security fixes previously added to 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10.</p>
<p>These versions contain backports of an important security fix which was previously <a href="https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-released/">released for GitLab versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, and 16.11.10</a>.
We strongly recommend that all affected self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<p>Special thanks goes to Roger Meier (@bufferoverflow) who originally created the merge request in Canonical.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issue described below be <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-10-released/#saml-authentication-bypass">SAML authentication bypass</a></td>
          <td>Critical</td>
      </tr>
  </tbody>
</table>
<h3 id="saml-authentication-bypass">SAML authentication bypass</h3>
<p>Updates dependencies <code>omniauth-saml</code> to version 2.2.1 and <code>ruby-saml</code> to 1.17.0 to mitigate <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>. This security vulnerability applies only to instances which
have configured SAML based authentication.</p>
<h4 id="self-managed-gitlab-known-mitigations">Self Managed GitLab: Known Mitigations</h4>
<p>The following mitigation for self-managed GitLab installations prevents successful exploitation of <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>:</p>
<ol>
<li>Enable GitLab <a href="https://docs.gitlab.com/ee/user/profile/account/two_factor_authentication.html">two-factor authentication</a> for <a href="https://docs.gitlab.com/ee/security/two_factor_authentication.html#enforce-2fa-for-all-users">all user accounts</a> on the GitLab self-managed instance (NOTE: Enabling identity provider multi-factor authentication does not mitigate this vulnerability) <strong>and</strong></li>
<li>Do not allow the <a href="https://docs.gitlab.com/ee/integration/saml.html#bypass-two-factor-authentication">SAML two-factor bypass</a> option in GitLab.</li>
</ol>
<h4 id="self-managed-gitlab-identifying--detecting-exploitation-attempts">Self Managed GitLab: Identifying &amp; Detecting Exploitation Attempts</h4>
<p>Evidence of attempted or successful exploitation of Ruby-SAML (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>) will be present in the GitLab <a href="https://docs.gitlab.com/ee/administration/logs/#application_jsonlog">application_json</a> and <a href="https://docs.gitlab.com/ee/administration/logs/#auth_jsonlog">auth_json</a> log files.</p>
<h5 id="unsuccessful-exploit-attempt---hunting">Unsuccessful Exploit Attempt - Hunting</h5>
<p>Unsuccessful exploitation attempts may generate a <code>ValidationError</code> from the <code>RubySaml</code> library. This could be for a variety of reasons related to the complexity of crafting a working exploit.</p>
<p>Two examples are shown below, but the error may manifest with other descriptions. The common string to search for is <code>RubySaml::ValidationError</code> inside the application_json log.</p>
<ol>
<li>Invalid ticket due to incorrect callback URL
<ol>
<li>Example log event:</li>
<li><code>{&quot;severity&quot;:&quot;ERROR&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, The response was received at https://domain.com/users/auth/saml/incorrect_callback instead of https://domain.com/users/auth/saml/callback&quot;}</code></li>
</ol>
</li>
<li>Invalid ticket due to a certificate signing issue
<ol>
<li>Example log event:</li>
<li><code>&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, Fingerprint mismatch&quot;</code></li>
</ol>
</li>
</ol>
<h5 id="successful-exploitation---hunting">Successful Exploitation - Hunting</h5>
<p>Successful exploitation attempts will trigger SAML related log events. However, there may be differences that make an exploit attempt unique from legitimate SAML authentication events.</p>
<p>A successful exploitation attempt will log whatever extern_id value is set by the attacker attempting exploitation. Therefore, identifying a unique extern_uid that is not common in your organization could be an indicator of potential exploitation.</p>
<ol>
<li>Example exploit authentication event in the application_json log file, with a extern_id set in exploit PoC code:
<ol>
<li>Log event:</li>
<li><code>{&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip/0.0.0.0&quot;,&quot;message&quot;:&quot;(SAML) saving user exploit-test-user@domain.com from login with admin =\\u003e false, extern_uid =\\u003e exploit-test-user&quot;}</code></li>
</ol>
</li>
</ol>
<p>When crafting an exploit, there are many <a href="https://docs.gitlab.com/ee/integration/saml.html#configure-assertions">SAML assertions</a> an attacker would need to craft to perfectly replicate a legitimate login. These include both the key and value fields that you specify at your IdP, and may be unknown to unauthorized individuals - especially if you have customized these attributes.</p>
<p>You can review your auth_json log file to look for SAML responses with incorrect or missing information in the <code>attributes</code> section.</p>
<ol>
<li>Example of a SAML authentication event in the auth_json log file.
<ol>
<li><code>&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip/0.0.0.0&quot;,&quot;payload_type&quot;:&quot;saml_response&quot;: {&quot;issuer&quot;: [&quot;xxx&quot;],&quot;name_id&quot;: &quot;xxx&quot;,&quot;name_id_format&quot;: &quot;xxx&quot;,&quot;name_id_spnamequalifier&quot;: null,&quot;name_id_namequalifier&quot;: null,&quot;destination&quot;: &quot;xxx&quot;,&quot;audiences&quot;: [&quot;xxx&quot;],&quot;attributes&quot;: {&quot;first_name&quot;: [&quot;xxx&quot;],&quot;last_name&quot;: [&quot;yyy&quot;], &quot;email&quot;: [&quot;zzz&quot;]}}</code></li>
</ol>
</li>
</ol>
<h5 id="detecting-exploitation-attempts">Detecting Exploitation Attempts</h5>
<p>For self managed customers forwarding GitLab application_json logs to a SIEM, creating detections to detect Ruby-SAML (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>) exploitation attempts is possible. Our team is sharing two threat detections rules, written in Sigma format, to detect potential exploitation.</p>
<p><strong>Note:</strong> These detections may need to be tuned and modified to customer environments in order to deliver effective results, and due to varying configurations of different customer environments, customers should validate the legitimacy and accuracy of any events identified by these detections.</p>
<h5 id="users-with-more-than-1-unique-extern_uid-over-time">Users with more than 1 unique extern_uid over time</h5>
<p>This detection is designed to identify an authenticated SAML user with more than one extern_uid values linked to authentication events, a potential indication of malicious authentications with an attacker set extern_uid field.</p>

<div class="codeblock-wrapper" data-elastic-exclude>
  <div data-vue-app="codeblock-toolbar" data-code-language="" class="codeblock-toolbar"></div><pre tabindex="0"><code>title: Multiple extern_ids
description: Detects when their are multiple extern_id&#39;s associated with a user.
author: Gitlab Security Engineering
date: 09/15/2024
schedule: &#34;*/10 * * * *&#34;
pseudocode: |
  select log source application.log
  where 7d &lt; event_time &lt; now()
  where severity=&#34;INFO&#34; and meta_caller_id=&#34;Groups::OmniauthCallbacksController#group_saml&#34;
  regex(message, &#34;saving user (?&lt;user_email&gt;\S+) .*extern_uid \S+ (?&lt;extern_id&gt;[\S]+)&#34;)
  count extern_id by user_email as total_extern_ids
  where total_extern_ids &gt; 1
verify: Review Gitlab application logs for the source IP of the SAML authentications. If there is a singular IP for all extern_ids this could point to a false positive. Cross reference the SAML authentication source IP/s with the known user&#39;s IP from sso authentication logs.
tuning: N/A</code></pre></div>
<h5 id="gitlab-saml-authentication-from-a-different-ip-address-than-other-idp-events-for-the-same-user-over-time">GitLab SAML authentication from a different IP address than other iDP events for the same user over time</h5>
<p>This detection is designed to correlate authentication events, grouped by user, against both GitLab SAML authentication events as well as other iDP authentication events in an effort to identify any change in user IP address, which could be an indication of attacker authentication sessions.</p>

<div class="codeblock-wrapper" data-elastic-exclude>
  <div data-vue-app="codeblock-toolbar" data-code-language="" class="codeblock-toolbar"></div><pre tabindex="0"><code>title: Gitlab SAML IP differs from SSO IP
description: Detects when the source IP for the SAML authentication to Gitlab from application.log differs from the users known IP from SSO MFA logs.
author: Gitlab Security Engineering
date: 09/15/2024
schedule: &#34;*/10 * * * *&#34;
pseudocode: |
  select log source application.log
  where severity=&#34;INFO&#34; and meta_caller_id=&#34;Groups::OmniauthCallbacksController#group_saml&#34;
  regex(message, &#34;saving user (?&lt;user_email&gt;\S+) &#34;)
  #Create sub-query to bring in table from SSO authentication data
  select meta_remote_ip, user_email
  where user_email in
    (
    select log source authentication
    where 1d &lt; event_time &lt; now()
    where event_type=&#34;user.authentication.auth_via_mfa&#34;
    group by user_email, sso_source_ip
    )
  where sso_source_ip!=meta_remote_ip
verify: False positives can arise when the user is traveling. Review SSO authentication logs to see if the geo-location is similar to the SAML authentication to Gitlab. If any discrepancies are found, reach out to the user for verification. If the user is not traveling, temporarily lock the user&#39;s Gitlab account and review their activity through Gitlab&#39;s application logs.
tuning: If the query is producing high false positives, consider using geolocation functions on IPs to compare the cities and countries that are generating the authentications.</code></pre></div>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.4.1, 17.3.4, 17.2.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-4-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-4-1-released/</id><published>2024-09-25T00:00:00Z</published><updated>2024-09-25T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 25, 2024, we released versions 17.4.1, 17.3.4, 17.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below be <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-1-released/#maintainer-can-leak-dependency-proxy-password-by-changing-dependency-proxy-url-via-crafted-post-request">Maintainer can leak Dependency Proxy password by changing Dependency Proxy URL via crafted POST request</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-1-released/#ai-feature-reads-unsanitized-content-allowing-for-attacker-to-hide-prompt-injection">AI feature reads unsanitized content, allowing for attacker to hide prompt injection</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-4-1-released/#project-reference-can-be-exposed-in-system-notes">Project reference can be exposed in system notes</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="maintainer-can-leak-dependency-proxy-password-by-changing-dependency-proxy-url-via-crafted-post-request">Maintainer can leak Dependency Proxy password by changing Dependency Proxy URL via crafted POST request</h3>
<p>An information disclosure issue has been discovered in GitLab EE affecting all versions starting from 16.5 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. A maintainer could obtain a Dependency Proxy password by editing a certain Dependency Proxy setting via a POST request.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</code></a>, 5.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4278">CVE-2024-4278</a>.</p>
<p>Thanks <a href="https://hackerone.com/ac7n0w">ac7n0w</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ai-feature-reads-unsanitized-content-allowing-for-attacker-to-hide-prompt-injection">AI feature reads unsanitized content, allowing for attacker to hide prompt injection</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. An AI feature was found to read unsanitized content in a way that could&rsquo;ve allowed an attacker to hide prompt injection.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N</code></a>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4099">CVE-2024-4099</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="project-reference-can-be-exposed-in-system-notes">Project reference can be exposed in system notes</h3>
<p>An information disclosure issue has been discovered in Gitlab EE/CE affecting all versions from 15.6 prior to 17.2.8, 17.3 prior to 17.3.4, and 17.4 prior to 17.4.1. In specific conditions it was possible to disclose the path of a private project to an unauthorized user.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>, 2.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8974">CVE-2024-8974</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/leipert">Lukas Eipert</a>.</p>
<h3 id="mattermost-security-updates-august-27-2024">Mattermost Security Updates August 27, 2024</h3>
<p>Mattermost has been updated to version 9.11.1, which contains several patches and security fixes.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1741">17.4.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166427">Improve OpenSSL callout message</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166564">Change urgency of API project/:id/share to <code>low</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166363">Check commit message for issue close pattern setting</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166540">Backport: Fixes issues with incorrectly displaying VR button</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166694">Backport &lsquo;Fix incorrect gitlab-shell-check filename&rsquo; into 17.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166933">Update OpenSSL v3 callout to delay update to GitLab 17.7</a></li>
</ul>
<h3 id="1734">17.3.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166181">Improve OpenSSL callout message</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166302">Fix Code Review AI features policies to check duo features enabled toggle</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166934">Update OpenSSL v3 callout to delay update to GitLab 17.7</a></li>
</ul>
<h3 id="1728">17.2.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166183">Improve OpenSSL callout message</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166935">Update OpenSSL v3 callout to delay update to GitLab 17.7</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-3-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-3-3-released/</id><published>2024-09-17T00:00:00Z</published><updated>2024-09-17T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 17, 2024, we released versions 17.3.3, 17.2.7, 17.1.8, 17.0.8, 16.11.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p><strong>All GitLab Dedicated instances have been upgraded and customers do not need to take action.</strong></p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<p>Version 17.2.6 has been used to remediate GitLab Dedicated and hasn&rsquo;t been made public. Version 17.2.7 contains identical changes.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-3-released/#saml-authentication-bypass">SAML authentication bypass</a></td>
          <td>Critical</td>
      </tr>
  </tbody>
</table>
<h3 id="saml-authentication-bypass">SAML authentication bypass</h3>
<p>Updates dependencies <code>omniauth-saml</code> to version 2.2.1 and <code>ruby-saml</code> to 1.17.0 to mitigate <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>. This security vulnerability applies only to instances which
have configured SAML based authentication.</p>
<h4 id="self-managed-gitlab-known-mitigations">Self Managed GitLab: Known Mitigations</h4>
<p>The following mitigation for self-managed GitLab installations prevents successful exploitation of <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>:</p>
<ol>
<li>Enable GitLab <a href="https://docs.gitlab.com/ee/user/profile/account/two_factor_authentication.html">two-factor authentication</a> for <a href="https://docs.gitlab.com/ee/security/two_factor_authentication.html#enforce-2fa-for-all-users">all user accounts</a> on the GitLab self-managed instance (NOTE: Enabling identity provider multi-factor authentication does not mitigate this vulnerability) <strong>and</strong></li>
<li>Do not allow the <a href="https://docs.gitlab.com/ee/integration/saml.html#bypass-two-factor-authentication">SAML two-factor bypass</a> option in GitLab.</li>
</ol>
<h4 id="self-managed-gitlab-identifying--detecting-exploitation-attempts">Self Managed GitLab: Identifying &amp; Detecting Exploitation Attempts</h4>
<p>Evidence of attempted or successful exploitation of Ruby-SAML (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>) will be present in the GitLab <a href="https://docs.gitlab.com/ee/administration/logs/#application_jsonlog">application_json</a> and <a href="https://docs.gitlab.com/ee/administration/logs/#auth_jsonlog">auth_json</a> log files.</p>
<h5 id="unsuccessful-exploit-attempt---hunting">Unsuccessful Exploit Attempt - Hunting</h5>
<p>Unsuccessful exploitation attempts may generate a <code>ValidationError</code> from the <code>RubySaml</code> library. This could be for a variety of reasons related to the complexity of crafting a working exploit.</p>
<p>Two examples are shown below, but the error may manifest with other descriptions. The common string to search for is <code>RubySaml::ValidationError</code> inside the application_json log.</p>
<ol>
<li>Invalid ticket due to incorrect callback URL
<ol>
<li>Example log event:</li>
<li><code>{&quot;severity&quot;:&quot;ERROR&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, The response was received at https://domain.com/users/auth/saml/incorrect_callback instead of https://domain.com/users/auth/saml/callback&quot;}</code></li>
</ol>
</li>
<li>Invalid ticket due to a certificate signing issue
<ol>
<li>Example log event:</li>
<li><code>&quot;message&quot;:&quot;(saml) Authentication failure! invalid_ticket: OneLogin::RubySaml::ValidationError, Fingerprint mismatch&quot;</code></li>
</ol>
</li>
</ol>
<h5 id="successful-exploitation---hunting">Successful Exploitation - Hunting</h5>
<p>Successful exploitation attempts will trigger SAML related log events. However, there may be differences that make an exploit attempt unique from legitimate SAML authentication events.</p>
<p>A successful exploitation attempt will log whatever extern_id value is set by the attacker attempting exploitation. Therefore, identifying a unique extern_uid that is not common in your organization could be an indicator of potential exploitation.</p>
<ol>
<li>Example exploit authentication event in the application_json log file, with a extern_id set in exploit PoC code:
<ol>
<li>Log event:</li>
<li><code>{&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip/0.0.0.0&quot;,&quot;message&quot;:&quot;(SAML) saving user exploit-test-user@domain.com from login with admin =\\u003e false, extern_uid =\\u003e exploit-test-user&quot;}</code></li>
</ol>
</li>
</ol>
<p>When crafting an exploit, there are many <a href="https://docs.gitlab.com/ee/integration/saml.html#configure-assertions">SAML assertions</a> an attacker would need to craft to perfectly replicate a legitimate login. These include both the key and value fields that you specify at your IdP, and may be unknown to unauthorized individuals - especially if you have customized these attributes.</p>
<p>You can review your auth_json log file to look for SAML responses with incorrect or missing information in the <code>attributes</code> section.</p>
<ol>
<li>Example of a SAML authentication event in the auth_json log file.
<ol>
<li><code>&quot;severity&quot;:&quot;INFO&quot;,&quot;time&quot;:&quot;2024-xx-xx&quot;,&quot;correlation_id&quot;:&quot;xx&quot;,&quot;meta.caller_id&quot;:&quot;OmniauthCallbacksController#saml&quot;,&quot;meta.remote_ip&quot;:&quot;0.0.0.0&quot;,&quot;meta.feature_category&quot;:&quot;system_access&quot;,&quot;meta.client_id&quot;:&quot;ip/0.0.0.0&quot;,&quot;payload_type&quot;:&quot;saml_response&quot;: {&quot;issuer&quot;: [&quot;xxx&quot;],&quot;name_id&quot;: &quot;xxx&quot;,&quot;name_id_format&quot;: &quot;xxx&quot;,&quot;name_id_spnamequalifier&quot;: null,&quot;name_id_namequalifier&quot;: null,&quot;destination&quot;: &quot;xxx&quot;,&quot;audiences&quot;: [&quot;xxx&quot;],&quot;attributes&quot;: {&quot;first_name&quot;: [&quot;xxx&quot;],&quot;last_name&quot;: [&quot;yyy&quot;], &quot;email&quot;: [&quot;zzz&quot;]}}</code></li>
</ol>
</li>
</ol>
<h5 id="detecting-exploitation-attempts">Detecting Exploitation Attempts</h5>
<p>For self managed customers forwarding GitLab application_json logs to a SIEM, creating detections to detect Ruby-SAML (<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-45409">CVE-2024-45409</a>) exploitation attempts is possible. Our team is sharing two threat detections rules, written in Sigma format, to detect potential exploitation.</p>
<p><strong>Note:</strong> These detections may need to be tuned and modified to customer environments in order to deliver effective results, and due to varying configurations of different customer environments, customers should validate the legitimacy and accuracy of any events identified by these detections.</p>
<h5 id="users-with-more-than-1-unique-extern_uid-over-time">Users with more than 1 unique extern_uid over time</h5>
<p>This detection is designed to identify an authenticated SAML user with more than one extern_uid values linked to authentication events, a potential indication of malicious authentications with an attacker set extern_uid field.</p>

<div class="codeblock-wrapper" data-elastic-exclude>
  <div data-vue-app="codeblock-toolbar" data-code-language="" class="codeblock-toolbar"></div><pre tabindex="0"><code>title: Multiple extern_ids
description: Detects when their are multiple extern_id&#39;s associated with a user. 
author: Gitlab Security Engineering
date: 09/15/2024
schedule: &#34;*/10 * * * *&#34;
pseudocode: |
  select log source application.log
  where 7d &lt; event_time &lt; now()
  where severity=&#34;INFO&#34; and meta_caller_id=&#34;Groups::OmniauthCallbacksController#group_saml&#34;
  regex(message, &#34;saving user (?&lt;user_email&gt;\S+) .*extern_uid \S+ (?&lt;extern_id&gt;[\S]+)&#34;)
  count extern_id by user_email as total_extern_ids
  where total_extern_ids &gt; 1
verify: Review Gitlab application logs for the source IP of the SAML authentications. If there is a singular IP for all extern_ids this could point to a false positive. Cross reference the SAML authentication source IP/s with the known user&#39;s IP from sso authentication logs. 
tuning: N/A</code></pre></div>
<h5 id="gitlab-saml-authentication-from-a-different-ip-address-than-other-idp-events-for-the-same-user-over-time">GitLab SAML authentication from a different IP address than other iDP events for the same user over time</h5>
<p>This detection is designed to correlate authentication events, grouped by user, against both GitLab SAML authentication events as well as other iDP authentication events in an effort to identify any change in user IP address, which could be an indication of attacker authentication sessions.</p>

<div class="codeblock-wrapper" data-elastic-exclude>
  <div data-vue-app="codeblock-toolbar" data-code-language="" class="codeblock-toolbar"></div><pre tabindex="0"><code>title: Gitlab SAML IP differs from SSO IP
description: Detects when the source IP for the SAML authentication to Gitlab from application.log differs from the users known IP from SSO MFA logs. 
author: Gitlab Security Engineering
date: 09/15/2024
schedule: &#34;*/10 * * * *&#34;
pseudocode: |
  select log source application.log 
  where severity=&#34;INFO&#34; and meta_caller_id=&#34;Groups::OmniauthCallbacksController#group_saml&#34;
  regex(message, &#34;saving user (?&lt;user_email&gt;\S+) &#34;)
  #Create sub-query to bring in table from SSO authentication data
  select meta_remote_ip, user_email
  where user_email in
    (
    select log source authentication
    where 1d &lt; event_time &lt; now()
    where event_type=&#34;user.authentication.auth_via_mfa&#34;
    group by user_email, sso_source_ip
    )
  where sso_source_ip!=meta_remote_ip
verify: False positives can arise when the user is traveling. Review SSO authentication logs to see if the geo-location is similar to the SAML authentication to Gitlab. If any discrepancies are found, reach out to the user for verification. If the user is not traveling, temporarily lock the user&#39;s Gitlab account and review their activity through Gitlab&#39;s application logs. 
tuning: If the query is producing high false positives, consider using geolocation functions on IPs to compare the cities and countries that are generating the authentications.</code></pre></div>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1733">17.3.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165585">Improve OpenSSL 3 upgrading warning notes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166063">Upgrade bundler for the GitLab Backup CLI gem</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166059">Update ruby-saml and omniauth-saml</a></li>
</ul>
<h3 id="1727">17.2.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165587">Improve OpenSSL 3 upgrading warning notes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166043">Update ruby-saml and omniauth-saml</a></li>
</ul>
<h3 id="1718">17.1.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165589">Improve OpenSSL 3 upgrading warning notes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166058">Update ruby-saml and omniauth-saml</a></li>
</ul>
<h3 id="1708">17.0.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166058">Update ruby-saml and omniauth-saml</a></li>
</ul>
<h3 id="161110">16.11.10</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/166058">Update ruby-saml and omniauth-saml</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 17.3.2, 17.2.5, 17.1.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-3-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-3-2-released/</id><published>2024-09-11T00:00:00Z</published><updated>2024-09-11T00:00:00Z</updated><author><name>Ottilia Westerlund</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 11, 2024, we released versions 17.3.2, 17.2.5, 17.1.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all self-managed GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version. GitLab Dedicated customers do not need to take action.</p>
<p>GitLab releases fixes for vulnerabilities in patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are committed to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#execute-environment-stop-actions-as-the-owner-of-the-stop-action-job">Execute environment stop actions as the owner of the stop action job</a></td>
          <td>Critical</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#prevent-code-injection-in-product-analytics-funnels-yaml">Prevent code injection in Product Analytics funnels YAML</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#ssrf-via-dependency-proxy">SSRF via Dependency Proxy</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#denial-of-service-via-sending-a-specific-post-request">Denial of Service via sending a a specific POST request</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#ci_job_token-can-be-used-to-obtain-gitlab-session-token">CI_JOB_TOKEN can be used to obtain GitLab session token</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#variables-from-settings-are-not-overwritten-by-pep-if-a-template-is-included">Variables from settings are not overwritten by PEP if a template is included</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#guests-can-disclose-the-full-source-code-of-projects-using-custom-group-level-templates">Guests can disclose the full source code of projects using custom group-level templates</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#identitiescontroller-allows-linking-of-arbitrary-unclaimed-provider-identities">IdentitiesController allows linking of arbitrary unclaimed provider identities</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#open-redirect-in-repotreeid-endpoint-can-lead-to-account-takeover-through-broken-oauth-flow">Open redirect in repo/tree/:id endpoint can lead to account takeover through broken OAuth flow</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#open-redirect-in-release-permanent-links-can-lead-to-account-takeover-through-broken-oauth-flow">Open redirect in release permanent links can lead to account takeover through broken OAuth flow</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#guest-user-with-admin-group-member-permission-can-edit-custom-role-to-gain-other-permissions">Guest user with Admin group member permission can edit custom role to gain other permissions</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#exposure-of-protected-and-masked-cicd-variables-by-abusing-on-demand-dast">Exposure of protected and masked CI/CD variables by abusing on-demand DAST</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#credentials-disclosed-when-repository-mirroring-fails">Credentials disclosed when repository mirroring fails</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#commit-information-visible-through-release-atom-endpoint-for-guest-users">Commit information visible through release atom endpoint for guest users</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#dependency-proxy-credentials-are-logged-in-plaintext-in-graphql-logs">Dependency Proxy Credentials are Logged in Plaintext in graphql Logs</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#user-application-can-spoof-the-redirect-url">User Application can spoof the redirect url</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-2-released/#group-developers-can-view-group-runners-information">Group Developers can view group runners information</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="execute-environment-stop-actions-as-the-owner-of-the-stop-action-job">Execute environment stop actions as the owner of the stop action job</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
This is a critical severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H</code></a>, 9.9).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6678">CVE-2024-6678</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="prevent-code-injection-in-product-analytics-funnels-yaml">Prevent code injection in Product Analytics funnels YAML</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. Due to incomplete input filtering, it was possible to inject commands into a connected Cube server.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 8.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8640">CVE-2024-8640</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ssrf-via-dependency-proxy">SSRF via Dependency Proxy</h3>
<p>A server-side request forgery issue has been discovered in GitLab EE affecting all versions starting from 16.8 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It was possible for an attacker to make requests to internal resources using a custom Maven Dependency Proxy URL.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</code></a>, 7.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8635">CVE-2024-8635</a>.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">joernchen</a>.</p>
<h3 id="denial-of-service-via-sending-a-specific-post-request">Denial of Service via sending a specific POST request</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2  which could cause Denial of Service via sending a specific POST request.
This is a high severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code></a>, 7.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8124">CVE-2024-8124</a>.</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ci_job_token-can-be-used-to-obtain-gitlab-session-token">CI_JOB_TOKEN can be used to obtain GitLab session token</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. It may have been possible for an attacker with a victim&rsquo;s CI_JOB_TOKEN to obtain a GitLab session token belonging to the victim.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L</code></a>, 6.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8641">CVE-2024-8641</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="variables-from-settings-are-not-overwritten-by-pep-if-a-template-is-included">Variables from settings are not overwritten by PEP if a template is included</h3>
<p>An issue was discovered with pipeline execution policies in GitLab EE affecting all versions from 17.2 prior to 17.2.5, 17.3 prior to 17.3.2 which allows authenticated users to bypass variable overwrite protection via inclusion of a CI/CD template.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8311">CVE-2024-8311</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/Andyschoenen">Andy Schoenen</a>.</p>
<h3 id="guests-can-disclose-the-full-source-code-of-projects-using-custom-group-level-templates">Guests can disclose the full source code of projects using custom group-level templates</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 11.2 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2. It was possible for a guest to read the source code of a private project by using group templates.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4660">CVE-2024-4660</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="identitiescontroller-allows-linking-of-arbitrary-unclaimed-provider-identities">IdentitiesController allows linking of arbitrary unclaimed provider identities</h3>
<p>An issue has been discovered in GitLab EE/CE affecting all versions from 16.9.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2. An improper input validation error allows attacker to squat on accounts via linking arbitrary unclaimed provider identities when JWT authentication is configured.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
We have requested a CVE ID and will update this blog post when it is assigned.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">Joern Schneeweisz</a>.</p>
<h3 id="open-redirect-in-repotreeid-endpoint-can-lead-to-account-takeover-through-broken-oauth-flow">Open redirect in repo/tree/:id endpoint can lead to account takeover through broken OAuth flow</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 11.1 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4283">CVE-2024-4283</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="open-redirect-in-release-permanent-links-can-lead-to-account-takeover-through-broken-oauth-flow">Open redirect in release permanent links can lead to account takeover through broken OAuth flow</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 12.9 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. Under certain conditions an open redirect vulnerability could allow for an account takeover by breaking the OAuth flow.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4612">CVE-2024-4612</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="guest-user-with-admin-group-member-permission-can-edit-custom-role-to-gain-other-permissions">Guest user with Admin group member permission can edit custom role to gain other permissions</h3>
<p>A privilege escalation issue has been discovered in GitLab EE affecting all versions starting from 16.6 prior to 17.1.7, from 17.2 prior to 17.2.5, and from 17.3 prior to 17.3.2. A user assigned the Admin Group Member custom role could have escalated their privileges to include other custom roles.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N</code></a>, 5.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8631">CVE-2024-8631</a>.</p>
<p>Thanks <a href="https://hackerone.com/chotebabume">chotebabume</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="exposure-of-protected-and-masked-cicd-variables-by-abusing-on-demand-dast">Exposure of protected and masked CI/CD variables by abusing on-demand DAST</h3>
<p>An issue was discovered in GitLab EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2743">CVE-2024-2743</a>.</p>
<p>Thanks <a href="https://hackerone.com/0xn3va">0xn3va</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="credentials-disclosed-when-repository-mirroring-fails">Credentials disclosed when repository mirroring fails</h3>
<p>An issue has been discovered discovered in GitLab CE/EE affecting all versions starting from 15.10 before 17.1.7, all versions starting from 17.2 before 17.2.5, all versions starting from 17.3 before 17.3.2 will disclose user password from repository mirror configuration.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N</code></a>, 4.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5435">CVE-2024-5435</a>.</p>
<p>Thanks <a href="https://hackerone.com/gudanggaramfilter">gudanggaramfilter</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="commit-information-visible-through-release-atom-endpoint-for-guest-users">Commit information visible through release atom endpoint for guest users</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting with 17.0 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2. An attacker as a guest user was able to access commit information via the release Atom endpoint, contrary to permissions.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6389">CVE-2024-6389</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="dependency-proxy-credentials-are-logged-in-plaintext-in-graphql-logs">Dependency Proxy Credentials are Logged in Plaintext in graphql Logs</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, where dependency proxy credentials are retained in graphql Logs.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code></a>, 4.0).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4472">CVE-2024-4472</a>.</p>
<p>Thanks <a href="https://hackerone.com/ac7n0w">ac7n0w</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="user-application-can-spoof-the-redirect-url">User Application can spoof the redirect url</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.1 to 17.1.7, 17.2 prior to 17.2.5 and 17.3 prior to 17.3.2. A crafted URL could be used to trick a victim to trust an attacker controlled application.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code></a>, 3.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6446">CVE-2024-6446</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="group-developers-can-view-group-runners-information">Group Developers can view group runners information</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.1.7, 17.2 prior to 17.2.5, and 17.3 prior to 17.3.2,  where group runners information was disclosed to unauthorised group members.
This is a low severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code></a>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6685">CVE-2024-6685</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1732">17.3.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/2012">UBI: Backport openssl gem pin to 17-3-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163188">Backport &ldquo;Disable allow_failure for release-environments pipeline&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163437">Fix issue when resizing images in RTE</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163809">Backport fix for listing projects via API</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164228">Backport lock retries timeout for sliding list strategy to <code>17-3</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164748">backport archived filter regression bugfix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164791">Ensure to update updated_at when updating access data</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164894">Backport OpenSSL v3 callout to 17.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165464">Quarantine pypi package registry spec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164830">Fix Sidekiq crashing when GITLAB_LOG_LEVEL set to debug</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165343">[17.3 Backport] Bump OpenSSL to 3.2.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165279">Backport 17.3 - Remove elasticsearch call on init</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7890">Downgrade OpenSSL version to 1.1.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7895">[17.3 Backport] Deprecate CentOS 7</a></li>
</ul>
<h3 id="1725">17.2.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163189">Backport &ldquo;Disable allow_failure for release-environments pipeline&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163421">Always build assets image when tagging</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162466">Update google-cloud-core and google-cloud-env gems</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162937">Backport to 17.2: Fixes Geo Replication Details incorrectly empty</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164893">Backport OpenSSL v3 callout to 17.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164561">Backport to 17.2: Fix JobArtifactState query timeout</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7874">CI: Add test basic package functionality before release (17.2 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7876">Use latest builder images for check-packages pipeline (17.2 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7896">[17.2 Backport] Deprecate CentOS 7</a></li>
</ul>
<h3 id="1717">17.1.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163191">Backport &ldquo;Disable allow_failure for release-environments pipeline&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162939">Backport to 17.1: Fixes Geo Replication Details view</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/164892">Backport OpenSSL v3 callout to 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/165270">Backport to 17.1: Fix JobArtifactState query timeout</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7875">CI: Add test basic package functionality before release (17.1 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7877">Use latest builder images for check-packages pipeline (17.1 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7897">[17.1 Backport] Deprecate CentOS 7</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.11.9</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-11-9-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-11-9-released/</id><published>2024-09-11T00:00:00Z</published><updated>2024-09-11T00:00:00Z</updated><author><name>Ahmad Tolba</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 11, 2024, we released versions 16.11.9 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="16119">16.11.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7207">repository: Add empty vote in ApplyGitattributes</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7881">CI: Add test basic package functionality before release (16.11 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7879">Use latest builder images for check-packages pipeline (16.11 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/469443">Private dotenv artifacts not accessible to downstream jobs</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.3.1, 17.2.4, 17.1.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-3-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-3-1-released/</id><published>2024-08-21T00:00:00Z</published><updated>2024-08-21T00:00:00Z</updated><author><name>Ameya Darshan</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 21, 2024, we released versions 17.3.1, 17.2.4, 17.1.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-1-released/#the-gitlab-web-interface-does-not-guarantee-information-integrity-when-downloading-source-code-from-releases">The GitLab Web Interface Does Not Guarantee Information Integrity When Downloading Source Code from Releases.</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-1-released/#denial-of-service-by-importing-maliciously-crafted-github-repository">Denial of Service by importing maliciously crafted GitHub repository</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-1-released/#prompt-injection-in-resolve-vulnerabilty-results-in-arbitrary-command-execution-in-victims-pipeline">Prompt injection in &ldquo;Resolve Vulnerabilty&rdquo; results in arbitrary command execution in victim&rsquo;s pipeline</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-3-1-released/#an-unauthorized-user-can-perform-certain-actions-through-graphql-after-a-group-owner-enables-ip-restrictions">An unauthorized user can perform certain actions through GraphQL after a group owner enables IP restrictions</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="the-gitlab-web-interface-does-not-guarantee-information-integrity-when-downloading-source-code-from-releases">The GitLab Web Interface Does Not Guarantee Information Integrity When Downloading Source Code from Releases.</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 8.2 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, which allows an attacker to create a branch with the same name as a deleted tag.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N</code></a>, 5.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6502">CVE-2024-6502</a>.</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-by-importing-maliciously-crafted-github-repository">Denial of Service by importing maliciously crafted GitHub repository</h3>
<p>A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions prior to 17.1.6, 17.2 prior to 17.2.4, and 17.3 prior to 17.3.1. A denial of service could occur upon importing a maliciously crafted repository using the GitHub importer.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8041">CVE-2024-8041</a>.</p>
<p>Thanks <a href="https://hackerone.com/a92847865">a92847865</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="prompt-injection-in-resolve-vulnerabilty-results-in-arbitrary-command-execution-in-victims-pipeline">Prompt injection in &ldquo;Resolve Vulnerabilty&rdquo; results in arbitrary command execution in victim&rsquo;s pipeline</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.1.6 starting from 17.2 prior to 17.2.4, and starting from 17.3 prior to 17.3.1, allows an attacker to execute arbitrary command in a victim&rsquo;s pipeline through prompt injection.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code></a>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7110">CVE-2024-7110</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/dappelt">Dennis Appelt</a>.</p>
<h3 id="an-unauthorized-user-can-perform-certain-actions-through-graphql-after-a-group-owner-enables-ip-restrictions">An unauthorized user can perform certain actions through GraphQL after a group owner enables IP restrictions</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 12.5 before 17.1.6, all versions starting from 17.2 before 17.2.4, all versions starting from 17.3 before 17.3.1. Under certain conditions it may be possible to bypass the IP restriction for groups through GraphQL allowing unauthorized users to perform some actions at the group level.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3127">CVE-2024-3127</a>.</p>
<p>Thanks <a href="https://hackerone.com/0x777">0x777</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="mattermost-security-updates-july-2-2024">Mattermost Security Updates July 2, 2024</h3>
<p>Mattermost has been updated to versions 9.9.0, which contains several patches and security fixes.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1731">17.3.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162860">Fix timeout when checking group dependencies (17.3 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162869">Resolve &ldquo;Background migrations removed issues&rdquo; (backport to 17.3)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162798">Backport to 17.3: Fixes Geo Replication Details incorrectly empty</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162829">17.3 Backport vulnerability migration bugfix</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7852">Add debian 10 (Buster) to deprecated OS list</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7868">Raise default PostgreSQL shared buffers minimum to 256 MB</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162931">Include language server version in code suggestions</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162968">Turn NotFound from Gitaly into 404 for InfoRefs</a></li>
</ul>
<h3 id="1724">17.2.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161900">Backport 17.2: Build assets image when running release environments</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161129">Backport DORA DF score recalculation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162292">Backport 17.2 - Do not run release-environments on tagging</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162311">Remove stong_memoization for cloud connector services</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161773">Check if columns exist before running credit card hashing background migration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162491">Merge branch &lsquo;jennykim/remove-release-environment-canonical-pipeline&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162523">Fix empty dependency list page</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162544">Backport 17-2: handle empty repository.ff_merge</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162868">17.2 backport for: Resolve &ldquo;Background migrations removed in 17.1 cause upgrade issues&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162935">Include language server version in code suggestions</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162969">Turn NotFound from Gitaly into 404 for InfoRefs)</a></li>
</ul>
<h3 id="1716">17.1.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161489">Backport 17.1: Release Environments - pipeline level resource group</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161901">Backport 17.1: Build assets image when running release environments</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162293">Backport 17.1 - Do not run release-environments on tagging</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162001">Fix backport gitlab-qa shm fix to 17.1 stable branch version</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162492">Backport canonical RE downstream pipeline removal</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162771">Update minimum Go version requirement for self-compiled (17.1)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162542">Backport 17-1: handle empty repository.ff_merge</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162865">Resolve &ldquo;Background migrations removed issues&rdquo; (backport to 17.1)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/163169">Fix: backport !157455 to 17-1-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/162936">Include language server version in code suggestions</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<p>Note: GitLab releases have skipped 17.2.3 and 17.1.5 . There are no patches with these version numbers.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.2.2, 17.1.4, 17.0.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-2-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-2-2-released/</id><published>2024-08-07T00:00:00Z</published><updated>2024-08-07T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 7, 2024, we released versions 17.2.2, 17.1.4, 17.0.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#privilege-escalation-via-lfs-tokens-granting-unrestricted-repository-access">Privilege Escalation via LFS Tokens Granting Unrestricted Repository Access</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#cross-project-access-of-security-policy-bot">Cross project access of Security policy bot</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#advanced-search-redos-in-highlight-for-code-results">Advanced search ReDOS in highlight for code results</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#denial-of-service-via-banzai-pipeline">Denial of Service via banzai pipeline</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#denial-of-service-using-adoc-files">Denial of service using adoc files</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#redos-in-refmatcher-when-matching-branch-names-using-wildcards">ReDoS in RefMatcher when matching branch names using wildcards</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#path-encoding-can-cause-the-web-interface-to-not-render-diffs-correctly">Path encoding can cause the Web interface to not render diffs correctly.</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#xss-while-viewing-raw-xhtml-files-through-api">XSS while viewing raw XHTML files through API</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#ambiguous-tag-name-exploitation">Ambiguous tag name exploitation</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#logs-disclosings-potentially-sensitive-data-in-query-params">Logs disclosings potentially sensitive data in query params</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#password-bypass-on-approvals-using-policy-projects">Password bypass on approvals using policy projects</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#redos-when-parsing-git-push">ReDoS when parsing git push</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-2-released/#webhook-deletion-audit-log-can-preserve-auth-credentials">Webhook deletion audit log can preserve auth credentials</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="privilege-escalation-via-lfs-tokens-granting-unrestricted-repository-access">Privilege Escalation via LFS Tokens Granting Unrestricted Repository Access</h3>
<p>A permission check vulnerability in GitLab CE/EE affecting all versions starting from 8.12 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2  allowed for LFS tokens to read and write to the user owned repositories.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N</code></a>, 6.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3035">CVE-2024-3035</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="cross-project-access-of-security-policy-bot">Cross project access of Security policy bot</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, which allowed cross project access for Security policy bot.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N </code></a>, 4.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6356">CVE-2024-6356</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="advanced-search-redos-in-highlight-for-code-results">Advanced search ReDOS in highlight for code results</h3>
<p>A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 15.9 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause catastrophic backtracking while parsing results from Elasticsearch.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
We have requested a CVE ID and will update this blog post when it is assigned.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/terrichu">Terri Chu</a>.</p>
<h3 id="denial-of-service-via-banzai-pipeline">Denial of Service via banzai pipeline</h3>
<p>Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2 which allowed an attacker to cause resource exhaustion via banzai pipeline.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5423">CVE-2024-5423</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-using-adoc-files">Denial of service using adoc files</h3>
<p>A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions starting with 12.6 before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. It is possible for an attacker to cause a denial of service using crafted adoc files.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4210">CVE-2024-4210</a>.</p>
<p>Thanks <a href="https://hackerone.com/gudanggaramfilter">gudanggaramfilter</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-in-refmatcher-when-matching-branch-names-using-wildcards">ReDoS in RefMatcher when matching branch names using wildcards</h3>
<p>ReDoS flaw in RefMatcher when matching branch names using wildcards in GitLab EE/CE affecting all versions from 11.3 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2 allows denial of service via Regex backtracking.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code></a>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2800">CVE-2024-2800</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="path-encoding-can-cause-the-web-interface-to-not-render-diffs-correctly">Path encoding can cause the Web interface to not render diffs correctly.</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 8.16 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, which causes the web interface to fail to render the diff correctly when the path is encoded.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N</code></a>, 5.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6329">CVE-2024-6329</a>.</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="xss-while-viewing-raw-xhtml-files-through-api">XSS while viewing raw XHTML files through API</h3>
<p>A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 prior 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N </code></a>, 4.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4207">CVE-2024-4207</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ambiguous-tag-name-exploitation">Ambiguous tag name exploitation</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2. An issue was found that allows someone  to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</code></a>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3958">CVE-2024-3958</a>.</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="logs-disclosings-potentially-sensitive-data-in-query-params">Logs disclosings potentially sensitive data in query params</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.9 before 17.0.6, all versions starting from 17.1 before 17.1.4, all versions starting from 17.2 before 17.2.2. Under certain conditions, access tokens may have been logged when an API request was made in a specific manner.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</code></a>, 4.9).
We have requested a CVE ID and will update this blog post when it is assigned.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/dcouture">Dominic Couture</a>.</p>
<h3 id="password-bypass-on-approvals-using-policy-projects">Password bypass on approvals using policy projects</h3>
<p>An issue was discovered in GitLab EE starting from version 16.7 before 17.0.6, version 17.1 before 17.1.4 and 17.2 before 17.2.2 that allowed bypassing the password re-entry requirement to approve a policy.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"><code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N</code></a>, 4.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4784">CVE-2024-4784</a>.</p>
<p>Thanks <a href="https://hackerone.com/vexin">vexin</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-when-parsing-git-push">ReDoS when parsing git push</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 11.10 prior to 17.0.6, 17.1 prior to 17.1.4, and 17.2 prior to 17.2.2, with the processing logic for parsing invalid commits can lead to a regular expression DoS attack on the server.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"><code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code></a>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3114">CVE-2024-3114</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="webhook-deletion-audit-log-can-preserve-auth-credentials">Webhook deletion audit log can preserve auth credentials</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, where webhook deletion audit log preserved auth credentials.
This is a medium severity issue (<a href="https://gitlab-com.gitlab.io/gl-security/product-security/appsec/cvss-calculator/explain#explain=CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N"><code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N</code></a>, 4.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7586">CVE-2024-7586</a>.</p>
<p>This vulnerability was discovered internally by GitLab Team <a href="https://gitlab.com/anton">Anton Smith</a>.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1722">17.2.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1932">Backups: Fix parsing of existing backups in Azure storage (Backport 17.2)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7147">Do not consider pool repos dangling on restore</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160253">Never return nil when search for CC service</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160554">Fix issue in RTE related to adding text before a mention</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160666">Backport &lsquo;Check if params data cannot be JSONified&rsquo; into 17.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160434">Document Rake task to show/edit token expirations</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160678">Backport 17.2 - Introduce lock-free rescheduling for duplicate job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160767">Ignore unknown sequences in sequence fix migration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160744">Fix squished badges rendering in 17.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161081">Optimize CustomAbility specs to reduce build times</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161200">Backport Do not index associated issues that are epic work item type</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160911">bug: Fix template error due to divided by zero</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161241">Put groups_direct field in CI JWT tokens behind feature flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161430">Backport &lsquo;Fix cluster check metrics&rsquo; into 17.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161539">Backport Beyond Identity bug fixes to 17.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161543">Enable <code>project_daily_statistic_counter_attribute_fetch</code> FF by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161488">Backport 17.2: Release Environments - pipeline level resource group</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161386">Add require_personal_access_token_expiry application setting</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab-pages/-/merge_requests/1030">Backport 17.2: Mark Cookie SameSite as default over HTTP</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7814">Pin QA CI tests to stable gitlab-org/gitlab branches</a></li>
</ul>
<h3 id="1714">17.1.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1933">Backups: Fix parsing of existing backups in Azure storage (Backport 17.1)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160679">Backport 17.1 - Introduce lock-free rescheduling for duplicate job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160941">Table driven spec needs shorter spec titles backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161079">Optimize CustomAbility specs to reduce build times</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161242">Put groups_direct field in CI JWT tokens behind feature flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161408">Increase SQL query threashold on work_items test</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160667">Backport &lsquo;Check if params data cannot be JSONified&rsquo; into 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161541">Backport Beyond Identity bug fixes to 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161668">Backport gitlab-qa shm fix to 17.1 stable branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161388">Add require_personal_access_token_expiry application setting</a></li>
</ul>
<h3 id="1706">17.0.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1934">Backups: Fix parsing of existing backups in Azure storage (Backport 17.0)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160815">Backport 17.0 - Introduce lock-free rescheduling for duplicate job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160940">Table driven spec needs shorter spec titles backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161240">Put groups_direct field in CI JWT tokens behind feature flag</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161389">Add require_personal_access_token_expiry application setting</a></li>
</ul>
<h3 id="16118">16.11.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/161391">Add require_personal_access_token_expiry application setting</a></li>
</ul>
<h3 id="add-require_personal_access_token_expiry-application-setting">Add require_personal_access_token_expiry application setting</h3>
<p>This default enabled, optional setting added for admins of GitLab self-managed instances on versions 16.11 and above allow them to enable mandatory expiraton on all new personal, project and group access tokens. Expirations set for existing tokens are not affected by this setting. For usage information see <a href="https://docs.gitlab.com/ee/administration/settings/account_and_limit_settings.html#require-expiration-dates-for-new-access-tokens">Require expiration dates for new access tokens</a></p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.2.1, 17.1.3, 17.0.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-2-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-2-1-released/</id><published>2024-07-24T00:00:00Z</published><updated>2024-07-24T00:00:00Z</updated><author><name>Greg Alfaro</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On July 24, 2024, we released versions 17.2.1, 17.1.3, 17.0.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-1-released/#xss-via-the-maven-dependency-proxy">XSS via the Maven Dependency Proxy</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-1-released/#project-level-analytics-settings-leaked-in-dom">Project level analytics settings leaked in DOM</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-1-released/#reports-can-access-and-download-job-artifacts-despite-use-of-settings-to-prevent-it">Reports can access and download job artifacts despite use of settings to prevent it</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-1-released/#direct-transfer---authorised-projectgroup-exports-are-accessible-to-other-users">Direct Transfer - Authorised project/group exports are accessible to other users</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-1-released/#bypassing-tag-check-and-branch-check-through-imports">Bypassing tag check and branch check through imports</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-2-1-released/#project-importexport---make-projectgroup-export-files-hidden-to-everyone-except-user-who-initiated-it">Project Import/Export - Make project/group export files hidden to everyone except user who initiated it</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="xss-via-the-maven-dependency-proxy">XSS via the Maven Dependency Proxy</h3>
<p>A cross site scripting vulnerability exists in GitLab CE/EE affecting all versions from 16.6 prior to 17.0.5, 17.1 prior to 17.1.3, 17.2 prior to 17.2.1 allowing an attacker to execute arbitrary scripts under the context of the current logged in user.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 7.7)</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">Joern Schneeweisz</a>.</p>
<h3 id="project-level-analytics-settings-leaked-in-dom">Project level analytics settings leaked in DOM</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 16.11 prior to 17.0.5, 17.1 prior to 17.1.3, 17.2 prior to 17.2.1 where certain project-level analytics settings could be leaked in DOM to group members with Developer or higher roles.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N </code>, 4.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5067">CVE-2024-5067</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> and <a href="https://hackerone.com/zebraman">zebraman</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="reports-can-access-and-download-job-artifacts-despite-use-of-settings-to-prevent-it">Reports can access and download job artifacts despite use of settings to prevent it</h3>
<p>An information disclosure vulnerability in GitLab CE/EE affecting all versions starting from 16.7 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where job artifacts can be inappropriately exposed to users lacking the proper authorization level.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7057">CVE-2024-7057</a>.</p>
<p>Thanks <a href="https://hackerone.com/ricardobrito">ricardobrito</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="direct-transfer---authorised-projectgroup-exports-are-accessible-to-other-users">Direct Transfer - Authorised project/group exports are accessible to other users</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 15.6 prior to 17.0.5, starting from 17.1 prior to 17.1.3, and starting from 17.2 prior to 17.2.1 where it was possible to disclose limited information of an exported group or project to another user.</p>
<p>This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N</code>, 4.1 ).</p>
<p>This vulnerability was found internally by a GitLab team member <a href="https://gitlab.com/jnutt">James Nutt</a>.</p>
<h3 id="bypassing-tag-check-and-branch-check-through-imports">Bypassing tag check and branch check through imports</h3>
<p>A resource misdirection vulnerability in GitLab CE/EE affecting all versions 12.0 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1 allows an attacker to craft a repository import in such a way as to misdirect commits.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code>, 2.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0231">CVE-2024-0231</a>.</p>
<p>Thanks <a href="https://hackerone.com/aaron_dewes">aaron_dewes</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="project-importexport---make-projectgroup-export-files-hidden-to-everyone-except-user-who-initiated-it">Project Import/Export - Make project/group export files hidden to everyone except user who initiated it</h3>
<p>An information disclosure vulnerability in GitLab CE/EE in project/group exports affecting all versions from 15.4 prior to 17.0.5, 17.1 prior to 17.1.3, and 17.2 prior to 17.2.1 allows unauthorized users to view the resultant export.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N</code>, 2.6).</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/wortschi">Martin Wortschack</a></p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1721">17.2.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7103">Revert &ldquo;Ensure page token is for the same tree&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159815">Fix order-dependent Elasticsearch spec failure</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159794">Backport to run Release Environments on RC tag into &lsquo;17-2-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159993">Fix state leak in cluster_util_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160006">Ensure rspec helpers call curl with &ndash;fail</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160047">Run e2e:package-and-test-ee for MR targeting stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160129">Remove build-gdk-image, e2e:test-on-gdk, and retag-gdk-image jobs (17.2)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160007">17.2 backport for fix PEP when SEC is available</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160276">bugfix: Only run advanced SAST job when Ultimate license present</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160377">Backport pipeline fixes for 17.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/469443">Private dotenv artifacts not accessible to downstream jobs</a></li>
</ul>
<h3 id="1713">17.1.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1921">Backport mock tag cleanup related fixes</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1904">Multiarch fixes backport (17.1)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158737">Backport release-environments pipeline in security repo to 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158841">Backport [17.1] Fix empty minimum_should_match in query</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159016">Fix wildcard search for package.json in npm upload</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159075">NPM registry: replace the saj parser (17.1 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159701">Fix Content-Disposition header for Azure in API download (17.1 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159817">Fix order-dependent Elasticsearch spec failure</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159795">Backport to run Release Environments on RC tag into &lsquo;17-1-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159995">Fix state leak in cluster_util_spec.rb</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160094">Merge branch &lsquo;sh-curl-fail-ci&rsquo; into &lsquo;master&rsquo; - 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159003">Ignore object pool already exists creation errors 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158509">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159049">Backport add Rake task to show token expiration info</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160128">Remove build-gdk-image, e2e:test-on-gdk, and retag-gdk-image jobs (17.1)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160392">Backport pipeline fixes for 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/469443">Private dotenv artifacts not accessible to downstream jobs</a></li>
</ul>
<h3 id="1705">17.0.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1920">Backport mock tag cleanup related fixes</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1903">Multiarch fixes backport (17.0)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159796">Backport to run Release Environments on RC tag into &lsquo;17-0-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159286">Backport Resolve &ldquo;Geo: JWT token expiration too short&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159019">Ignore object pool already exists creation errors 17.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158907">Fix 500 error using a instance runner registration token</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158511">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158266">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159417">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159054">Backport add Rake task to show token expiration info</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160326">Fix order-dependent custom role definition spec failure</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/160393">Backport pipeline fixes for 17.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/469443">Private dotenv artifacts not accessible to downstream jobs</a></li>
</ul>
<h3 id="16117">16.11.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159287">Backport Resolve &ldquo;Geo: JWT token expiration too short&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159019">Ignore object pool already exists creation errors 17.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157277">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158416">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159418">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159056">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="16109">16.10.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158516">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158414">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159419">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159057">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="16910">16.9.10</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158517">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153470">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159421">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159058">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1689">16.8.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158518">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153469">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159424">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159066">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1679">16.7.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158519">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153468">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159426">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159069">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1669">16.6.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158525">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153466">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159429">Update the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159089">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1659">16.5.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158526">Backport token logging improvements</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153459">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158110">Add the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159093">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1646">16.4.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153458">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158474">Add the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159125">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1638">16.3.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153457">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158475">Add the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159383">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="16210">16.2.10</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153453">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158479">Add the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159401">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1617">16.1.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153448">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158476">Add the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159414">Backport add Rake task to show token expiration info</a></li>
</ul>
<h3 id="1609">16.0.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153435">Drop migration that finalizes migration to add PAT expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158477">Add the token expiration banner</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/159446">Backport add Rake task to show token expiration info</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 17.1.2, 17.0.4, 16.11.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-1-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-1-2-released/</id><published>2024-07-10T00:00:00Z</published><updated>2024-07-10T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On July 10, 2024, we released versions 17.1.2, 17.0.4, 16.11.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com and GitLab Dedicated are already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-2-released/#an-attacker-can-run-pipeline-jobs-as-an-arbitrary-user">An attacker can run pipeline jobs as an arbitrary user</a></td>
          <td>Critical</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-2-released/#developer-user-with-admin_compliance_framework-permission-can-change-group-url">Developer user with <code>admin_compliance_framework</code> permission can change group URL</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-2-released/#admin-push-rules-custom-role-allows-creation-of-project-level-deploy-token">Admin push rules custom role allows creation of project level deploy token</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-2-released/#package-registry-vulnerable-to-manifest-confusion">Package registry vulnerable to manifest confusion</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-2-released/#user-with-admin_group_member-permission-can-ban-group-members">User with <code>admin_group_member</code> permission can ban group members</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-2-released/#subdomain-takeover-in-gitlab-pages">Subdomain takeover in GitLab pages</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="an-attacker-can-run-pipeline-jobs-as-an-arbitrary-user">An attacker can run pipeline jobs as an arbitrary user</h3>
<p>An issue was discovered in GitLab CE/EE affecting versions 15.8 prior to 16.11.6, 17.0 prior to 17.0.4, and 17.1 prior to 17.1.2, which allows an attacker to trigger a pipeline as another user under certain circumstances.
This is a critical severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N</code>, 9.6).
It is now resolved in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6385">CVE-2024-6385</a>.</p>
<p>Thanks to <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="developer-user-with-admin_compliance_framework-permission-can-change-group-url">Developer user with <code>admin_compliance_framework</code> permission can change group URL</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Developer user with <code>admin_compliance_framework</code> custom role may have been able to modify the URL for a group namespace.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</code>, 4.9).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5257">CVE-2024-5257</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="admin-push-rules-custom-role-allows-creation-of-project-level-deploy-token">Admin push rules custom role allows creation of project level deploy token</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 17.0 prior to 17.0.4 and from 17.1 prior to 17.1.2 where a Guest user with <code>admin_push_rules</code> permission may have been able to create project-level deploy tokens.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N</code>, 3.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5470">CVE-2024-5470</a>.</p>
<p>Thanks <a href="https://hackerone.com/indoappsec">indoappsec</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="package-registry-vulnerable-to-manifest-confusion">Package registry vulnerable to manifest confusion</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 11.8 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 where it was possible to upload an NPM package with conflicting package data.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N</code>, 3.0).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6595">CVE-2024-6595</a>.</p>
<p>This vulnerability was found internally by a GitLab team member <a href="https://gitlab.com/ameyadarshan">Ameya Darshan</a>. Thanks to <a href="https://x.com/darcy">Darcy Clarke</a> for their work on <a href="https://blog.vlt.sh/blog/the-massive-hole-in-the-npm-ecosystem">manifest confusion</a>.</p>
<h3 id="user-with-admin_group_member-permission-can-ban-group-members">User with <code>admin_group_member</code> permission can ban group members</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.5 prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2 in which a user with <code>admin_group_member</code> custom role permission could ban group members.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code>, 2.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2880">CVE-2024-2880</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="subdomain-takeover-in-gitlab-pages">Subdomain takeover in GitLab Pages</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions prior to 16.11.6, starting from 17.0 prior to 17.0.4, and starting from 17.1 prior to 17.1.2, which allows a subdomain takeover in GitLab Pages by checking if the domain is enabled every time the custom domain is resolved.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code>, 3.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5528">CVE-2024-5528</a>.</p>
<p>Thanks <a href="https://hackerone.com/fdeleite">fdeleite</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1712">17.1.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/7058">git: Update <code>symlinkPointsToGitDir</code> version check</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157347">Fix MailRoom not loading in Omnibus</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157428">Use static AWS credentials for elasticsearch indexer if set</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157655">ci: For 17-1 Use default Ruby version for MRs targeting stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157430">Remove transaction opening for non-basic search count</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157757">Merge branch &rsquo;echui-gitlab-master-patch-58822&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157312">Update FF version info for graphql_minimal_auth_methods</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157608">Merge branch &lsquo;correct_finalize_epics_backfilling&rsquo; into &lsquo;17-1-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158201">Fix merge unverified changes modal showing incorrectly</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158332">Backport 17.1: Field needs to be called Url</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158452">Backport Release Environments notification pipeline change to 17.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157381">Update dependency slack-messenger to v2.3.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7734">Force ffi gem to use Ruby platform gem</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7744">Fix Redis password handling with reserved characters</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7765">Pin QA CI tests to stable gitlab-org/gitlab branches</a></li>
</ul>
<h3 id="1704">17.0.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158455">Backport Release Environments notification pipeline change to 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158453">Backport Release Environments notification pipeline change to 17.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157383">Update dependency slack-messenger to v2.3.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7764">Pin QA CI tests to stable gitlab-org/gitlab branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7745">Fix Redis password handling with reserved characters</a></li>
</ul>
<h3 id="16116">16.11.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157242">Update versioning info for graphql FF</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157451">Define the Ruby patch version to use in CI jobs in 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158326">For 16.11: Explicitly set Omnibus and CNG Ruby version in CI</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/158459">Backport Release Environments notification pipeline change to 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157385">Update dependency slack-messenger to v2.3.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7763">Pin QA CI tests to stable gitlab-org/gitlab branches</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Patch Release: 17.1.1, 17.0.3, 16.11.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-1-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-1-1-released/</id><published>2024-06-26T00:00:00Z</published><updated>2024-06-26T00:00:00Z</updated><author><name>Nikhil George</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 26, 2024, we released versions 17.1.1, 17.0.3, 16.11.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#run-pipelines-as-any-user">Run pipelines as any user</a></td>
          <td>Critical</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#stored-xss-injected-in-imported-projects-commit-notes">Stored XSS injected in imported project&rsquo;s commit notes</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#csrf-on-graphql-api-introspectionquery">CSRF on GraphQL API <code>IntrospectionQuery</code></a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#remove-search-results-from-public-projects-with-unauthorized-repos">Remove search results from public projects with unauthorized repos</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#cross-window-forgery-in-user-application-oauth-flow">Cross window forgery in user application OAuth flow</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#project-maintainers-can-bypass-groups-merge-request-approval-policy">Project maintainers can bypass group&rsquo;s merge request approval policy</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#redos-via-custom-built-markdown-page">ReDoS via custom built markdown page</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#private-job-artifacts-can-be-accessed-by-any-user">Private job artifacts can be accessed by any user</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#security-fixes-for-banzai-pipeline">Security fixes for banzai pipeline</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#redos-in-dependency-linker">ReDoS in dependency linker</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#denial-of-service-using-a-crafted-openapi-file">Denial of service using a crafted OpenAPI file</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#merge-request-title-disclosure">Merge request title disclosure</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#access-issues-and-epics-without-having-an-sso-session">Access issues and epics without having an SSO session</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-1-1-released/#non-project-member-can-promote-key-results-to-objectives">Non project member can promote key results to objectives</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="run-pipelines-as-any-user">Run pipelines as any user</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which could allow an attacker to trigger a pipeline as another user under certain circumstances. This is a critical severity issue (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N, 9.6). It is now resolved in the latest release and is assigned CVE-2024-5655.</p>
<p>Thanks to <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<p>Breaking changes:</p>
<ol>
<li>This fix changes the MR re-targeting workflow so that a pipeline will not automatically run when a merge request is automatically re-targeted due to its previous target branch being merged. Users will need  to manually start a pipeline to have CI execute for their changes.</li>
<li>GraphQL authentication using CI_JOB_TOKEN is disabled by default from 17.0.0, and back ported to 17.0.3, 16.11.5 in the current patch release. If access to the GraphQL API is required, please configure one of the several supported token types for authentication.</li>
</ol>
<p>At this time, we have not found evidence of abuse of this vulnerability on the platforms managed by GitLab, including GitLab.com and GitLab Dedicated instances.</p>
<h3 id="stored-xss-injected-in-imported-projects-commit-notes">Stored XSS injected in imported project&rsquo;s commit notes</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, where a stored XSS vulnerability could be imported from a project with malicious commit notes.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4901">CVE-2024-4901</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="csrf-on-graphql-api-introspectionquery">CSRF on GraphQL API <code>IntrospectionQuery</code></h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.1.0 before 16.11.5, all versions starting from 17.0 before 17.0.3, all versions starting from 17.1.0 before 17.1.1 which allowed for a CSRF attack on GitLab&rsquo;s GraphQL API leading to the execution of arbitrary GraphQL mutations. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</code>, 8.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4994">CVE-2024-4994</a>.</p>
<p>Thanks <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="remove-search-results-from-public-projects-with-unauthorized-repos">Remove search results from public projects with unauthorized repos</h3>
<p>Improper authorization in global search in GitLab EE affecting all versions from 16.11 prior to 16.11.5 and 17.0 prior to 17.0.3 and 17.1 prior to 17.1.1 allows an attacker leak content of a private repository in a public project. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6323">CVE-2024-6323</a>.</p>
<p>Thanks to GitLab Team Member, <a href="https://gitlab.com/joernchen">@joernchen</a> for reporting this issue.</p>
<h3 id="cross-window-forgery-in-user-application-oauth-flow">Cross window forgery in user application OAuth flow</h3>
<p>A Cross Window Forgery vulnerability exists within GitLab CE/EE affecting all versions from 16.3 prior to 16.11.5, 17.0 prior to 17.0.3, and 17.1 prior to 17.1.1. This condition allows for an attacker to abuse the OAuth authentication flow via a crafted payload. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N</code>, 6.8). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2177">CVE-2024-2177</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="project-maintainers-can-bypass-groups-merge-request-approval-policy">Project maintainers can bypass group&rsquo;s merge request approval policy</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.10 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows a project maintainer can delete the merge request approval policy via graphQL. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N</code>, 6.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5430">CVE-2024-5430</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-via-custom-built-markdown-page">ReDoS via custom built markdown page</h3>
<p>A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions from 7.10 prior before 16.11.5, version 17.0 before 17.0.3, and 17.1 before 17.1.1. It is possible for an attacker to cause a denial of service using a crafted markdown page. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4025">CVE-2024-4025</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="private-job-artifacts-can-be-accessed-by-any-user">Private job artifacts can be accessed by any user</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows private job artifacts can be accessed by any user. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3959">CVE-2024-3959</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="security-fixes-for-banzai-pipeline">Security fixes for banzai pipeline</h3>
<p>Multiple Denial of Service (DoS) issues has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1 which allowed an attacker to cause resource exhaustion via banzai pipeline. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4557">CVE-2024-4557</a>.</p>
<p>Thanks <a href="https://hackerone.com">joaxcar</a> and <a href="https://hackerone.com/setiawan_">setiawan_</a> for reporting these vulnerability through our HackerOne bug bounty program</p>
<h3 id="redos-in-dependency-linker">ReDoS in dependency linker</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular  expression DoS attack on the server. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1493">CVE-2024-1493</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-using-a-crafted-openapi-file">Denial of service using a crafted OpenAPI file</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 12.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows for an attacker to cause a denial of service using a crafted OpenAPI file. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 5.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1816">CVE-2024-1816</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="merge-request-title-disclosure">Merge request title disclosure</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows merge request title to be visible publicly despite being set as project members only. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2191">CVE-2024-2191</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="access-issues-and-epics-without-having-an-sso-session">Access issues and epics without having an SSO session</h3>
<p>An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3115">CVE-2024-3115</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="non-project-member-can-promote-key-results-to-objectives">Non project member can promote key results to objectives</h3>
<p>An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4011">CVE-2024-4011</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1711">17.1.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156799">Prevent cng e2e test from running in security fork</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157027">Only enumerate commits in pre-receive check if push came from Web</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156968">Revert &ldquo;Allow <code>admin_runner</code> ability to change shared runners setting&rdquo;</a></li>
</ul>
<h3 id="1703">17.0.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155704">Fix missing filename when downloading generic package in release page</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156392">Update an expired test certificate</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156424">Prevent starting multiple Capybara proxy servers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156482">Backport 3 commits for Merge Train pipelines support in 17-0-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156635">Fix error when calling GQL ciConfig endpoint with include:component</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155926">Only allow documented token types for GraphQL authentication</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155242">Add a banner informing about token expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/157026">Only enumerate commits in pre-receive check if push came from Web</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7705">Backport QA test fixes for stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7724">Merge branch &lsquo;sh-patch-inspec-gem&rsquo; into &lsquo;master&rsquo;</a></li>
</ul>
<h3 id="16115">16.11.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156425">Prevent starting multiple Capybara proxy servers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156393">Update an expired test certificate</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/156746">Enable invert_emails_disabled_to_emails_enabled by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155925">Only allow documented token types for GraphQL authentication</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155265">Add a banner informing about token expiration</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7704">Backport QA test fixes for stable branches</a></li>
</ul>
<h3 id="16108">16.10.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155266">Add a banner informing about token expiration</a></li>
</ul>
<h3 id="1699">16.9.9</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155267">Add a banner informing about token expiration</a></li>
</ul>
<h3 id="1688">16.8.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155268">Add a banner informing about token expiration</a></li>
</ul>
<h3 id="1678">16.7.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155269">Add a banner informing about token expiration</a></li>
</ul>
<h3 id="1668">16.6.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155270">Add a banner informing about token expiration</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.0.2, 16.11.4, 16.10.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-0-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-0-2-released/</id><published>2024-06-12T00:00:00Z</published><updated>2024-06-12T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 12, 2024, we released versions 17.0.2, 16.11.4, 16.10.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-2-released/#redos-in-gomod-dependency-linker">ReDoS in gomod dependency linker</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-2-released/#redos-in-ci-interpolation-fix-bypass">ReDoS in CI interpolation (fix bypass)</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-2-released/#redos-in-asana-integration-issue-mapping-when-webhook-is-called">ReDoS in Asana integration issue mapping when webhook is called</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-2-released/#xss-and-content-injection-when-viewing-raw-xhtml-files-on-ios-devices">XSS and content injection when viewing raw XHTML files on IOS devices</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-2-released/#missing-agentk-request-validation-could-cause-kas-to-panic">Missing agentk request validation could cause KAS to panic</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="redos-in-gomod-dependency-linker">ReDoS in gomod dependency linker</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.1 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. It was possible for an attacker to cause a denial of service using maliciously crafted file.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1495">CVE-2024-1495</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-in-ci-interpolation-fix-bypass">ReDoS in CI interpolation (fix bypass)</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab&rsquo;s CI/CD pipeline editor could allow for denial of service attacks through maliciously crafted configuration files.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1736">CVE-2024-1736</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-in-asana-integration-issue-mapping-when-webhook-is-called">ReDoS in Asana integration issue mapping when webhook is called</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.4 prior to 16.10.7, starting from 16.11 prior to 16.11.4, and starting from 17.0 prior to 17.0.2. A vulnerability in GitLab&rsquo;s Asana integration allowed an attacker to potentially cause a regular expression denial of service by sending specially crafted requests.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1963">CVE-2024-1963</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="xss-and-content-injection-when-viewing-raw-xhtml-files-on-ios-devices">XSS and content injection when viewing raw XHTML files on iOS devices</h3>
<p>A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 16.10.7, all versions starting from 16.11 before 16.11.4, all versions starting from 17.0 before 17.0.2. When viewing an XML file in a repository in raw mode, it can be made to render as HTML if viewed under specific circumstances.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N</code>, 4.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4201">CVE-2024-4201</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="missing-agentk-request-validation-could-cause-kas-to-panic">Missing agentk request validation could cause KAS to panic</h3>
<p>DoS in KAS in GitLab CE/EE affecting all versions from 16.10.0 prior to 16.10.6 and 16.11.0 prior to 16.11.3 allows an attacker to crash KAS via crafted gRPC requests.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5469">CVE-2024-5469</a>.</p>
<p>This vulnerability has been discovered internally by the Environments team.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1702">17.0.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6996">Makefile: update Git versions (v17.0 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154018">Update VERSION files</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154019">Docs: Backport Dedicated AI updates</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154505">Fix failing specs in 17-0-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154624">Include headers in LfsDownloadObject</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/155385">[17.0] Deprecate support for Ubuntu 18.04</a></li>
</ul>
<h3 id="16114">16.11.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6997">Makefile: update Git versions (v16.11 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153752">Backport &lsquo;run-release-environment-for-tag-commits&rsquo; into 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154041">Dedicated AI updates</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153833">Speed up as-if-foss Rubocop</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154370">Inclusion of headers in LfsDownloadObject for GitHub imports</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154504">Fix failing specs on 16-11-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154838">Stop orphaning pages deployments on Geo secondaries on 16.11</a></li>
</ul>
<h3 id="16107">16.10.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6998">Makefile: update Git versions (v16.10 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153753">Backport &lsquo;run-release-environment-for-tag-commits&rsquo; into 16.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154503">Fix failing specs on 16-10-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/154837">Stop orphaning pages deployments on Geo secondaries on 16.10</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 17.0.1, 16.11.3, 16.10.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-0-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-17-0-1-released/</id><published>2024-05-22T00:00:00Z</published><updated>2024-05-22T00:00:00Z</updated><author><name>Greg Alfaro</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On May 22, 2024, we released versions 17.0.1, 16.11.3, and 16.10.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#1-click-account-takeover-via-xss-leveraging-the-vs-code-editor-web-ide">1-click account takeover via XSS leveraging the VS code editor (Web IDE)</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#a-dos-vulnerability-in-the-description-field-of-the-runner">A DOS vulnerability in the &lsquo;description&rsquo; field of the runner</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#csrf-via-k8s-cluster-integration">CSRF via K8s cluster-integration</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#using-set-pipeline-status-of-a-commit-api-incorrectly-create-a-new-pipeline-when-sha-and-pipeline_id-did-not-match">Using Set Pipeline Status of a Commit API incorrectly create a new pipeline when SHA and pipeline_id did not match</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#redos-on-wiki-render-apipage">Redos on wiki render API/Page</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#resource-exhaustion-and-denial-of-service-with-test_report-api-calls">Resource exhaustion and denial of service with test_report API calls</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-17-0-1-released/#guest-user-can-view-dependency-lists-of-private-projects-through-job-artifacts">Guest user can view dependency lists of private projects through job artifacts</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="1-click-account-takeover-via-xss-leveraging-the-vs-code-editor-web-ide">1-click account takeover via XSS leveraging the VS code editor (Web IDE)</h3>
<p>A XSS condition exists within GitLab in versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1. By leveraging this condition, an attacker can craft a malicious page to exfiltrate sensitive user information.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N</code>, 8.0)
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4835">CVE-2024-4835</a>.</p>
<p>Thanks <a href="https://hackerone.com/matanber">matanber</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="a-dos-vulnerability-in-the-description-field-of-the-runner">A DOS vulnerability in the &lsquo;description&rsquo; field of the runner</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions up to 16.10.6, versions 16.11 up to 16.11.3, and 17.0 up to 17.0.1. A runner registered with a crafted description has the potential to disrupt the loading of targeted GitLab web resources.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2874">CVE-2024-2874</a>.</p>
<p>Thanks <a href="https://hackerone.com/ac7n0w">ac7n0w</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="csrf-via-k8s-cluster-integration">CSRF via K8s cluster-integration</h3>
<p>A CSRF vulnerability exists within GitLab CE/EE from versions 16.3 up to 16.10.6, from 16.11 up to 16.11.3, from 17.0 up to 17.0.1. By leveraging this vulnerability, an attacker could exfiltrate anti-CSRF tokens via the Kubernetes Agent Server (KAS).
This is a medium severity issue (<code>AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code>, 5.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7045">CVE-2023-7045</a>.</p>
<p>Thanks <a href="https://hackerone.com/imrerad">imrerad</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h3 id="using-set-pipeline-status-of-a-commit-api-incorrectly-create-a-new-pipeline-when-sha-and-pipeline_id-did-not-match">Using Set Pipeline Status of a Commit API incorrectly create a new pipeline when SHA and pipeline_id did not match</h3>
<p>An authorization vulnerability exists within GitLab from versions 16.10 up to 16.10.6, 16.11 up to 16.11.3, and 17.0 up to 17.0.1 where an authenticated attacker could utilize a crafted naming convention to bypass pipeline authorization logic.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N</code>, 4.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5258">CVE-2024-5258</a>.</p>
<p>Thanks to GitLab Team Member, Andrew Winata for reporting this issue.</p>
<h3 id="redos-on-wiki-render-apipage">Redos on wiki render API/Page</h3>
<p>A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions before 16.10.6, version 16.11 before 16.11.3, and 17.0 before 17.0.1. It is possible for an attacker to cause a denial of service using a crafted wiki page.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6502">CVE-2023-6502</a>.</p>
<p>Thanks <code>Anonymizer</code> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="resource-exhaustion-and-denial-of-service-with-test_report-api-calls">Resource exhaustion and denial of service with test_report API calls</h3>
<p>A denial of service (DoS) condition was discovered in GitLab CE/EE affecting all versions from 13.2.4 up to 16.10.6, 16.11 up to 16.11.3, and 17.0 up to 17.0.1. By leveraging this vulnerability an attacker could create a DoS condition by sending crafted API calls.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1947">CVE-2024-1947</a>.</p>
<p>Thanks <a href="https://hackerone.com/luryus">luryus</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="guest-user-can-view-dependency-lists-of-private-projects-through-job-artifacts">Guest user can view dependency lists of private projects through job artifacts</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.11 prior to 16.10.6, starting from 16.11 prior to 16.11.3, and starting from 17.0 prior to 17.0.1. A Guest user can view dependency lists of private projects through job artifacts.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5318">CVE-2024-5318</a>.</p>
<p>Thanks <a href="https://hackerone.com/ricardobrito">ricardobrito</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="stored-xss-via-pdfjs">Stored XSS via PDFjs</h3>
<p>Mitigations were made to take care of vulnerability in PDF.js <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367</a>.</p>
<p>Thanks <a href="https://hackerone.com/h4x0r_dz">h4x0r_dz</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="mattermost-security-updates-april-25th-2024">Mattermost Security Updates April 25th, 2024</h3>
<p>Mattermost has been updated to versions 9.7.2, which contains several patches and security fixes.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="1701">17.0.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6922">Makefile: update Git versions (v17.0 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153144">Merge branch &lsquo;rymai-master-patch-5345&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153330">Don&rsquo;t fail so loudly if default work item type is invalid</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/152962">[17.0 backport] Project transfer fix for ES indexing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153304">Ensure BLPOP/BRPOP returns nil instead of raising ReadTimeoutError</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153574">[17-0] Fix Sidekiq migration timeout</a></li>
</ul>
<h3 id="16113">16.11.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6919">Makefile: update Git versions (v16.11 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/152328">Revert removal of bitbucket_server_convert_mentions_to_users FF</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/152915">Cherry pick print-out-release-environment-variables to 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/152891">[16-11] Fix Sidekiq migration timeout</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153146">Merge branch &lsquo;rymai-master-patch-5345&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153302">Ensure BLPOP/BRPOP returns nil instead of raising ReadTimeoutError</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7602">Draft: Update changelog for 16.11.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7586">BACKPORT-16-11-stable: Use bundler to install Omnibus gems</a></li>
</ul>
<h3 id="16106">16.10.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6920">Makefile: update Git versions (v16.10 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/152248">Revert &ldquo;Remove bitbucket_server_convert_mentions_to_users feature flag&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/152916">Cherry pick print-out-release-environment-variables to 16.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153147">Merge branch &lsquo;rymai-master-patch-5345&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/153301">Ensure BLPOP/BRPOP returns nil instead of raising ReadTimeoutError</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7585">BACKPORT-16-10-stable: Use bundler to install Omnibus gems</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.9.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-9-8-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-9-8-released/</id><published>2024-05-09T00:00:00Z</published><updated>2024-05-09T00:00:00Z</updated><author><name>Alessio Caiazza</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On May 9, 2024, we released versions 16.9.8 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="bug-fixes">Bug Fixes</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7593">Pin parser dependency in chef-bin</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.11.2, 16.10.5, 16.9.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-11-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-11-2-released/</id><published>2024-05-08T00:00:00Z</published><updated>2024-05-08T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On May 8, 2024, we released versions 16.11.2, 16.10.5, 16.9.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#redos-in-branch-search-when-using-wildcards">ReDoS in branch search when using wildcards</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#redos-in-markdown-render-pipeline">ReDoS in markdown render pipeline</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#redos-on-discord-integrations">Redos on Discord integrations</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#redos-on-google-chat-integration">Redos on Google Chat Integration</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#denial-of-service-attack--via-pin-menu">Denial of Service Attack via Pin Menu</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#dos-by-filtering-tags-and-branches-via-the-api">DoS by filtering tags and branches via the API</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#mr-approval-via-csrf-in-saml-sso">MR approval via CSRF in SAML SSO</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#banned-user-from-groups-can-read-issues-updates-via-the-api">Banned user from groups can read issues updates via the api</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#require-confirmation-before-linking-jwt-identity">Require confirmation before linking JWT identity</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#view-confidential-issues-title-and-description-of-any-public-project-via-export">View confidential issues title and description of any public project via export</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-2-released/#ssrf-via-github-importer">SSRF via Github importer</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="redos-in-branch-search-when-using-wildcards">ReDoS in branch search when using wildcards</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.7 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible for an attacker to cause a denial of service by crafting unusual search terms for branch names.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2878">CVE-2024-2878</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-in-markdown-render-pipeline">ReDoS in markdown render pipeline</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. It was possible for an attacker to cause a denial of service using maliciously crafted markdown content.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2651">CVE-2024-2651</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-on-discord-integrations">Redos on Discord integrations</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. A problem with the processing logic for Discord Integrations Chat Messages can lead to a regular expression DoS attack on the server.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6682">CVE-2023-6682</a>.</p>
<p>Thanks to <code>Anonymizer</code> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-on-google-chat-integration">Redos on Google Chat Integration</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.11 prior to 16.11.2. A problem with the processing logic for Google Chat Messages integration may lead to a regular expression DoS attack on the server.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6688">CVE-2023-6688</a>.</p>
<p>Thanks to <code>Anonymizer</code> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="denial-of-service-attack-via-pin-menu">Denial of Service Attack via Pin Menu</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. The pins endpoint is susceptible to DoS through a crafted request.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2454">CVE-2024-2454</a>.</p>
<p>Thanks <a href="https://hackerone.com/ac7n0w">ac7n0w</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="dos-by-filtering-tags-and-branches-via-the-api">DoS by filtering tags and branches via the API</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2 where abusing the API to filter branch and tags could lead to Denial of Service.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4539">CVE-2024-4539</a>.</p>
<p>This vulnerability was reported internally by a GitLab team member <a href="https://gitlab.com/vyaklushin">Vasilii Iakliushin</a>.</p>
<h3 id="mr-approval-via-csrf-in-saml-sso">MR approval via CSRF in SAML SSO</h3>
<p>An issue has been discovered in GitLab EE affecting all versions from 16.7 before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. An attacker could force a user with an active SAML session to approve an MR via CSRF.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N</code>, 5.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4597">CVE-2024-4597</a>.</p>
<p>This vulnerability was reported internally by a GitLab team member <a href="https://gitlab.com/joernchen">joernchen</a>.</p>
<h3 id="banned-user-from-groups-can-read-issues-updates-via-the-api">Banned user from groups can read issues updates via the api</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 15.2 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible to disclose updates to issues to a banned group member using the API.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1539">CVE-2024-1539</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="require-confirmation-before-linking-jwt-identity">Require confirmation before linking JWT identity</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2 in which cross-site request forgery may have been possible on GitLab instances configured to use JWT as an OmniAuth provider.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N</code>, 6.4).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1211">CVE-2024-1211</a>.</p>
<p>Thanks <a href="https://hackerone.com/sim4n6">sim4n6</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="view-confidential-issues-title-and-description-of-any-public-project-via-export">View confidential issues title and description of any public project via export</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible to disclose via the UI the confidential issues title and description from a public project to unauthorised instance users.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3976">CVE-2024-3976</a>.</p>
<p>Thanks <a href="https://hackerone.com/ahacker1">ahacker1</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ssrf-via-github-importer">SSRF via Github importer</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N</code>, 2.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6195">CVE-2023-6195</a>.</p>
<p>Thanks <a href="https://hackerone.com/imrerad">imrerad</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="16112">16.11.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6888">ci: Remove license scanning job (16.11)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150488">Backport &lsquo;Zoekt: Fix exact search mode&rsquo; into 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150600">Return or display Gitlab version if GITLAB_KAS_VERSION is a SHA</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151040">Allow self-managed instances to require licensed seats for Duo Chat</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151533">Merge branch &lsquo;release-environment-notification&rsquo; into &lsquo;16-11-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151526">Changed the email validation for only encoded chars</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151547">Backport &lsquo;hide archived filter in search when project selected&rsquo; 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151884">Cherry-pick MR 151750 into &lsquo;16-11-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7571">Fix reconfigure failure if Redis node has Rails Sentinel config</a></li>
</ul>
<h3 id="16105">16.10.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6887">ci: Remove license scanning job (16.10)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6890">Upgrade gRPC to v1.62.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150602">Return or display Gitlab version if GITLAB_KAS_VERSION is a SHA</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151535">Merge branch &lsquo;release-environment-notification&rsquo; into &lsquo;16-10-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151529">Changed the email validation for only encoded chars</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151904">Cherry-pick MR 151750 into &lsquo;16-10-stable-ee&rsquo;</a></li>
</ul>
<h3 id="1697">16.9.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6886">ci: Remove license scanning job (16.9)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150605">Return or display Gitlab version if GITLAB_KAS_VERSION is a SHA</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151539">Merge branch &lsquo;release-environment-notification&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151530">Changed the email validation for only encoded chars</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/151908">Cherry-pick MR 151750 into &lsquo;16-9-stable-ee&rsquo;</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.11.1, 16.10.4, 16.9.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-11-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-11-1-released/</id><published>2024-04-24T00:00:00Z</published><updated>2024-04-24T00:00:00Z</updated><author><name>Costel Maxim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 24, 2024, we released versions 16.11.1, 16.10.4, 16.9.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h4 id="accidental-breaking-changes-in-kas-configuration">Accidental breaking changes in KAS configuration</h4>
<p>The following KAS patch releases contain breaking changes from the %17.0 revision, because they were tagged from the wrong source (master instead of stable branches):</p>
<ul>
<li>v16.11.1</li>
<li>v16.10.4</li>
<li>v16.9.6</li>
</ul>
<p>The next GitLab patch release will fix those changes. <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/458462">Issue 458462</a> provides more information.</p>
<p>As a workaround KAS can be downgraded to the last release. Working KAS versions are:</p>
<ul>
<li>v16.11.0</li>
<li>v16.10.1</li>
<li>v16.9.3</li>
</ul>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-1-released/#gitlab-account-takeover-under-certain-conditions-when-using-bitbucket-as-an-oauth-provider">GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-1-released/#path-traversal-leads-to-dos-and-restricted-file-read">Path Traversal leads to DoS and Restricted File Read</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-1-released/#unauthenticated-redos-in-filefinder-when-using-wildcard-filters-in-project-file-search">Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-1-released/#personal-access-token-scopes-not-honoured-by-graphql-subscriptions">Personal Access Token scopes not honoured by GraphQL subscriptions</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-11-1-released/#domain-based-restrictions-bypass-using-a-crafted-email-address">Domain based restrictions bypass using a crafted email address</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="gitlab-account-takeover-under-certain-conditions-when-using-bitbucket-as-an-oauth-provider">GitLab account takeover, under certain conditions, when using Bitbucket as an OAuth provider</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.8 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker with their Bitbucket account credentials may be able to take over a GitLab account linked to another user&rsquo;s Bitbucket account, if Bitbucket is used as an OAuth 2.0 provider on GitLab.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N</code>, 7.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4024">CVE-2024-4024</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team members <a href="https://gitlab.com/SamWord">Sam Word</a> and <a href="https://gitlab.com/rodrigo.tomonari">Rodrigo Tomonari</a>.</p>
<p>On 2024-04-24, GitLab changed the way Bitbucket authentication works with GitLab. To continue using Bitbucket Authentication, please sign in to GitLab with your Bitbucket account credentials, before 2024-05-16.</p>
<p>If you do not sign into GitLab using your Bitbucket account until after 2024-05-16, you will need to <a href="https://docs.gitlab.com/ee/user/profile/#sign-in-services">re-link your Bitbucket account</a> to your GitLab account manually. For some users, signing in to GitLab using their Bitbucket account may not work after this fix is applied. If this happens to you, your Bitbucket and GitLab accounts have different email addresses. To resolve this, you must log in to your GitLab account with your GitLab username and password and <a href="https://docs.gitlab.com/ee/user/profile/#sign-in-services">re-link your Bitbucket account</a>.</p>
<h3 id="path-traversal-leads-to-dos-and-restricted-file-read">Path Traversal leads to DoS and Restricted File Read</h3>
<p>An issue has been discovered in GitLab affecting all versions of GitLab CE/EE  16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H</code>, 8.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2434">CVE-2024-2434</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthenticated-redos-in-filefinder-when-using-wildcard-filters-in-project-file-search">Unauthenticated ReDoS in FileFinder when using wildcard filters in project file search</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2829">CVE-2024-2829</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="personal-access-token-scopes-not-honoured-by-graphql-subscriptions">Personal Access Token scopes not honoured by GraphQL subscriptions</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1 where personal access scopes were not honored by GraphQL subscriptions.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4006">CVE-2024-4006</a>.</p>
<p>This vulnerability was internally discovered and reported by a GitLab team member, <a href="https://gitlab.com/DylanGriffith">Dylan Griffith</a>.</p>
<h3 id="domain-based-restrictions-bypass-using-a-crafted-email-address">Domain based restrictions bypass using a crafted email address</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1347">CVE-2024-1347</a>.</p>
<p>Thanks <a href="https://hackerone.com/garethheyes">garethheyes</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="16111">16.11.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150027">Backport fixing release environment pipeline triggering rule to 16.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7556">Fix for missing branch_build_package_download_url</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7559">Fix missing arguments when PostgreSQL upgrade times out</a></li>
</ul>
<h3 id="16104">16.10.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6825">go.mod: Update <code>golang.org/x/net</code> dependency</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/149253">Update vulnerability_reads scanner in the ingestion pipeline</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/149810">Fix migration error when updating from GitLab 16.x to 16.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150029">Backport fixing release environment pipeline triggering rule to 16.10</a></li>
</ul>
<h3 id="1696">16.9.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/150030">Backport fixing release environment pipeline triggering rule to 16.9</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.10.3, 16.9.5, 16.8.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-3-released/</id><published>2024-04-15T00:00:00Z</published><updated>2024-04-15T00:00:00Z</updated><author><name>Jenny Kim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 15, 2024, we released versions 16.10.3, 16.9.5, 16.8.7 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs. This patch release does not include any security fixes.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="16103">16.10.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7538">Fix patroni no longer working with update to ydiff 1.3</a></li>
</ul>
<h3 id="1695">16.9.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6811">Update Go packages to address vulnerabilities in 16-9-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6807">Make Gitaly no downtime upgrades work again in 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7537">Fix patroni no longer working with update to ydiff 1.3</a></li>
</ul>
<h3 id="1687">16.8.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7536">Fix patroni no longer working with update to ydiff 1.3</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.10.2, 16.9.4, 16.8.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-2-released/</id><published>2024-04-10T00:00:00Z</published><updated>2024-04-10T00:00:00Z</updated><author><name>Greg Alfaro</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On April 10, 2024, we released versions 16.10.2, 16.9.4, 16.8.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important bug and security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for vulnerabilities in dedicated patch releases. There are two types of patch releases:
scheduled releases, and ad-hoc critical patches for high-severity vulnerabilities. Scheduled releases are released twice a month on the second and fourth Wednesdays.
For more information, you can visit our <a href="https://handbook.gitlab.com/handbook/engineering/releases/">releases handbook</a> and <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of GitLab release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.</p>
<p>For security fixes, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest patch release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="security-fixes">Security fixes</h2>
<h3 id="table-of-security-fixes">Table of security fixes</h3>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-2-released/#stored-xss-injected-in-diff-viewer">Stored XSS injected in diff viewer</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-2-released/#stored-xss-via-autocomplete-results">Stored XSS via autocomplete results</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-2-released/#redos-on-integrations-chat-messages">Redos on Integrations Chat Messages</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-2-released/#redos-during-parse-junit-test-report">Redos During Parse Junit Test Report</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="stored-xss-injected-in-diff-viewer">Stored XSS injected in diff viewer</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. A payload may lead to a stored XSS while using the diff viewer, allowing attackers to perform arbitrary actions on behalf of victims.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3092">CVE-2024-3092</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="stored-xss-via-autocomplete-results">Stored XSS via autocomplete results</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 to 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. Using the autocomplete for issues references feature, a crafted payload may lead to a stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2279">CVE-2024-2279</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-on-integrations-chat-messages">Redos on Integrations Chat Messages</h3>
<p>A denial of service vulnerability was identified in GitLab CE/EE, versions 16.7.7 prior to 16.8.6, 16.9 prior to 16.9.4 and 16.10 prior to 16.10.2 which allows an attacker to spike the GitLab instance resources usage resulting in service degradation via chat integration feature.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6489">CVE-2023-6489</a>.</p>
<p>Thanks <code>Anonymizer</code> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-during-parse-junit-test-report">Redos During Parse Junit Test Report</h3>
<p>An issue has been discovered in GitLab EE affecting all versions before 16.8.6, all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. It was possible for an attacker to cause a  denial of service using malicious crafted content in a junit test report file.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6678">CVE-2023-6678</a>.</p>
<p>Thanks <code>Anonymizer</code> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bug-fixes">Bug fixes</h2>
<h3 id="16102">16.10.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147975">Quarantine flaky atomic processing ResetSkippedJobsService specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148103">Fix include_optional_metrics_in_service_ping during migration to 16.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148227">Use alpine:latest instead of alpine:edge in CI images [16.10]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147937">[16.10] Backport Delete callback should use namespace_id</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148417">[16.10] Backport handle null owner when indexing projects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147942">Backport Zoekt: Retry indexing if too many requests to 16.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148687">Backport https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148596</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148663">Fix URL validator for mirror services when using localhost</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148571">Backport !148105 into 16.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7503">Cherry-pick &lsquo;fix-omnibus-gitconfig-deprecation&rsquo; into &lsquo;16-10-stable&rsquo;</a></li>
</ul>
<h3 id="1694">16.9.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147985">Quarantine flaky atomic processing ResetSkippedJobsService specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148229">Use alpine:latest instead of alpine:edge in CI images [16.9]</a></li>
</ul>
<h3 id="1686">16.8.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147986">Quarantine flaky atomic processing ResetSkippedJobsService specs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/148231">Use alpine:latest instead of alpine:edge in CI images [16.8]</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-patch-notifications">Receive Patch Notifications</h2>
<p>To receive patch blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">patch release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.10.1, 16.9.3, 16.8.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-10-1-released/</id><published>2024-03-27T00:00:00Z</published><updated>2024-03-27T00:00:00Z</updated><author><name>Kevin Morrison</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On March 27, 2024, we released versions 16.10.1, 16.9.3, 16.8.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-1-released/#stored-xss-injected-in-wiki-page-via-banzai-pipeline">Stored-XSS injected in Wiki page via Banzai pipeline</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-10-1-released/#dos-using-crafted-emojis">DOS using crafted emojis</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="stored-xss-injected-in-wiki-page-via-banzai-pipeline">Stored-XSS injected in Wiki page via Banzai pipeline</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 16.8.5, all versions starting from 16.9 before 16.9.3, all versions starting from 16.10 before 16.10.1. A wiki page with a crafted payload may lead to a Stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6371">CVE-2023-6371</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="dos-using-crafted-emojis">DOS using crafted emojis</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 16.8.5, all versions starting from 16.9 before 16.9.3, all versions starting from 16.10 before 16.10.1. It was possible for an attacker to cause a denial of service using malicious crafted description parameter for labels.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2818">CVE-2024-2818</a>.</p>
<p>Thanks Quintin Crist of Trend Micro for reporting this vulnerability to us.</p>
<h3 id="bump-postgresql-to-1314-1411">Bump PostgreSQL to 13.14, 14.11</h3>
<p>The PostgreSQL project released an update so we are updating to versions 13.14 and 14.11.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="16101">16.10.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1767">CI: bump CI_TOOLS_VERSIONS to 5.8.0 (Backport 16.10)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6778">Backport protobuf and pgx upgrades [16.10]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147552">Fix new project group templates pagination (16-10-stable-ee)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147704">Update redis-client to v0.21.1</a></li>
</ul>
<h3 id="1693">16.9.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1768">CI: bump CI_TOOLS_VERSIONS to 5.8.0 (Backport 16.9)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6780">Backport protobuf and pgx upgrades [16.9]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146777">Fix detect-tests CI job</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146820">Collect the artifacts from the same namespace</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/147554">Fix new project group templates pagination (16-9-stable-ee)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7471">Backport: RSpec changes for .com handling nightly packages</a></li>
</ul>
<h3 id="1685">16.8.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1769">CI: bump CI_TOOLS_VERSIONS to 5.8.0 (Backport 16.8)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146774">Fix detect-tests CI job</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7472">Backport: RSpec changes for .com handling nightly packages</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7479">Backport c2a94ae8 for creating stable tag for 16-8-stable</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<h2 id="were-combining-patch-and-security-releases">We’re combining patch and security releases</h2>
<p>This improvement in our release process matches the industry standard and will help GitLab users get information about security and
bug fixes sooner, <a href="https://about.gitlab.com/blog/were-combining-patch-and-security-releases/">read the blog post here</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.9.2, 16.8.4, 16.7.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-9-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-9-2-released/</id><published>2024-03-06T00:00:00Z</published><updated>2024-03-06T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On March 6, 2024, we released versions 16.9.2, 16.8.4, 16.7.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-2-released/#bypassing-codeowners-approval-allowing-to-steal-protected-variables">Bypassing CODEOWNERS approval allowing to steal protected variables</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-2-released/#guest-with-manage-group-access-tokens-can-rotate-and-see-group-access-token-with-owner-permissions">Guest with manage group access tokens can rotate and see group access token with owner permissions</a></td>
          <td>Medium</td>
      </tr>
  </tbody>
</table>
<h3 id="bypassing-codeowners-approval-allowing-to-steal-protected-variables">Bypassing CODEOWNERS approval allowing to steal protected variables</h3>
<p>An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload in an old feature branch to perform malicious actions.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 7.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0199">CVE-2024-0199</a>.</p>
<p>Thanks <a href="https://hackerone.com/ali_shehab">ali_shehab</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="guest-with-manage-group-access-tokens-can-rotate-and-see-group-access-token-with-owner-permissions">Guest with manage group access tokens can rotate and see group access token with owner permissions</h3>
<p>A privilege escalation vulnerability was discovered in GitLab affecting versions 16.8 prior to 16.8.4 and 16.9 prior to 16.9.2. It was possible for a user with custom role of <code>manage_group_access_tokens</code> to rotate group access tokens with owner privileges.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</code>, 6.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1299">CVE-2024-1299</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="upgrade-kubectl-to-the-latest-stable-version">Upgrade Kubectl to the latest stable version</h3>
<p><code>kubectl</code> has been updated to version 1.29.2.</p>
<h3 id="mattermost-security-updates-february-14-2024">Mattermost Security Updates February 14, 2024</h3>
<p>Mattermost has been updated to version 9.5, which contains several patches and security fixes.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="1692">16.9.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146113">Merge branch &lsquo;hm-rescue-stale-element-error-in-base&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146033">Fix broken master</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146202">Use fixed date for failing specs [16.9]</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146031">Backport &lsquo;pb-fix-broken-master-elastic&rsquo; into 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/145946">Backport Fix Search::Zoekt.index? logic to 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146036">Backport &lsquo;Don&rsquo;t escape search term in modal twice&rsquo; into 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146315">Backport &lsquo;add-praefect-to-release-environment-template&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146035">Backport &lsquo;Shows branch name in non-blob&hellip;scopes&rsquo;  into 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146181">Backport: Geo - Fix container repositories checksum mismatch errors</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146074">Backport 145801 (Fix CI linter error when repository is empty) to 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7444">Merge branch &lsquo;remove-pi-os-12-release&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/145036">Backport to 16.9: Fix Geo: Personal snippets not syncing</a></li>
</ul>
<h3 id="1684">16.8.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/145037">Backport to 16.8: Fix Geo: Personal snippets not syncing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/145451">Backport to 16.8: Fix pg_dump failing with multiple PG read-replicas</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146233">Update tests for broken 16.8</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146316">Backport &lsquo;add-praefect-to-release-environment-template&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146183">Backport: Geo - Fix container repositories checksum mismatch errors</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146073">Backport 145801 (Fix CI linter error when repository is empty) to 16.8</a></li>
</ul>
<h3 id="1677">16.7.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/145569">Backport to 16.7: Fix pg_dump failing with multiple PG read-replicas</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/146318">Merge branch &lsquo;add-praefect-to-release-environment-template&rsquo;</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update GitLab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.9.1, 16.8.3, 16.7.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-9-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-9-1-released/</id><published>2024-02-21T00:00:00Z</published><updated>2024-02-21T00:00:00Z</updated><author><name>Nikhil George</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On February 21, 2024, we released versions 16.9.1, 16.8.3, 16.7.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#stored-xss-in-users-profile-page">Stored-XSS in user&rsquo;s profile page</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#user-with-admin_group_members-permission-can-invite-other-groups-to-gain-owner-access">User with &ldquo;admin_group_members&rdquo; permission can invite other groups to gain owner access</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#redos-issue-in-the-codeowners-reference-extractor">ReDoS issue in the Codeowners reference extractor</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#ldap-user-can-reset-password-using-secondary-email-and-login-using-direct-authentication">LDAP user can reset password using secondary email and login using direct authentication</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#bypassing-group-ip-restriction-settings-to-access-environment-details-of-projects-through-environmentsoperations-dashboard">Bypassing group ip restriction settings to access environment details of projects through Environments/Operations Dashboard</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#users-with-the-guest-role-can-change-custom-dashboard-projects-settings-for-projects-in-the-victim-group">Users with the <code>Guest</code> role can change <code>Custom dashboard projects</code> settings for projects in the victim group</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#group-member-with-sub-maintainer-role-can-change-title-of-shared-private-deploy-keys">Group member with sub-maintainer role can change title of shared private deploy keys</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-9-1-released/#bypassing-approvals-of-codeowners">Bypassing approvals of CODEOWNERS</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="stored-xss-in-users-profile-page">Stored-XSS in user&rsquo;s profile page</h3>
<p>An issue has been discovered in GitLab CE/EE affecting version 16.9 only. A crafted payload added to the user profile page could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1451">CVE-2024-1451</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="user-with-admin_group_members-permission-can-invite-other-groups-to-gain-owner-access">User with &ldquo;admin_group_members&rdquo; permission can invite other groups to gain owner access</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. When a user is assigned a custom role with admin_group_member permission, they may be able to make a group, other members or themselves Owners of that group, which may lead to privilege escalation. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L</code>, 6.7). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6477">CVE-2023-6477</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="redos-issue-in-the-codeowners-reference-extractor">ReDoS issue in the Codeowners reference extractor</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 11.3 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted content in the CODEOWNERS file.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6736">CVE-2023-6736</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="ldap-user-can-reset-password-using-secondary-email-and-login-using-direct-authentication">LDAP user can reset password using secondary email and login using direct authentication</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.7.2, all versions starting from 16.8 before 16.8.2, all versions starting from 16.9 before 16.9.2. Under some specialized conditions, an LDAP user may be able to reset their password using their verified secondary email address and sign-in using direct authentication with the reset password, bypassing LDAP. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</code>, 5.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1525">CVE-2024-1525</a>.</p>
<p>This vulnerability was discovered internally by a GitLab team member, <a href="https://gitlab.com/dblessing">Drew Blessing</a>.</p>
<h3 id="bypassing-group-ip-restriction-settings-to-access-environment-details-of-projects-through-environmentsoperations-dashboard">Bypassing group ip restriction settings to access environment details of projects through Environments/Operations Dashboard</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 12.0 to 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. This vulnerability allows for bypassing the &lsquo;group ip restriction&rsquo; settings to access environment details of projects. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4895">CVE-2023-4895</a>.</p>
<p>Thanks <a href="https://hackerone.com/albatraoz">albatraoz</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="users-with-the-guest-role-can-change-custom-dashboard-projects-settings-for-projects-in-the-victim-group">Users with the <code>Guest</code> role can change <code>Custom dashboard projects</code> settings for projects in the victim group</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.4 before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. Users with the <code>Guest</code> role can change <code>Custom dashboard projects</code> settings contrary to permissions. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0861">CVE-2024-0861</a>.</p>
<p>Thanks <a href="https://hackerone.com/them4les_l1r">them4les_l1r</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="group-member-with-sub-maintainer-role-can-change-title-of-shared-private-deploy-keys">Group member with sub-maintainer role can change title of shared private deploy keys</h3>
<p>An issue has been discovered in GitLab affecting all versions before 16.7.6, all versions starting from 16.8 before 16.8.3, all versions starting from 16.9 before 16.9.1. It was possible for group members with sub-maintainer role to change the title of privately accessible deploy keys associated with projects in the group.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N</code>, 3.7). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3509">CVE-2023-3509</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="bypassing-approvals-of-codeowners">Bypassing approvals of CODEOWNERS</h3>
<p>An authorization bypass vulnerability was discovered in GitLab affecting versions 15.1 prior to 16.7.6, 16.8 prior to 16.8.3, and 16.9 prior to 16.9.1. A developer could bypass CODEOWNERS approvals by creating a merge conflict. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N</code>, 3.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0410">CVE-2024-0410</a>.</p>
<p>Thanks <a href="https://hackerone.com/ali_shehab">ali_shehab</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/issues/441094">Invalidate markdown cache to clear up stored XSS</a></li>
</ul>
<h3 id="1691">16.9.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144758">Merge branch &lsquo;ac-fix-16-9-0-changelog&rsquo; into &lsquo;master&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144759">[Backport] Revert &lsquo;437616_fix_changelog_tag_detection&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144956">Backport Web IDE upgrade into 16.9</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144995">Fix deny_all_requests_except_allowed of AddressableUrlValidator</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144952">Introduce back ci_pipeline_variables routing table FF</a></li>
</ul>
<h3 id="1683">16.8.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6674">Backport &lsquo;jc/fix-add-tree-entry&rsquo; into 16-8-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144119">Allow creation of group-level custom-roles on self-managed instances</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144217">Backport &lsquo;Fix stable cache for quick actions&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144355">Fix X.509 commit signing for OpenSSL 3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144349">Fix urlblocker validate calls with more options</a></li>
</ul>
<h3 id="1676">16.7.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6675">Backport jc/fix-add-tree-entry into 16-7-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/144357">Fix X.509 commit signing for OpenSSL 3</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.7.3 16.6.5 16.5.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-7-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-7-3-released/</id><published>2024-01-12T00:00:00Z</published><updated>2024-01-12T00:00:00Z</updated><author><name>Ahmad Tolba</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 12, 2024, we released versions <code>16.7.3</code> <code>16.6.5</code> <code>16.5.7</code> for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a single issue with a database migration.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1673">16.7.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/141704">Make chat_names table migration idempotent</a></li>
</ul>
<h3 id="1665">16.6.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/141705">Make chat_names table migration idempotent</a></li>
</ul>
<h3 id="1657">16.5.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/141706">Make chat_names table migration idempotent</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version fixes an <a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/issues/8371">issue with an existing migration that prevented upgrades from completing</a>. It does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Security Release: 16.7.2, 16.6.4, 16.5.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-7-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-7-2-released/</id><published>2024-01-11T00:00:00Z</published><updated>2024-01-11T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On January 11, 2024, we released versions 16.7.2, 16.6.4, 16.5.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases fixes for security vulnerabilities in security releases.
For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>. If you have not upgraded yet, be aware that there is <a href="https://about.gitlab.com/releases/2024/01/12/gitlab-16-7-3-released/">a newer patch</a> that includes additional fixes for recently discovered DB migration issue. Please upgrade to 16.7.3, 16.6.5, 16.5.7, or newer to prevent the migration issue.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-7-2-released/#account-takeover-via-password-reset-without-user-interactions">Account Takeover via password reset without user interactions</a></td>
          <td>Critical</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-7-2-released/#bypass-codeowners-approval-removal">Bypass CODEOWNERS approval removal</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-7-2-released/#attacker-can-abuse-slackmattermost-integrations-to-execute-slash-commands-as-another-user">Attacker can abuse Slack/Mattermost integrations to execute slash commands as another user</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-7-2-released/#workspaces-able-to-be-created-under-different-root-namespace">Workspaces able to be created under different root namespace</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-7-2-released/#commit-signature-validation-ignores-headers-after-signature">Commit signature validation ignores headers after signature</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="account-takeover-via-password-reset-without-user-interactions">Account Takeover via Password Reset without user interactions</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
This is a Critical severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H</code>, 10.0).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7028">CVE-2023-7028</a>.</p>
<p>This security fix has been backported to GitLab versions and 16.1.6, 16.2.9, 16.3.7, and 16.4.5 in addition to 16.5.6, 16.6.4, and 16.7.2.</p>
<p>Thanks <a href="https://hackerone.com/asterion04">asterion04</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="faq">FAQ</h3>
<p><strong>What should I do if I believe my GitLab instance is compromised?</strong></p>
<p><em>In addition to following your incident response plan</em></p>
<ol>
<li>Apply the Critical Security Release to your GitLab instance</li>
<li>Enable <a href="https://docs.gitlab.com/ee/security/two_factor_authentication.html">Two-Factor Authentication</a> (2FA) for all GitLab accounts</li>
<li>Rotate all secrets stored in GitLab:
<ol>
<li>All credentials, including GitLab account passwords</li>
<li>API tokens</li>
<li>Any certificates</li>
<li>Any other secrets</li>
</ol>
</li>
<li>Follow steps in our incident response guide, <a href="https://docs.gitlab.com/ee/security/responding_to_security_incidents.html#suspected-compromised-user-account">here</a></li>
</ol>
<p><strong>Who is impacted by this?</strong></p>
<p>GitLab self-managed instances using the following affected versions:</p>
<ul>
<li>16.1 to 16.1.5</li>
<li>16.2 to 16.2.8</li>
<li>16.3 to 16.3.6</li>
<li>16.4 to 16.4.4</li>
<li>16.5 to 16.5.5</li>
<li>16.6 to 16.6.3</li>
<li>16.7 to 16.7.1</li>
</ul>
<p>Within these versions, all authentication mechanisms are impacted.
Additionally, users who have two-factor authentication enabled are vulnerable to password reset but not account takeover as their second authentication factor is required to login.</p>
<p><strong>What actions should I take?</strong></p>
<ul>
<li>Upgrade self-managed instances to a <a href="https://about.gitlab.com/releases/categories/releases/">patched version</a> following our upgrade path. Do not skip upgrade stops as this could create instability.
<ul>
<li>Note: 16.3.x is a <a href="https://docs.gitlab.com/ee/update/#required-upgrade-stops">required upgrade stop</a> in the <a href="https://docs.gitlab.com/ee/update/#upgrade-paths">GitLab upgrade path</a>.</li>
</ul>
</li>
<li>Enable <a href="https://docs.gitlab.com/ee/security/two_factor_authentication.html">Two-Factor Authentication</a> (2FA) for all GitLab accounts, especially for users with elevated privileges (e.g. administrator accounts).</li>
</ul>
<p><strong>Has the vulnerability been resolved?</strong></p>
<p>This vulnerability was resolved with this security release.</p>
<p><strong>Were any accounts actually compromised due to this vulnerability?</strong></p>
<p>We have not detected any abuse of this vulnerability on platforms managed by GitLab, including GitLab.com and GitLab Dedicated instances. Self-managed customers can review their logs to check for possible attempts to exploit this vulnerability:</p>
<ul>
<li>Check <a href="https://docs.gitlab.com/ee/administration/logs/#production_jsonlog">gitlab-rails/production_json.log</a> for HTTP requests to the <code>/users/password</code> path with params.value.email consisting of a JSON array with <em>multiple</em> email addresses.</li>
<li>Check <a href="https://docs.gitlab.com/ee/administration/logs/#audit_jsonlog">gitlab-rails/audit_json.log</a> for entries with <code>meta.caller_id</code> of <code>PasswordsController#create</code> and <code>target_details</code> consisting of a JSON array with <em>multiple</em> email addresses.</li>
</ul>
<p><strong>When was the vulnerability introduced?</strong></p>
<p>The vulnerability was introduced in 16.1.0 on May 1, 2023.</p>
<p><strong>How was the vulnerability discovered?</strong></p>
<p>The vulnerability was responsibly reported through our Bug Bounty program.</p>
<p><strong>What security measures do you have in place to prevent such vulnerabilities?</strong></p>
<ul>
<li>We have added multiple tests that validate the password reset logic as a whole, in particular handling of email provided, the email generation, and content to prevent similar vulnerabilities.</li>
<li>Security reviews are a required part of the MR checklist that developers must complete.</li>
<li>We have a code review process that requires multiple approvals for changes.</li>
<li>We have started the <a href="https://handbook.gitlab.com/handbook/security/root-cause-analysis/">Root Cause Analysis process</a> in order to determine a comprehensive list of follow-up actions, including ways to prevent vulnerabilities like this one.</li>
<li>We have a <a href="https://docs.gitlab.com/ee/user/profile/account/two_factor_authentication.html">two-factor authentication feature</a> that prevents such a vulnerability if enabled. It is currently enabled for all GitLab Team Members.</li>
<li>We have added additional developer documentation in the code base to ensure implementation and security considerations are available to engineers working in this area in the future.</li>
<li>Revised the implementation logic to not support the submission of multiple email addresses for reset links.</li>
</ul>
<p><strong>How did this happen?</strong></p>
<p>A change was made in 16.1.0 to allow users to reset their password through a secondary email address. The vulnerability is a result of a bug in the email verification process. The bug has been fixed with this patch, and as mentioned above, we have implemented a number of preventive security measures to protect customers.</p>
<p><strong>Does this affect me if I use an Identity Provider, like Okta or Azure AD?</strong></p>
<p>Users without SSO enforcement are vulnerable. If your configuration allows a username and password to be used in addition to SSO options, then you are impacted. Disabling all password authentication options via <a href="https://docs.gitlab.com/ee/administration/settings/sign_in_restrictions.html#password-authentication-enabled">Sign-in restrictions settings</a> will mitigate the vulnerability for Self-Managed customers that have an external identity provider configured, as this will disable the ability to perform password reset.</p>
<p><strong>Am I affected by this vulnerability if I have 2FA enforced?</strong></p>
<p>An attacker will not be able to takeover your account if you have 2FA enabled. They may still be able to reset your password but will not be able to access your second factor authentication method. If you are suddenly redirected to login, or see a reset email triggered, please reset your password.</p>
<p><strong>Does this vulnerability affect GitLab Runner?</strong></p>
<p>No, this vulnerability does not affect GitLab Runner. This vulnerability affected the GitLab Rails codebase for impacted versions of GitLab itself. GitLab Runner has a separate code base that is unaffected.</p>
<h3 id="bypass-codeowners-approval-removal">Bypass CODEOWNERS approval removal</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 15.3 before 16.5.5, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2. The required CODEOWNERS approval could be bypassed by adding changes to a previously approved merge request.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N</code>, 7.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4812">CVE-2023-4812</a>.</p>
<p>Thanks <a href="https://hackerone.com/ali_shehab">ali_shehab</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="attacker-can-abuse-slackmattermost-integrations-to-execute-slash-commands-as-another-user">Attacker can abuse Slack/Mattermost integrations to execute slash commands as another user</h3>
<p>Incorrect authorization checks in GitLab CE/EE from all versions starting from 8.13 before 16.5.6, all versions starting from 16.6 before 16.6.4, all versions starting from 16.7 before 16.7.2, allows a user to abuse Slack/Mattermost integrations to execute slash commands as another user.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N</code>, 7.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5356">CVE-2023-5356</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="workspaces-able-to-be-created-under-different-root-namespace">Workspaces able to be created under different root namespace</h3>
<p>An improper access control vulnerability exists in GitLab Workspaces affecting all versions prior to 16.5.6, 16.6 prior to 16.6.4 and 16.7 prior to 16.7.2. This condition allows an attacker to create a workspace in one group that is associated with an agent from another group.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N</code>, 6.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6955">CVE-2023-6955</a>.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/j.seto">@j.seto</a>.</p>
<h3 id="commit-signature-validation-ignores-headers-after-signature">Commit signature validation ignores headers after signature</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 12.2 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which an attacker could potentially modify the metadata of signed commits.
This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code>, 3.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2030">CVE-2023-2030</a>.</p>
<p>Thanks <a href="https://hackerone.com/lotsofloops">lotsofloops</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="1672">16.7.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1688">Backport 16.7: Clean mocked tags from assets</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/140347">Backport: Solving database cross joins on HookData::ProjectBuilder</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/140621">Fix order-dependent Sidekiq config spec failures</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/140772">Harden Internal Events CLI specs against flakiness</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/140892">Enable Apollo Boards by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/140934">Backport &ldquo;Add missing ci_sources_pipelines indexes for self-host&rdquo; 16.7</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7338">Temporarily pin Faraday related gems</a></li>
</ul>
<h3 id="1664">16.6.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1675">Merge branch &lsquo;ci-clean-mocked-tags&rsquo; into &lsquo;16-6-stable&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1689">Backport 16.6 : Clean mocked tags from assets</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/139540">Backport-Search::IndexRepairService using Repository index for projects</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/141018">Backport !140718 into 16.6 stable branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7337">Temporarily pin Faraday related gems</a></li>
</ul>
<h3 id="1656">16.5.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1678">CI: clean mocked tags from assets, don&rsquo;t pollute artifacts (backport to 16.5)</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1690">Backport 16.5 : Clean mocked tags from assets</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6583">Backport 16.5: Fix chatty loopWriter logs when log level config is empty</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/141027">Bump allure-report and backport clickhouse version fix to 16.5</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7336">Temporarily pin Faraday related gems</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.6.2, 16.5.4, 16.4.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-6-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-6-2-released/</id><published>2023-12-13T00:00:00Z</published><updated>2023-12-13T00:00:00Z</updated><author><name>Dominic Couture</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On December 13, 2023, we released versions 16.6.2, 16.5.4, and 16.4.4 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#smartcard-authentication-allows-impersonation-of-arbitrary-user-using-user%27s-public-certificate">Smartcard authentication allows impersonation of arbitrary user using user&rsquo;s public certificate</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#when-subgroup-is-allowed-to-merge-or-push-to-protected-branches,-subgroup-members-with-the-developer-role-may-gain-the-ability-to-push-or-merge">When subgroup is allowed to merge or push to protected branches, subgroup members with the Developer role may gain the ability to push or merge</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#the-gitlab-web-interface-does-not-ensure-the-integrity-of-information-when-downloading-the-source-code-from-installation-packages-or-tags">The GitLab web interface does not ensure the integrity of information when downloading the source code from installation packages or tags.</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#project-maintainer-can-escalate-to-project-owner-using-project-access-token-rotate-api">Project maintainer can escalate to Project owner using project access token rotate API</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#omission-of-double-encoding-in-file-names-facilitates-the-creation-of-repositories-with-malicious-content">Omission of Double Encoding in File Names Facilitates the Creation of Repositories with Malicious Content.</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#unvalidated-timespent-value-leads-to-unable-to-load-issues-on-issue-board">Unvalidated timeSpent value leads to unable to load issues on Issue board</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#developer-can-bypass-predefined-variables-via-rest-api">Developer can bypass predefined variables via REST API</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-2-released/#auditor-users-can-create-merge-requests-on-projects-they-dont-have-access-to">Auditor users can create merge requests on projects they don&rsquo;t have access to</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="smartcard-authentication-allows-impersonation-of-arbitrary-user-using-users-public-certificate">Smartcard authentication allows impersonation of arbitrary user using user&rsquo;s public certificate</h3>
<p>An improper certificate validation issue in Smartcard authentication in GitLab EE affecting all versions from 11.6 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows an attacker to authenticate as another user given their public key if they use Smartcard authentication. Smartcard authentication is an experimental feature and has to be manually enabled by an administrator. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N</code>, 7.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6680">CVE-2023-6680</a>.</p>
<p>Thanks Lucas Serrano from PEReN (<a href="https://gitlab.com/LSerranoPEReN">@LSerranoPEReN</a>) for reporting this vulnerability.</p>
<h2 id="when-subgroup-is-allowed-to-merge-or-push-to-protected-branches-subgroup-members-with-the-developer-role-may-gain-the-ability-to-push-or-merge">When subgroup is allowed to merge or push to protected branches, subgroup members with the Developer role may gain the ability to push or merge</h2>
<p>An issue has been discovered in GitLab EE Premium and Ultimate affecting versions 16.4.3, 16.5.3, and 16.6.1. In projects using subgroups to define who can push and/or merge to protected branches, there may have been instances in which subgroup members with the Developer role were able to push or merge to protected branches. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6564">CVE-2023-6564</a>.</p>
<p>This vulnerability has been discovered internally by a GitLab team member.</p>
<p>The following script can help you identify projects that may be subject to a vulnerable configuration. This script can be used to create a CSV file listing projects that have a group set as &ldquo;Allowed to merge&rdquo; or &ldquo;Allowed to push and merge&rdquo; along with the web_url and project_id for the project and the group_name/group_id for the group. Note that this is not an indication that unauthorized changes were made to protected branches, but rather an indication that these projects were subject to this vulnerable configuration. For impacted projects, customers will need to check merge requests that were merged on their self-managed GitLab instances running 16.4.3, 16.5.3, or 16.6.1 prior to updating to 16.4.4, 16.5.4, or 16.6.2 or on GitLab.com prior to 2023-12-04 18:10 UTC.</p>
<details><summary>Click to expand the script</summary>

<div class="codeblock-wrapper" data-elastic-exclude>
  <div data-vue-app="codeblock-toolbar" data-code-language="sh" class="codeblock-toolbar"></div><div class="highlight"><pre tabindex="0" class="chroma"><code class="language-sh" data-lang="sh"><span class="line"><span class="cl"><span class="c1">## install `glab` (if not already installed)</span>
</span></span><span class="line"><span class="cl"><span class="c1"># https://gitlab.com/gitlab-org/cli#installation</span>
</span></span><span class="line"><span class="cl"><span class="c1">## install `jq` (if not already installed)</span>
</span></span><span class="line"><span class="cl"><span class="c1"># https://jqlang.github.io/jq/download/</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="c1"># authenticate with `glab` as Admin (self-managed) or group owner (SaaS)</span>
</span></span><span class="line"><span class="cl">glab auth login
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="c1">## get `project_id` and `web_url` for all projects at the instance level (self-managed) or group level (SaaS), save it as `project-list.csv`</span>
</span></span><span class="line"><span class="cl"><span class="c1"># self-managed - instance level (use Admin PAT for authentication)</span>
</span></span><span class="line"><span class="cl">glab api --hostname <span class="s2">&#34;self-managed-gitlab.example.com&#34;</span> --paginate projects 2&gt;&gt; error.log <span class="p">|</span> jq -c <span class="s1">&#39;.[]&#39;</span> <span class="p">|</span> jq -rc <span class="s1">&#39;[.id, .web_url] | @csv&#39;</span> <span class="p">|</span> tee -a project-list.csv
</span></span><span class="line"><span class="cl"><span class="c1"># SaaS - group level (use group owner PAT for authentication)</span>
</span></span><span class="line"><span class="cl">glab api --paginate <span class="s2">&#34;groups/</span><span class="nv">$GROUP_ID</span><span class="s2">/projects&#34;</span> 2&gt;&gt; error.log <span class="p">|</span> jq -c <span class="s1">&#39;.[]&#39;</span> <span class="p">|</span> jq -rc <span class="s1">&#39;[.id, .web_url] | @csv&#39;</span> <span class="p">|</span> tee -a project-list.csv 
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="c1">## add headers to protected_branch_report.csv file</span>
</span></span><span class="line"><span class="cl"><span class="nb">echo</span> <span class="s2">&#34;project_id, web_url, group_name_push_access, group_id_push_access, group_name_merge_access, group_id_merge_access&#34;</span> &gt; protected_branch_report.csv
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="c1">## loop through each project to check for protected branches that have a group with push or merge access</span>
</span></span><span class="line"><span class="cl"><span class="k">while</span> <span class="nv">IFS</span><span class="o">=</span><span class="s1">&#39;,&#39;</span> <span class="nb">read</span> -r PROJECT_ID WEB_URL<span class="p">;</span> <span class="k">do</span>
</span></span><span class="line"><span class="cl">  glab api <span class="s2">&#34;projects/</span><span class="nv">$PROJECT_ID</span><span class="s2">/protected_branches&#34;</span> 2&gt;&gt; error.log <span class="se">\
</span></span></span><span class="line"><span class="cl"><span class="se"></span>  <span class="p">|</span> jq -c <span class="s1">&#39;.[]&#39;</span> <span class="se">\
</span></span></span><span class="line"><span class="cl"><span class="se"></span>  <span class="p">|</span> jq <span class="s1">&#39;select((any(.push_access_levels[]; .group_id != null and .access_level == 40)) or (any(.merge_access_levels[]; .group_id != null and .access_level == 40)))&#39;</span> 2&gt;&gt; error.log <span class="se">\
</span></span></span><span class="line"><span class="cl"><span class="se"></span>  <span class="p">|</span> jq -c <span class="s2">&#34;{project_id: </span><span class="nv">$PROJECT_ID</span><span class="s2">, web_url: </span><span class="nv">$WEB_URL</span><span class="s2">, group_id_push_access: .push_access_levels.[].group_id, group_name_push_access: .push_access_levels.[].access_level_description, group_id_merge_access: .merge_access_levels.[].group_id, group_name_merge_access: .merge_access_levels.[].access_level_description}&#34;</span> 2&gt;&gt; error.log <span class="se">\
</span></span></span><span class="line"><span class="cl"><span class="se"></span>  <span class="p">|</span> jq <span class="s1">&#39;select((.group_id_push_access != null or .group_id_merge_access != null) and (.group_name_push_access != &#34;Maintainers&#34; or .group_name_merge_access != &#34;Maintainers&#34;))&#39;</span> 2&gt;&gt; error.log <span class="se">\
</span></span></span><span class="line"><span class="cl"><span class="se"></span>  <span class="p">|</span> jq -rc <span class="s1">&#39;[.project_id, .web_url, .group_name_push_access, .group_id_push_access, .group_name_merge_access, .group_id_merge_access] | @csv&#39;</span> <span class="se">\
</span></span></span><span class="line"><span class="cl"><span class="se"></span>  <span class="p">|</span> tee -a protected_branch_report.csv  
</span></span><span class="line"><span class="cl"><span class="k">done</span> &lt; project-list.csv</span></span></code></pre></div></div>
<p>GitLab has conducted limited testing to validate this script. As such this script is provided AS-IS and GitLab makes no warranties of any kind. GITLAB HEREBY DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT.</p>
</details>
<h3 id="the-gitlab-web-interface-does-not-ensure-the-integrity-of-information-when-downloading-the-source-code-from-installation-packages-or-tags">The GitLab web interface does not ensure the integrity of information when downloading the source code from installation packages or tags.</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when source code or installation packages are pulled from a specific tag.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N</code>, 5.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6051">CVE-2023-6051</a>.</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="project-maintainer-can-escalate-to-project-owner-using-project-access-token-rotate-api">Project maintainer can escalate to Project owner using project access token rotate API</h3>
<p>A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</code>, 4.9).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3907">CVE-2023-3907</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="omission-of-double-encoding-in-file-names-facilitates-the-creation-of-repositories-with-malicious-content">Omission of Double Encoding in File Names Facilitates the Creation of Repositories with Malicious Content.</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N</code>, 4.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5512">CVE-2023-5512</a>.</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unvalidated-timespent-value-leads-to-unable-to-load-issues-on-issue-board">Unvalidated timeSpent value leads to unable to load issues on Issue board</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible to overflow the time spent on an issue that altered the details shown in the issue boards.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3904">CVE-2023-3904</a>.</p>
<p>Thanks <a href="https://hackerone.com/toukakirishima">toukakirishima</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="developer-can-bypass-predefined-variables-via-rest-api">Developer can bypass predefined variables via REST API</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5061">CVE-2023-5061</a>.</p>
<p>Thanks <a href="https://hackerone.com/ali_shehab">ali_shehab</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="auditor-users-can-create-merge-requests-on-projects-they-dont-have-access-to">Auditor users can create merge requests on projects they don&rsquo;t have access to</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they&rsquo;re not a member of. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N</code>, 2.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3511">CVE-2023-3511</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="1662">16.6.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1649">[Backport 16.6] Fix redis-namspace dependency version for UBI mailroom</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1658">Fix backup id parsing from backup URLs (16.6 Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138449">Package Registry: Truncate Pypi metadata description field</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138535">Fix adding confidential child tasks</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138797">Backport Hide obsolete migration warning into 16.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138911">[16.6 Backport] Fix Admin Mode bug in DeactivateDormantUsersWorker</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138929">Backport Fix cluster reindexing service preflight check to 16.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138804">Backport Sanitize string provided to to_tsvector</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138602">Backport &ldquo;Update migration to work for any fk name&rdquo; to 16.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/139051">Fix Environment destroy job is retried endlessly (16.6 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138431">Allow users to authenticate via OAuth with password-based providers</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7275">Do not scan entire /var/opt/gitlab for stale pids (16.6 backport)</a></li>
</ul>
<h3 id="1654">16.5.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1641">gitlab-rails: support skipping post-migrations in db checks</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1650">[Backport 16.5] Fix redis-namspace dependency version for UBI mailroom</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137712">Backport - Truncate verification failure message to 255</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138912">[16.5 Backport] Fix Admin Mode bug in DeactivateDormantUsersWorker</a></li>
</ul>
<h3 id="1644">16.4.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1651">[Backport 16.4] Fix redis-namspace dependency version for UBI mailroom</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138913">[16.4 Backport] Fix Admin Mode bug in DeactivateDormantUsersWorker</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.6.1, 16.5.3, 16.4.3</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-6-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-6-1-released/</id><published>2023-11-30T00:00:00Z</published><updated>2023-11-30T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On November 30, 2023, we released versions 16.6.1, 16.5.3, 16.4.3 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#xss-and-redos-in-markdown-via-banzai-pipeline-of-jira">XSS and ReDoS in Markdown via Banzai pipeline of Jira</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#members-with-admin_group_member-custom-permission-can-add-members-with-higher-role">Members with admin_group_member custom permission can add members with higher role</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#release-description-visible-in-public-projects-despite-release-set-as-project-members-only-through-atom-response">Release Description visible in public projects despite release set as project members only through atom response</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#manipulate-the-repository-content-in-the-ui-cve-2023-3401-bypass">Manipulate the repository content in the UI (CVE-2023-3401 bypass)</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#external-user-can-abuse-policy-bot-to-gain-access-to-internal-projects">External user can abuse policy bot to gain access to internal projects</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#developers-can-update-pipeline-schedules-to-use-protected-branches-even-if-they-dont-have-permission-to-merge">Developers can update pipeline schedules to use protected branches even if they don&rsquo;t have permission to merge</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#users-can-install-composer-packages-from-public-projects-even-when-package-registry-is-turned-off">Users can install Composer packages from public projects even when <code>Package registry</code> is turned off</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#client-side-dos-via-mermaid-flowchart">Client-side DOS via Mermaid Flowchart</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches">Unauthorized member can gain <code>Allowed to push and merge</code> access and affect integrity of protected branches</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-6-1-released/#guest-users-can-react-emojis-on-confidential-work-items-which-they-cant-see-in-a-project">Guest users can react (emojis) on confidential work items which they cant see in a project</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="xss-and-redos-in-markdown-via-banzai-pipeline-of-jira">XSS and ReDoS in Markdown via Banzai pipeline of Jira</h3>
<p>Improper neutralization of input in Jira integration configuration in GitLab CE/EE, affecting all versions from 15.10 prior to 16.6.1, 16.5 prior to 16.5.3, and 16.4 prior to 16.4.3 allowed attacker to execute javascript in victim&rsquo;s browser.</p>
<p>This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6033">CVE-2023-6033</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="members-with-admin_group_member-custom-permission-can-add-members-with-higher-role">Members with admin_group_member custom permission can add members with higher role</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.5 before 16.5.3,
all versions starting from 16.6 before 16.6.1. When a user is assigned a custom role with `admin_group_member`` enabled, they may be able to add a member with a higher static role than themselves to the group which may lead to privilege escalation.</p>
<p>This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</code>, 8.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6396">CVE-2023-6396</a>.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/jarka">jarka</a>.</p>
<h3 id="release-description-visible-in-public-projects-despite-release-set-as-project-members-only-through-atom-response">Release Description visible in public projects despite release set as project members only through atom response</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 11.3 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1.
It was possible for unauthorized users to view a public projects&rsquo; release descriptions via an atom endpoint when release access on the public was set to only project members</p>
<p>This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code>, 5.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3949">CVE-2023-3949</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="manipulate-the-repository-content-in-the-ui-cve-2023-3401-bypass">Manipulate the repository content in the UI (CVE-2023-3401 bypass)</h3>
<p>An issue has been discovered in GitLab affecting all versions before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. Under certain circumstances, a malicious actor bypass prohibited branch checks using a specially crafted branch name to manipulate repository content in the UI.</p>
<p>This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N</code>, 4.8).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5226">CVE-2023-5226</a>.</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="external-user-can-abuse-policy-bot-to-gain-access-to-internal-projects">External user can abuse policy bot to gain access to internal projects</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the policy bot to gain access to internal projects.</p>
<p>This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</code>, 4.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5995">CVE-2023-5995</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="client-side-dos-via-mermaid-flowchart">Client-side DOS via Mermaid Flowchart</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 10.5 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to cause a client-side denial of service using malicious crafted mermaid diagram input.</p>
<p>This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L</code>, 2.6).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4912">CVE-2023-4912</a>.</p>
<p>Thanks <a href="https://hackerone.com/toukakirishima">toukakirishima</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="developers-can-update-pipeline-schedules-to-use-protected-branches-even-if-they-dont-have-permission-to-merge">Developers can update pipeline schedules to use protected branches even if they don&rsquo;t have permission to merge</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 9.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a user with the Developer role to update a pipeline schedule from an unprotected branch to a protected branch.</p>
<p>This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4317">CVE-2023-4317</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="users-can-install-composer-packages-from-public-projects-even-when-package-registry-is-turned-off">Users can install Composer packages from public projects even when <code>Package registry</code> is turned off</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 13.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for users to access composer packages on public projects that have package registry disabled in the project settings.</p>
<p>This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3964">CVE-2023-3964</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches">Unauthorized member can gain <code>Allowed to push and merge</code> access and affect integrity of protected branches</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 8.13 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the <code>Allowed to merge</code> permission as a guest user, when granted the permission through a group.</p>
<p>This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4658">CVE-2023-4658</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="guest-users-can-react-emojis-on-confidential-work-items-which-they-cant-see-in-a-project">Guest users can react (emojis) on confidential work items which they cant see in a project</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 12.1 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a Guest user to add an emoji on confidential work items.</p>
<p>This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 3.1).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3443">CVE-2023-3443</a>.</p>
<p>Thanks <a href="https://hackerone.com/ashish_r_padelkar">ashish_r_padelkar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="mattermost-security-update">Mattermost Security Update</h3>
<p>Mattermost has been updated to the latest patch release to mitigate several security issues.</p>
<h3 id="update-to-pg-149-and-1312">Update to PG 14.9 and 13.12</h3>
<p>PostgreSQL has been updated to 14.9 and 13.12 to mitigate CVE-2023-39417.</p>
<h3 id="update-pcre2-to-1042">Update pcre2 to 10.42</h3>
<p><code>pcre2</code> has been updated to version 10.42 to mitigate CVE-2022-41409.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="1661">16.6.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1639">Install Gitaly dependencies for project archiving (16.6 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137167">Fix intermittent 404 errors loading GitLab Pages</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136888">Prefer custom sort order with search in users API</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136902">Backport &ldquo;Fix group page erroring because of nil user&rdquo; to 16-6-stable-ee</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137296">Skip encrypted settings logic for Redis when used by Mailroom</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137687">Allow <code>+</code> char in abuse detection for global search</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137800">Backport &ldquo;Move unlock pipeline cron scheduler out of ee&rdquo; to 16.6</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137899">Fix bug with pages_deployments files not being deleted on disk</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/137711">Backport - Truncate verification failure message to 255</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/138131">Backport &ldquo;Revert &ldquo;Merge branch &lsquo;sc1-release-goredis&rsquo; into &lsquo;master&rsquo;&rdquo;&rdquo;</a></li>
</ul>
<h3 id="1653">16.5.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1636">Backport  10871d71b171db38701bfefe15883b05c234ca6d to <code>16-5-stable</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136934">Geo: Reduce batch size of verification state backfill</a></li>
</ul>
<h3 id="1643">16.4.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1622">Backport  10871d71b171db38701bfefe15883b05c234ca6d to <code>16-4-stable</code></a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6554">Backport to 16.4 the fix for test failure due to &ldquo;not-existing.com&rdquo; being registered</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/135647">Bump <code>asdf-bootstrapped-verify</code> version on 16.4</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/133886">Fix bulk batch export of badges and uploads</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136764">[16.4] ci: Fix broken master by not reading GITLAB_ENV</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136433">Fix assign security check permission checks</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136774">For 16.4: Fix Geo verification state backfill job can exceed batch size</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136937">Geo: Reduce batch size of verification state backfill</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.5.2</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-5-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-5-2-released/</id><published>2023-11-14T00:00:00Z</published><updated>2023-11-14T00:00:00Z</updated><author><name>Steve Abrams</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On November 14, 2023, we released versions 16.5.2 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1652">16.5.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/135645">Backport to 16.5: Geo: Bring back legacy project Prometheus metrics</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/135195">Backport artifacts page breadcrumb fixes</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136065">Fix broken issue rendering when initial ID is null</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136243">Backport - Create group wiki repo if absent when verifying on primary</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136399">backport to 16.5: Fix Geo verification state backfill job can exceed batch size</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/136434">Fix assign security check permission checks</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7228">Update postgres_exporter from 0.14.0 to 0.15.0 (16.5 backport)</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.5.1, 16.4.2, 16.3.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-5-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-5-1-released/</id><published>2023-10-31T00:00:00Z</published><updated>2023-10-31T00:00:00Z</updated><author><name>Greg Alfaro</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On October 31, 2023, we released versions 16.5.1, 16.4.2, 16.3.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to
one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases:
a monthly, scheduled security release, released a week after the feature release (which deploys on the 3rd Thursday of each month),
and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>.
You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>.
In addition, the issues detailing each vulnerability are made public on our
<a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a>
30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to
the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers
upgrade to the latest security release for their supported version. You can read more
<a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<p>On 2023-10-20 11:03 UTC, GitLab internally discovered (CVE-2023-5831) that a change in the GitLab sidebar feature resulted in self-managed GitLab instances sending version-checks to version.gitlab.com each time they opened a page on their GitLab instance. This means that the hostnames and current versions of self-managed GitLab instances were being sent to version.gitlab.com any time a user of that GitLab instance opened any page, regardless of whether or not the sending of version-check was enabled. This information was only accessible to some GitLab team members and was not exposed externally, and GitLab is working to purge the erroneously collected data from our database.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#disclosure-of-cicd-variables-using-custom-project-templates">Disclosure of CI/CD variables using Custom project templates</a></td>
          <td>High</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#gitlab-omnibus-dos-crash-via-oom-with-ci-catalogs">GitLab omnibus DoS crash via OOM with CI Catalogs</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#parsing--gitlab-ciyml-with-large-string-via-timeout-input-leads-to-denial-of-service">Parsing  gitlab-ci.yml with large string via <code>timeout</code> input leads to Denial of Service</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#dos---blocking-fifo-files-in-tar-archives">DoS - Blocking FIFO files in Tar archives</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#titles-exposed-by-service-desk-template">Titles exposed by service-desk template</a></td>
          <td>Medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#approval-on-protected-environments-can-be-bypassed">Approval on protected environments can be bypassed</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#version-information-disclosure-when-super_sidebar_logged_out-feature-flag-is-enabled">Version information disclosure when <code>super_sidebar_logged_out</code> feature flag is enabled</a></td>
          <td>Low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-5-1-released/#add-abuse-detection-for-search-syntax-filter-pipes">Add abuse detection for search syntax filter pipes</a></td>
          <td>Low</td>
      </tr>
  </tbody>
</table>
<h3 id="disclosure-of-cicd-variables-using-custom-project-templates">Disclosure of CI/CD variables using Custom project templates</h3>
<p>An issue has been discovered in GitLab affecting all versions starting from 11.6 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N</code>, 8.5).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3399">CVE-2023-3399</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="gitlab-omnibus-dos-crash-via-oom-with-ci-catalogs">GitLab omnibus DoS crash via OOM with CI Catalogs</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.2 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A low-privileged attacker can point a CI/CD Component to an incorrect path and cause the server to exhaust all available memory through an infinite loop and cause Denial of Service. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5825">CVE-2023-5825</a>.</p>
<p>Thanks <a href="https://hackerone.com/blakbat">blakbat</a> for reporting this vulnerability through our HackerOne bug bounty program&quot;</p>
<h3 id="parsing--gitlab-ciyml-with-large-string-via-timeout-input-leads-to-denial-of-service">Parsing  gitlab-ci.yml with large string via <code>timeout</code> input leads to Denial of Service</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.3 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A Regular Expression Denial of Service was possible  by adding a large string in timeout input in gitlab-ci.yml file.&quot; This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3909">CVE-2023-3909</a>.</p>
<p>Thanks <a href="https://hackerone.com/akadrian">akadrian</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="dos---blocking-fifo-files-in-tar-archives">DoS - Blocking FIFO files in Tar archives</h3>
<p>An issue has been discovered in GitLab EE/CE affecting all versions starting before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1 which allows an attackers to block Sidekiq job processor. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3246">CVE-2023-3246</a>.</p>
<p>Thanks <a href="https://hackerone.com/zhutyra">zhutyra</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="titles-exposed-by-service-desk-template">Titles exposed by service-desk template</h3>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. Arbitrary access to the titles of an private specific references could be leaked through the service-desk custom email template. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5600">CVE-2023-5600</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="approval-on-protected-environments-can-be-bypassed">Approval on protected environments can be bypassed</h3>
<p>An authorization issue affecting GitLab EE affecting all versions from 14.7 prior to 16.3.6, 16.4 prior to 16.4.2, and 16.5 prior to 16.5.1, allowed a user to run jobs in protected environments, bypassing any required approvals. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N</code>, 3.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4700">CVE-2023-4700</a>.</p>
<p>Thanks <a href="https://hackerone.com/gregodfather">Gregor Pirolt</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="version-information-disclosure-when-super_sidebar_logged_out-feature-flag-is-enabled">Version information disclosure when <code>super_sidebar_logged_out</code> feature flag is enabled</h3>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the <code>super_sidebar_logged_out</code> feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</code>, 3.7).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5831">CVE-2023-5831</a>.</p>
<p>This vulnerability was discovered internally by the GitLab team.</p>
<h3 id="add-abuse-detection-for-search-syntax-filter-pipes">Add abuse detection for search syntax filter pipes</h3>
<p>An issue has been discovered in GitLab EE with Advanced Search affecting all versions from 13.9 to 16.3.6, 16.4 prior to 16.4.2 and 16.5 prior to 16.5.1 that could allow a denial of service in the Advanced Search function by chaining too many syntax operators. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 3.1). It is now mitigated in the latest release. We have requested a CVE ID and will update this blog post when it is assigned.</p>
<p>This vulnerability was found internally by GitLab.</p>
<h3 id="update-curl-to-v840">Update curl to v8.4.0</h3>
<p>curl has been updated to v8.4.0 to mitigate <a href="https://curl.se/docs/CVE-2023-38545.html">CVE-2023-38545</a>.</p>
<h3 id="update-mermaid-to-1050">Update mermaid to 10.5.0</h3>
<p>mermaid has been updated to 10.5.0 to mitigate a security issue.</p>
<h3 id="patch-nginx-for-cve-2023-44487">Patch NGINX for CVE-2023-44487</h3>
<p>NGINX has been patched to mitigate CVE-2023-44487.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="1651">16.5.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134835">Revert better-error-messages-for-pull-mirroring</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134867">Update post migration to drop column only if it exists</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/135226">Downgrade vue-apollo to prevent auto-restarting subscriptions on error</a></li>
</ul>
<h3 id="1642">16.4.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1554">UBI: Explicitly add webrick gem to mailroom build</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/133882">Update VERSION files</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/133877">Update dependency prometheus-client-mmap to &lsquo;&gt;= 0.28.1&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/133833">Backport: fix migration when commit_message_negative_regex is missing</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134197">Backport to 16.4: Geo: Avoid getting resources stuck in Queued</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134481">Fix pipeline schedules view when owner is nil</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134565">Quarantine flaky delete_job_spec:46</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134264">Create Geo event when project is created</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134328">Fix bug with batched gitaly ref deletion duplicates</a></li>
</ul>
<h3 id="1636">16.3.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1555">UBI: Explicitly add webrick gem to mailroom build</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1499">Backport 16.3: Upgrade exiftool to 12.65</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/135401">Fixes the 16-3-stable branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/134196">Backport to 16.3: Geo: Avoid getting resources stuck in Queued</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.4.1, 16.3.5, and 16.2.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-4-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-4-1-released/</id><published>2023-09-28T00:00:00Z</published><updated>2023-09-28T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On September 28, 2023, we released versions 16.4.1, 16.3.5, and 16.2.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#attacker-can-add-other-projects-policy-bot-as-member-to-their-own-project-and-use-that-bot-to-trigger-pipelines-in-victims-project">Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#group-import-allows-impersonation-of-users-in-ci-pipelines">Group import allows impersonation of users in CI pipelines</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#developers-can-bypass-code-owners-approval-by-changing-a-mrs-base-branch">Developers can bypass code owners approval by changing a MR&rsquo;s base branch</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#leaking-source-code-of-restricted-project-through-a-fork">Leaking source code of restricted project through a fork</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#third-party-library-consul-requires-enable-script-checks-to-be-false-to-enable-patch">Third party library Consul requires enable-script-checks to be False to enable patch</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#service-account-not-deleted-when-namespace-is-deleted-allowing-access-to-internal-projects">Service account not deleted when namespace is deleted allowing access to internal projects</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#enforce-sso-settings-bypassed-for-public-projects-for-members-without-identity">Enforce SSO settings bypassed for public projects for Members without identity</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#removed-project-member-can-write-to-protected-branches">Removed project member can write to protected branches</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#unauthorised-association-of-ci-jobs-for-machine-learning-experiments">Unauthorised association of CI jobs for Machine Learning experiments</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#force-pipelines-to-not-have-access-to-protected-variables-and-will-likely-fail-using-tags">Force pipelines to not have access to protected variables and will likely fail using tags</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#maintainer-can-create-a-fork-relationship-between-existing-projects">Maintainer can create a fork relationship between existing projects</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#disclosure-of-masked-ci-variables-via-processing-cicd-configuration-of-forks">Disclosure of masked CI variables via processing CI/CD configuration of forks</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#asset-proxy-bypass-using-non-ascii-character-in-asset-uri">Asset Proxy Bypass using non-ASCII character in asset URI</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches">Unauthorized member can gain <code>Allowed to push and merge</code> access and affect integrity of protected branches</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#removed-developer-can-continue-editing-the-source-code-of-a-public-project">Removed Developer can continue editing the source code of a public project</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#a-project-reporter-can-leak-owners-sentry-instance-projects">A project reporter can leak owner&rsquo;s Sentry instance projects</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-4-1-released/#math-rendering-in-markdown-can-escape-container-and-hijack-clicks">Math rendering in markdown can escape container and hijack clicks</a></td>
          <td>low</td>
      </tr>
  </tbody>
</table>
<h2 id="attacker-can-add-other-projects-policy-bot-as-member-to-their-own-project-and-use-that-bot-to-trigger-pipelines-in-victims-project">Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/982 -->
<p>A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N</code>, 8.2). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5207">CVE-2023-5207</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="group-import-allows-impersonation-of-users-in-ci-pipelines">Group import allows impersonation of users in CI pipelines</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/980 -->
<p>Two issues have been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports. These are a high severity issues (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N</code>, 8.2). They are now mitigated in the latest release and are assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5106">CVE-2023-5106</a>.</p>
<p>These issues have been discovered internally by GitLab team member <a href="https://gitlab.com/joernchen">Joern Schneeweisz</a>.</p>
<h2 id="developers-can-bypass-code-owners-approval-by-changing-a-mrs-base-branch">Developers can bypass code owners approval by changing a MR&rsquo;s base branch</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/976 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting 15.3 prior to prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N</code>, 8.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4379">CVE-2023-4379</a>.</p>
<p>This issue was reported by a customer.</p>
<h2 id="leaking-source-code-of-restricted-project-through-a-fork">Leaking source code of restricted project through a fork</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/939 -->
<p>An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that an unauthorised user to fork a public project. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3413">CVE-2023-3413</a>.</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="third-party-library-consul-requires-enable-script-checks-to-be-false-to-enable-patch">Third party library Consul requires enable-script-checks to be False to enable patch</h2>
<!-- https://gitlab.com/gitlab-org/security/omnibus-gitlab/-/issues/99 -->
<p>Patch in third party library Consul requires &rsquo;enable-script-checks&rsquo; to be set to False. This only affects GitLab-EE. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N</code>, 5.9). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5332">CVE-2023-5332</a>.</p>
<p>This issue was reported by a customer.</p>
<h2 id="service-account-not-deleted-when-namespace-is-deleted-allowing-access-to-internal-projects">Service account not deleted when namespace is deleted allowing access to internal projects</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/962 -->
<p>A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</code>, 5.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3914">CVE-2023-3914</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="enforce-sso-settings-bypassed-for-public-projects-for-members-without-identity">Enforce SSO settings bypassed for public projects for Members without identity</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/930 -->
<p>An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</code>, 5.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3115">CVE-2023-3115</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="removed-project-member-can-write-to-protected-branches">Removed project member can write to protected branches</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/972 -->
<p>An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5198">CVE-2023-5198</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="unauthorised-association-of-ci-jobs-for-machine-learning-experiments">Unauthorised association of CI jobs for Machine Learning experiments</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/960 -->
<p>An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI/CD jobs of private projects which they are not a member of. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4532">CVE-2023-4532</a>.</p>
<p>Thanks <a href="https://hackerone.com/ricardobrito">ricardobrito</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="force-pipelines-to-not-have-access-to-protected-variables-and-will-likely-fail-using-tags">Force pipelines to not have access to protected variables and will likely fail using tags</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/955 -->
<p>Denial of Service in pipelines affecting all versions of Gitlab EE and CE prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows attacker to cause pipelines to fail. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3917">CVE-2023-3917</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="maintainer-can-create-a-fork-relationship-between-existing-projects">Maintainer can create a fork relationship between existing projects</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/963 -->
<p>An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3920">CVE-2023-3920</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="disclosure-of-masked-ci-variables-via-processing-cicd-configuration-of-forks">Disclosure of masked CI variables via processing CI/CD configuration of forks</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/964 -->
<p>An information disclosure issue in GitLab CE/EE affecting all versions from 13.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows an attacker to extract non-protected CI/CD variables by tricking a user to visit a fork with a malicious CI/CD configuration. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0989">CVE-2023-0989</a>.</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="asset-proxy-bypass-using-non-ascii-character-in-asset-uri">Asset Proxy Bypass using non-ASCII character in asset URI</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/973 -->
<p>An input validation issue in the asset proxy in GitLab EE, affecting all versions from 12.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1, allowed an authenticated attacker to craft image urls which bypass the asset proxy. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code>, 3.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3906">CVE-2023-3906</a>.</p>
<p>Thanks <a href="https://hackerone.com/afewgoats">afewgoats</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="unauthorized-member-can-gain-allowed-to-push-and-merge-access-and-affect-integrity-of-protected-branches">Unauthorized member can gain <code>Allowed to push and merge</code> access and affect integrity of protected branches</h2>
<p>An issue has been discovered in GitLab EE affecting all versions starting from X.Y before 16.X, all versions starting from 16.X before 16.X. It was possible for an attacker to abuse the <code>Allowed to merge</code> permission as a guest user, when granted the permission through a group. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4658">CVE-2023-4658</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="removed-developer-can-continue-editing-the-source-code-of-a-public-project">Removed Developer can continue editing the source code of a public project</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/953 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge request’s source branch. . This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3979">CVE-2023-3979</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="a-project-reporter-can-leak-owners-sentry-instance-projects">A project reporter can leak owner&rsquo;s Sentry instance projects</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/968 -->
<p>An improper authorization issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.2.x8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4.0 before 16.4.1. It allows a project reporter to leak the owner&rsquo;s Sentry instance projects. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2233">CVE-2023-2233</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="math-rendering-in-markdown-can-escape-container-and-hijack-clicks">Math rendering in markdown can escape container and hijack clicks</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/974 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L</code>, 3.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3922">CVE-2023-3922</a>.</p>
<p>Thanks <a href="https://hackerone.com/ammar2">ammar2</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h1 id="update-exiftool">Update Exiftool</h1>
<p>Exiftool has been updated to version 1.12 in order to mitigate security issues.</p>
<h1 id="update-mattermost">Update Mattermost</h1>
<p>Mattermost has been updated to version 8.1.2 in order to mitigate security issues.</p>
<h1 id="update-auto-deploy-image">Update Auto deploy image</h1>
<p>Auto deploy image has been updated to version 2.55.0 in order to mitigate security issues.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<h3 id="1635">16.3.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/132398">Backport disable v1 package metadata sync</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Security Release: 16.3.4 and 16.2.7</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-4-released/</id><published>2023-09-18T00:00:00Z</published><updated>2023-09-18T00:00:00Z</updated><author><name>Nick Malcolm</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On September 18, 2023, we released versions 16.3.4 and 16.2.7 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>. For versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4, see the <a href="/releases/patches/patch-release-gitlab-16-3-4-released/#mitigations-for-impacted-versions">mitigations</a> offered below.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-4-released/#attacker-can-abuse-scan-execution-policies-to-run-pipelines-as-another-user">Attacker can abuse scan execution policies to run pipeline as another user</a></td>
          <td>high</td>
      </tr>
  </tbody>
</table>
<h2 id="attacker-can-abuse-scan-execution-policies-to-run-pipelines-as-another-user">Attacker can abuse scan execution policies to run pipelines as another user</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/975 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting
from 13.12 before 16.2.7 and all
versions starting from 16.3 before 16.3.4. It was possible for an attacker to run
pipelines as an arbitrary user via scheduled security scan policies.
This was a bypass of <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932">CVE-2023-3932</a> showing additional impact.
This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N</code>, 8.2).
It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5009">CVE-2023-5009</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h3 id="mitigations-for-impacted-versions">Mitigations for impacted versions</h3>
<p>Instances running versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4 are vulnerable if both of the features below are enabled at the same time. In order to mitigate this vulnerability in situations where it&rsquo;s not possible to upgrade, it is required to disable one or both features.</p>
<ul>
<li><a href="https://docs.gitlab.com/ee/administration/settings/import_and_export_settings.html#enable-migration-of-groups-and-projects-by-direct-transfer">Direct transfers</a></li>
<li><a href="https://docs.gitlab.com/ee/user/application_security/policies/scan-execution-policies.html">Security policies</a></li>
</ul>
<p><strong>If both features are turned on, the instance is in a vulnerable state.</strong></p>
<h2 id="non-security-patches">Non Security Patches</h2>
<p>This security release also includes the following non-security patches.</p>
<h3 id="1634">16.3.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131073">Use new indexer, fix removing blobs from index</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131920">Backport &ldquo;Fix Geo secondary proxying Git pulls unnecessarily&rdquo; to 16.3</a></li>
</ul>
<h3 id="1627">16.2.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131193">Revert &ldquo;Merge branch &lsquo;md-play-all-skipped-button&rsquo; into &lsquo;master&rsquo;&rdquo;</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.2.6</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-6-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-6-released/</id><published>2023-09-12T00:00:00Z</published><updated>2023-09-12T00:00:00Z</updated><author><name>Vladimir Glafirov</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 12, 2023, we released versions 16.2.6 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1626">16.2.6</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1526">Pin redis-client to v0.14.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6338">praefect: Handle replica paths in &rsquo;track-repository&rsquo; and &rsquo;track-repositories&rsquo; subcommands</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130836">Backport create ci_pipelines iid sequence on new projects to 16.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130834">Backport &ldquo;Drop bridge jobs on unknown failures&rdquo; to 16.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131155">Backport &ldquo;Prevent pipeline creation while import is running&rdquo; to 16.2</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.3.3</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-3-released/</id><published>2023-09-12T00:00:00Z</published><updated>2023-09-12T00:00:00Z</updated><author><name>Vladimir Glafirov</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 12, 2023, we released versions 16.3.3 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1633">16.3.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1529">Pin redis-client to v0.17.0</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6339">Backport !6251 to 16-3-stable</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130835">Backport create ci_pipelines iid sequence on new projects to 16.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130576">Backport 16.3  Fix cluster service reindexing params</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130823">Patch UpdateCiMaxTotalYamlSizeBytesDefaultValue - stable branch</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131121">Remove gdk base image and pin gdk sha</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131070">Backport Enable sync with package metadata db by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131156">Backport &ldquo;Prevent pipeline creation while import is running&rdquo; to 16.3</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.3.2</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-2-released/</id><published>2023-09-05T00:00:00Z</published><updated>2023-09-05T00:00:00Z</updated><author><name>Vladimir Glafirov</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On September 5, 2023, we released versions 16.3.2 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1632">16.3.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130755">Fix Code Suggestions in Web IDE on GitLab 16.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130833">Backport &ldquo;Drop bridge jobs on unknown failures&rdquo; to 16.3</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.3.1, 16.2.5, and 16.1.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-3-1-released/</id><published>2023-08-31T00:00:00Z</published><updated>2023-08-31T00:00:00Z</updated><author><name>Félix Veillette-Potvin</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On August 31, 2023, we released versions 16.3.1, 16.2.5 and 16.1.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#privilege-escalation-of-external-user-to-internal-access-through-group-service-account">Privilege escalation of &ldquo;external user&rdquo; to internal access through group service account</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#maintainer-can-leak-sentry-token-by-changing-the-configured-url-fix-bypass">Maintainer can leak sentry token by changing the configured URL (fix bypass)</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#google-cloud-logging-private-key-showed-in-plain-text-in-gitlab-ui-leaking-to-other-group-owners">Google Cloud Logging private key showed in plain text in GitLab UI leaking to other group owners</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#information-disclosure-via-project-import-endpoint">Information disclosure via project import endpoint</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#developer-can-leak-dast-scanners-site-profile-request-headers-and-auth-password">Developer can leak DAST scanners &ldquo;Site Profile&rdquo; request headers and auth password</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#project-forking-outside-current-group">Project forking outside current group</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#user-is-capable-of-creating-model-experiment-and-updating-existing-run%27s-status-in-public-project">User is capable of creating Model experiment and updating existing run&rsquo;s status in public project</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#redos-in-bulk-import-api">ReDoS in bulk import API</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#pagination-for-branches-and-tags-can-be-skipped-leading-to-dos">Pagination for Branches and Tags can be skipped leading to DoS</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#internal-open-redirection-due-to-improper-handling-of-characters">Internal Open Redirection Due to Improper handling of  &ldquo;../&rdquo; characters</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#subgroup-member-with-reporter-role-can-edit-group-labels">Subgroup Member With Reporter Role Can Edit Group Labels</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-3-1-released/#banned-user-can-delete-package-registries">Banned user can delete package registries</a></td>
          <td>low</td>
      </tr>
  </tbody>
</table>
<h2 id="privilege-escalation-of-external-user-to-internal-access-through-group-service-account">Privilege escalation of &ldquo;external user&rdquo; to internal access through group service account</h2>
<p>An issue has been discovered in GitLab EE affecting all versions starting from 16.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. If an external user is given an owner role on any group, that external user may escalate their privileges on the instance by creating a service account in that group. This service account is not classified as external and may be used to access internal projects. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3915">CVE-2023-3915</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="maintainer-can-leak-sentry-token-by-changing-the-configured-url-fix-bypass">Maintainer can leak sentry token by changing the configured URL (fix bypass)</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/950 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A malicious Maintainer can, under specific circumstances, leak the sentry token by changing the configured URL in the Sentry error tracking settings page. This was as a result of an incomplete fix for CVE-2022-4365. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</code>, 5.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4378">CVE-2023-4378</a>.</p>
<p>Thanks <a href="https://hackerone.com/70rpedo">70rpedo</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="google-cloud-logging-private-key-showed-in-plain-text-in-gitlab-ui-leaking-to-other-group-owners">Google Cloud Logging private key showed in plain text in GitLab UI leaking to other group owners</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/940 -->
<p>An information disclosure issue in GitLab EE affecting all versions from 16.2 prior to 16.2.5, and 16.3 prior to 16.3.1 allowed other Group Owners to see the Public Key for a Google Cloud Logging audit event streaming destination, if configured. Owners can now only write the key, not read it. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</code>, 5.5), and affects only GitLab EE. It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3950">CVE-2023-3950</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="information-disclosure-via-project-import-endpoint">Information disclosure via project import endpoint</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.6 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which any user can read limited information about any project&rsquo;s imports. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</code>, 5.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4630">CVE-2023-4630</a>.</p>
<p>This vulnerability was found internally by a GitLab team member <a href="https://gitlab.com/rodrigo.tomonari">Rodrigo Tomonari</a>.</p>
<h2 id="developer-can-leak-dast-scanners-site-profile-request-headers-and-auth-password">Developer can leak DAST scanners &ldquo;Site Profile&rdquo; request headers and auth password</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/954 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which a project member can leak credentials stored in site profile. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</code>, 5.0), and only affects GitLab EE. It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4343">CVE-2022-4343</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="project-forking-outside-current-group">Project forking outside current group</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.3 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to fork a project outside of current group by an unauthorised user. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4638">CVE-2023-4638</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="user-is-capable-of-creating-model-experiment-and-updating-existing-runs-status-in-public-project">User is capable of creating Model experiment and updating existing run&rsquo;s status in public project</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to create model experiments in public projects. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4018">CVE-2023-4018</a>.</p>
<p>Thanks <a href="https://hackerone.com/ricardobrito">ricardobrito</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="redos-in-bulk-import-api">ReDoS in bulk import API</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/935 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. An authenticated user could trigger a denial of service when importing or cloning malicious content. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>,6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3205">CVE-2023-3205</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="pagination-for-branches-and-tags-can-be-skipped-leading-to-dos">Pagination for Branches and Tags can be skipped leading to DoS</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.3 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 in which the projects API pagination can be skipped, potentially leading to DoS on certain instances. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 5.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4647">CVE-2023-4647</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/vyaklushin">Vasilii Iakliushin</a></p>
<h2 id="internal-open-redirection-due-to-improper-handling-of---characters">Internal Open Redirection Due to Improper handling of  &ldquo;../&rdquo; characters</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/934 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 4.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 where it was possible to create a URL that would redirect to a different project. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code>, 3.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1279">CVE-2023-1279</a>.</p>
<p>Thanks <a href="https://hackerone.com/akadrian">akadrian</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="subgroup-member-with-reporter-role-can-edit-group-labels">Subgroup Member With Reporter Role Can Edit Group Labels</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. Due to improper permission validation it was possible to edit labels description by an unauthorised user. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N</code>, 3.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0120">CVE-2023-0120</a>.</p>
<p>Thanks <a href="https://hackerone.com/drjgouveia">drjgouveia</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="banned-user-can-delete-package-registries">Banned user can delete package registries</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N</code>, 2.7). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1555">CVE-2023-1555</a>.</p>
<p>Thanks <a href="https://hackerone.com/ali_shehab">ali_shehab</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="update-commonmarker">Update commonmarker</h2>
<p>Commonmarker has been updated to version 0.23.10 in order to mitigate security issues.</p>
<h2 id="update-openssl">Update openssl</h2>
<p>Openssl has been updated to version to 1.1.1u in order to mitigate security issues.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<p>This security release also includes the following non-security patches.</p>
<h3 id="1631">16.3.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129854">Remove unified URL limitation for GitLab chart (16.3 backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129910">Revert migration to backfill archived in wikis</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129922">Add .net to context selector to skip live envs</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129882">Backport &ldquo;Geo: Resync direct upload object stored artifacts&rdquo; to 16.3</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/130200">CSP: disable LFS url when not using object storage</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129971">Backport LicenseScanning fix for AutoDevOps</a></li>
</ul>
<h3 id="1625">16.2.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/6172">Backport &ldquo;cgroup: using a noop manager on linux without cgroup&rdquo; fix to 16.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128763">Adjust Danger logic for stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129883">Backport &ldquo;Geo: Resync direct upload object stored artifacts&rdquo; to 16.2</a></li>
</ul>
<h3 id="1615">16.1.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128779">Revert &ldquo;Log rails response length&rdquo; - 16.1 Backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128764">Adjust Danger logic for stable branches</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/129884">Backport &ldquo;Geo: Resync direct upload object stored artifacts&rdquo; to 16.1</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.2.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-4-released/</id><published>2023-08-11T00:00:00Z</published><updated>2023-08-11T00:00:00Z</updated><author><name>Reuben Pereira</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 11, 2023, we released versions 16.2.4 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1624">16.2.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128253">Backport &lsquo;420347-fix-new-index-settings&rsquo; to 16.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128720">Backport Fix max number of slices to 16.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128708">Put back broadcast messages to sign-in page for self-hosted</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128778">Revert &ldquo;Remove log_response_length feature flag&rdquo; - 16.2 Backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128942">Fix broken dependency list for invalid Container Scanning pkg mgr type</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128950">Replace vscode-cdn.net with web-ide.gitlab-static.net (Backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7075">Set proxy_http_version v1.0 for health monitoring endpoints</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.1.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-1-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-1-4-released/</id><published>2023-08-03T00:00:00Z</published><updated>2023-08-03T00:00:00Z</updated><author><name>Steve Abrams</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 3, 2023, we released version 16.1.4 for GitLab Community Edition and Enterprise Edition.</p>
<p>This version resolves a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1614">16.1.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128291">Backport &ldquo;Fix artifacts object storage geo replication&rdquo; to 16.1</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.2.3</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-3-released/</id><published>2023-08-03T00:00:00Z</published><updated>2023-08-03T00:00:00Z</updated><author><name>Reuben Pereira</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On August 3, 2023, we released versions 16.2.3 for GitLab Community Edition and Enterprise Edition.</p>
<p>This version resolves a bug.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1623">16.2.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128290">Backport &ldquo;Fix artifacts object storage geo replication&rdquo; to 16.2</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="https://docs.gitlab.com/ee/update/zero_downtime.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.2.2, 16.1.3, and 16.0.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-2-released/</id><published>2023-08-01T00:00:00Z</published><updated>2023-08-01T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On August 1, 2023, we released versions 16.2.2, 16.1.3, and 16.0.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#redos-via-projectreferencefilter-in-any-markdown-fields">ReDoS via ProjectReferenceFilter in any Markdown fields</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#redos-via-autolinkfilter-in-any-markdown-fields">ReDoS via AutolinkFilter in any Markdown fields</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#an-attacker-can-run-pipeline-jobs-as-arbitrary-user">An attacker can run pipeline jobs as arbitrary user</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#regex-dos-in-harbor-registry-search">Regex DoS in Harbor Registry search</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#arbitrary-read-of-files-owned-by-the-git-user-via-malicious-targz-file-upload-using-gitlab-export-functionality">Arbitrary read of files owned by the &ldquo;git&rdquo; user via malicious tar.gz file upload using GitLab export functionality</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#stored-xss-in-web-ide-beta-via-crafted-url">Stored XSS in Web IDE Beta via crafted URL</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#securitypolicyprojectassign-mutation-does-not-authorize-security-policy-project-id"><code>securityPolicyProjectAssign</code> mutation does not authorize security policy project ID</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#possible-pages-unique-domain-overwrite">Possible Pages Unique Domain Overwrite</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#access-tokens-may-have-been-logged-when-a-query-was-made-to-an-endpoint">Access tokens may have been logged when a query was made to an endpoint</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#reflected-xss-via-plantuml-diagram">Reflected XSS via PlantUML diagram</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#the-main-branch-of-a-repository-with-a-specially-designed-name-may-allow-an-attacker-to-create-repositories-with-malicious-code">The main branch of a repository with a specially designed name may allow an attacker to create repositories with malicious code</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#invalid-start_sha-value-on-merge-requests-page-may-lead-to-denial-of-service">Invalid &lsquo;start_sha&rsquo; value on merge requests page may lead to Denial of Service</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#developers-can-create-pipeline-schedules-on-protected-branches-even-if-they-dont-have-access-to-merge">Developers can create pipeline schedules on protected branches even if they don&rsquo;t have access to merge</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#potential-dos-due-to-lack-of-pagination-while-loading-license-data">Potential DOS due to lack of pagination while loading license data</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-2-2-released/#leaking-emails-of-newly-created-users">Leaking emails of newly created users</a></td>
          <td>low</td>
      </tr>
  </tbody>
</table>
<h2 id="redos-via-projectreferencefilter-in-any-markdown-fields">ReDoS via ProjectReferenceFilter in any Markdown fields</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/910 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3994">CVE-2023-3994</a>.</p>
<p>Thanks <a href="https://hackerone.com/ryhmnlfj">ryhmnlfj</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="redos-via-autolinkfilter-in-any-markdown-fields">ReDoS via AutolinkFilter in any Markdown fields</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/925 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use AutolinkFilter to the preview_markdown endpoint. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3364">CVE-2023-3364</a>.</p>
<p>Thanks <a href="https://hackerone.com/ryhmnlfj">ryhmnlfj</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="an-attacker-can-run-pipeline-jobs-as-arbitrary-user">An attacker can run pipeline jobs as arbitrary user</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/917 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N</code>, 8.2). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932">CVE-2023-3932</a>.</p>
<p>Thanks <a href="https://hackerone.com/vaib25vicky">vaib25vicky</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="regex-dos-in-harbor-registry-search">Regex DoS in Harbor Registry search</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/913 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0632">CVE-2023-0632</a>.</p>
<p>Thanks <a href="https://hackerone.com/joaxcar">joaxcar</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="arbitrary-read-of-files-owned-by-the-git-user-via-malicious-targz-file-upload-using-gitlab-export-functionality">Arbitrary read of files owned by the &ldquo;git&rdquo; user via malicious tar.gz file upload using GitLab export functionality</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/926 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.10 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Under specific circumstances, a user importing a project &lsquo;from export&rsquo; could access and read unrelated files via uploading a specially crafted file. This was due to a bug in <code>tar</code>, fixed in <a href="https://lists.gnu.org/archive/html/info-gnu/2023-07/msg00005.html"><code>tar-1.35</code></a>. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</code>, 6.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3385">CVE-2023-3385</a>.</p>
<p>Thanks <a href="https://hackerone.com/ubercomp">ubercomp</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="stored-xss-in-web-ide-beta-via-crafted-url">Stored XSS in Web IDE Beta via crafted URL</h2>
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to trigger a stored XSS vulnerability via user interaction with a crafted URL in the WebIDE beta. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N</code>, 5.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2164">CVE-2023-2164</a>.</p>
<p>Thanks <a href="https://hackerone.com/viridian_40826d">viridian_40826d</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="securitypolicyprojectassign-mutation-does-not-authorize-security-policy-project-id"><code>securityPolicyProjectAssign</code> mutation does not authorize security policy project ID</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/929 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 14.1 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for EE-licensed users to link any security policy project by its ID to projects or groups the user has access to, potentially revealing the security projects&rsquo;s configured security policies. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</code>, 5.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4002">CVE-2023-4002</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/bauerdominic">bauerdominic</a>.</p>
<h2 id="possible-pages-unique-domain-overwrite">Possible Pages Unique Domain Overwrite</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/920 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to takeover GitLab Pages with unique domain URLs if the random string added was known. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N</code>, 5.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4008">CVE-2023-4008</a>.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/kassio">kassio</a>.</p>
<h2 id="access-tokens-may-have-been-logged-when-a-query-was-made-to-an-endpoint">Access tokens may have been logged when a query was made to an endpoint</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/906 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Access tokens may have been logged when a query was made to a specific endpoint. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</code>, 4.9). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3993">CVE-2023-3993</a>.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/mjozenazemian">mjozenazemian</a>.</p>
<h2 id="reflected-xss-via-plantuml-diagram">Reflected XSS via PlantUML diagram</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/932 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A reflected XSS was possible when creating specific PlantUML diagrams that allowed the attacker to perform arbitrary actions on behalf of victims. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</code>, 4.8). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3500">CVE-2023-3500</a>.</p>
<p>Thanks <a href="https://hackerone.com/ankitsingh">ankitsingh</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="the-main-branch-of-a-repository-with-a-specially-designed-name-may-allow-an-attacker-to-create-repositories-with-malicious-code">The main branch of a repository with a specially designed name may allow an attacker to create repositories with malicious code</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/915 -->
<p>An issue has been discovered in GitLab affecting all versions before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N</code>, 4.8). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3401">CVE-2023-3401</a>.</p>
<p>Thanks <a href="https://hackerone.com/st4nly0n">st4nly0n</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="invalid-start_sha-value-on-merge-requests-page-may-lead-to-denial-of-service">Invalid &lsquo;start_sha&rsquo; value on merge requests page may lead to Denial of Service</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/928 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. An invalid &lsquo;start_sha&rsquo; value on merge requests page may lead to Denial of Service as Changes tab would not load. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3900">CVE-2023-3900</a>.</p>
<p>Thanks <a href="https://hackerone.com/toukakirishima">toukakirishima</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="developers-can-create-pipeline-schedules-on-protected-branches-even-if-they-dont-have-access-to-merge">Developers can create pipeline schedules on protected branches even if they don&rsquo;t have access to merge</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/901 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2, which leads to developers being able to create pipeline schedules on protected branches even if they don&rsquo;t have access to merge. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2022">CVE-2023-2022</a>.</p>
<p>Thanks <a href="https://hackerone.com/js_noob">js_noob</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="potential-dos-due-to-lack-of-pagination-while-loading-license-data">Potential DOS due to lack of pagination while loading license data</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/931 -->
<p>An issue has been discovered in GitLab EE affecting all versions from 15.11 prior to 16.2.2 which allows an attacker to spike the resource consumption by loading Dependency List page, resulting in a possible DoS. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3). It is mitigated in the latest 16.2.2 release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4011">CVE-2023-4011</a>.</p>
<p>This vulnerability was discovered internally by GitLab team member <a href="https://gitlab.com/gonzoyumo">gonzoyumo</a>.</p>
<h2 id="leaking-emails-of-newly-created-users">Leaking emails of newly created users</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/927 -->
<p>An issue has been discovered in GitLab affecting all versions starting from 12.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to leak a user&rsquo;s email via an error message for groups that restrict membership by email domain. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1210">CVE-2023-1210</a>.</p>
<p>Thanks <a href="https://hackerone.com/shells3c">shells3c</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="update-mattermost">Update Mattermost</h2>
<p>Mattermost has been updated to version 7.10.4  in order to mitigate security issues.</p>
<h2 id="update-redis">Update Redis</h2>
<p>Redis has been updated to version 6.2.13 in order to mitigate security issues.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<p>This security release also includes the following non-security patches.</p>
<h3 id="1622">16.2.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127238" title="Merge branch &#39;418983-fix-issue-type-update&#39; into &#39;master&#39;">Issue type change to incident results in 404</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127045" title="Enable descendant_security_scans by default">Enable <code>descendant_security_scans</code> by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127516" title="Disable IAT verification by default">Disable IAT verification by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127777" title="BitBucket Server Importer - Preserve PR (MR) reviewers">BitBucket Server Importer - Preserve PR (MR) reviewers</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7060" title="Toggle recommend_pg_upgrade to false for now">Toggle <code>recommend_pg_upgrade</code> to false for now</a></li>
</ul>
<h3 id="1613">16.1.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/125261" title="Geo: Backport design repos verification bug fix">Geo: Backport design repos verification bug fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/125316" title="Geo - Backport wiki repository verification fix">Geo - Backport wiki repository verification fix</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/126783" title="Fix FOUC when new sidebar enabled">Fix FOUC when new sidebar enabled</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127515" title="[16.1] Repair the trigger for Release Environments">Repair the trigger for Release Environments</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127517" title="Disable IAT verification by default">Disable IAT verification by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127402" title="Backport fix for pending direct uploads completion to 16.1">Backport fix for pending direct uploads completion to 16.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127778" title="BitBucket Server Importer - Preserve PR (MR) reviewers">BitBucket Server Importer - Preserve PR (MR) reviewers</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7050" title="Fix pg-upgrade failure on Geo secondary nodes [16.1]">Fix pg-upgrade failure on Geo secondary nodes [16.1]</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7034" title="Don&#39;t 500 when pages tries to serve a chunked file">Don&rsquo;t 500 when pages tries to serve a chunked file</a></li>
</ul>
<h3 id="1608">16.0.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127518" title="Disable IAT verification by default">Disable IAT verification by default</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/7051" title="Fix pg-upgrade failure on Geo secondary nodes [16.0]">Fix pg-upgrade failure on Geo secondary nodes [16.0]</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.2.1</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-2-1-released/</id><published>2023-07-25T00:00:00Z</published><updated>2023-07-25T00:00:00Z</updated><author><name>Reuben Pereira</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On July 25, 2023, we released versions 16.2.1 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1621">16.2.1</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127401">Backport fix for pending direct uploads completion to 16.2</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/127313">Fix crash when LDAP CA file set outside tls_options</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="http://docs.gitlab.com/omnibus/update/README.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.1.2, 16.0.7, and 15.11.11</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-1-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-1-2-released/</id><published>2023-07-05T00:00:00Z</published><updated>2023-07-05T00:00:00Z</updated><author><name>Greg Myers</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On July 5, 2023, we released versions 16.1.2, 16.0.7, and 15.11.11 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab Enterprise Edition installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all GitLab EE installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-2-released/#a-user-can-change-the-name-and-path-of-some-public-gitlab-groups">A user can change the name and path of some public GitLab groups</a></td>
          <td>high</td>
      </tr>
  </tbody>
</table>
<h2 id="a-user-can-change-the-name-and-path-of-some-public-gitlab-groups">A user can change the name and path of some public GitLab groups</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/912 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H</code>, 8.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3484">CVE-2023-3484</a>.</p>
<p>Thanks <a href="https://hackerone.com/zeb0x01">zeb0x01</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<p>This security release also includes the following non-security patches.</p>
<h3 id="1612">16.1.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/124818" title="Fix environments tab is empty after upgrading to 16.1">Fix environments tab is empty after upgrading to 16.1</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/125074" title="Fix Bitbucket Cloud Importer: 16.1 backport">Fix Bitbucket Cloud Importer: 16.1 backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/125111" title="Fix GitHub Importer: 16.1 Backport">Fix GitHub Importer: 16.1 Backport</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/125116" title="Fix overlapping titles in wiki sidebar navigation">Fix overlapping titles in wiki sidebar navigation</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/124613" title="Reset webpack path for Mermaid iFrames">Reset webpack path for Mermaid iFrames</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.1.1, 16.0.6, and 15.11.10</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-1-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-1-1-released/</id><published>2023-06-29T00:00:00Z</published><updated>2023-06-29T00:00:00Z</updated><author><name>Nikhil George</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On June 29, 2023, we released versions 16.1.1, 16.0.6, and 15.11.10 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#redos-via-epicreferencefilter-in-any-markdown-fields">ReDoS via EpicReferenceFilter in any Markdown fields</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#new-commits-to-private-projects-visible-in-forks-created-while-project-was-public">New commits to private projects visible in forks created while project was public</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#code-owners-approvals-are-not-removed-allowing-merge-into-protected-branches">Code Owners approvals are not removed allowing merge into protected branches</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#maintainer-can-leak-masked-webhook-secrets-by-manipulating-url-masking">Maintainer can leak masked webhook secrets by manipulating URL masking</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#information-disclosure-of-project-import-errors">Information disclosure of project import errors</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#sensitive-information-disclosure-via-value-stream-analytics-controller">Sensitive information disclosure via value stream analytics controller</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#bypassing-code-owners-branch-protection-rule-in-gitlab">Bypassing Code Owners branch protection rule in GitLab</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#html-injection-in-email-address">HTML injection in email address</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#webhook-token-leaked-in-sidekiq-logs-if-log-format-is-default">Webhook token leaked in Sidekiq logs if log format is &lsquo;default&rsquo;</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-1-1-released/#private-email-address-of-service-desk-issue-creator-disclosed-via-issues-api">Private email address of service desk issue creator disclosed via issues API</a></td>
          <td>low</td>
      </tr>
  </tbody>
</table>
<h2 id="redos-via-epicreferencefilter-in-any-markdown-fields">ReDoS via EpicReferenceFilter in any Markdown fields</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/902 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3424">CVE-2023-3424</a>.</p>
<p>Thanks <a href="https://hackerone.com/ryhmnlfj">ryhmnlfj</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="new-commits-to-private-projects-visible-in-forks-created-while-project-was-public">New commits to private projects visible in forks created while project was public</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/905 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.10 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. It may be possible for users to view new commits to private projects in a fork created while the project was public. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2190">CVE-2023-2190</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="code-owners-approvals-are-not-removed-allowing-merge-into-protected-branches">Code Owners approvals are not removed allowing merge into protected branches</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/907 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to merge arbitrary code into protected branches due to a CODEOWNERS approval bug. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N</code>, 5.7). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3444">CVE-2023-3444</a>.</p>
<p>Thanks <a href="https://hackerone.com/glan1k">glan1k</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="maintainer-can-leak-masked-webhook-secrets-by-manipulating-url-masking">Maintainer can leak masked webhook secrets by manipulating URL masking</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/908 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1. A maintainer could modify a webhook URL to leak masked webhook secrets by manipulating other masked portions. This addresses an incomplete fix for CVE-2023-0838. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N</code>, 5.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2620">CVE-2023-2620</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="information-disclosure-of-project-import-errors">Information disclosure of project import errors</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/903 -->
<p>An information disclosure issue in GitLab CE/EE affecting all versions from 16.0 prior to 16.0.6, and version 16.1.0 allows unauthenticated actors to access the import error information if a project was imported from GitHub. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code>, 5.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3362">CVE-2023-3362</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member <a href="https://gitlab.com/rodrigo.tomonari">Rodrigo Tomonari</a>.</p>
<h2 id="sensitive-information-disclosure-via-value-stream-analytics-controller">Sensitive information disclosure via value stream analytics controller</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/898 -->
<p>A sensitive information leak issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows access to titles of private issues and merge requests. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</code>, 5.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3102">CVE-2023-3102</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bypassing-code-owners-branch-protection-rule-in-gitlab">Bypassing Code Owners branch protection rule in GitLab</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/894 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. This allowed a developer to remove the CODEOWNERS rules and merge to a protected branch. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2576">CVE-2023-2576</a>.</p>
<p>Thanks <a href="https://hackerone.com/inspector-ambitious">inspector-ambitious</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="html-injection-in-email-address">HTML injection in email address</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/900 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N</code>, 4.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2200">CVE-2023-2200</a>.</p>
<p>Thanks <a href="https://hackerone.com/cryptopone">cryptopone</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="webhook-token-leaked-in-sidekiq-logs-if-log-format-is-default">Webhook token leaked in Sidekiq logs if log format is &lsquo;default&rsquo;</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/904 -->
<p>An information disclosure issue in Gitlab CE/EE affecting all versions from 13.6 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1, resulted in the Sidekiq log including webhook tokens when the log format was set to <code>default</code>. This is a low severity issue (<code>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N</code>, 3.9). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3363">CVE-2023-3363</a>.</p>
<p>This vulnerability was reported by Martin Vaisset from MyMoneyBank.</p>
<h2 id="private-email-address-of-service-desk-issue-creator-disclosed-via-issues-api">Private email address of service desk issue creator disclosed via issues API</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/897 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to leak the email address of a user who created a service desk issue. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N</code>, 3.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1936">CVE-2023-1936</a>.</p>
<p>Thanks <a href="https://hackerone.com/ricardobrito">ricardobrito</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="update-mattermost">Update Mattermost</h2>
<p>Mattermost has been updated to version 7.10.2 in GitLab 16.0.6 and version 7.9.4 in GitLab 15.11.10 in order to mitigate security issues.</p>
<h2 id="update-xmlsoftlibxml2-to-version-2104">Update xmlsoft/libxml2 to version 2.10.4</h2>
<p>xmlsoft/libxml2 has been updated to version 2.10.4 in order to mitigate security issues.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.0.5</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-5-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-5-released/</id><published>2023-06-16T00:00:00Z</published><updated>2023-06-16T00:00:00Z</updated><author><name>Alessio Caiazza</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 16, 2023, we released versions 16.0.5 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1605">16.0.5</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122335">Update gitlab-elasticsearch-indexer version</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122995">Add Metrics Dashboard menu</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/123155">Fix HllRedisCounter overwriting know events aggregation with symbol instead of string (backport)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122859">Slowly iterate MigrateSharedVulnerabilityIdentifiers</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/123699">Do not run bulk cron indexer when cluster is unhealthy</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/123524">Use root_ref to index commits</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="http://docs.gitlab.com/omnibus/update/README.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.0.4</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-4-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-4-released/</id><published>2023-06-08T00:00:00Z</published><updated>2023-06-08T00:00:00Z</updated><author><name>Alessio Caiazza</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 8, 2023, we released versions 16.0.4 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1604">16.0.4</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122797">Fix LDAP tls_options not working</a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="http://docs.gitlab.com/omnibus/update/README.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Patch Release: 16.0.3</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-3-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-3-released/</id><published>2023-06-07T00:00:00Z</published><updated>2023-06-07T00:00:00Z</updated><author><name>Jenny Kim</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<!-- For detailed instructions on how to complete this, please see https://gitlab.com/gitlab-org/release/docs/-/blob/master/general/patch/blog-post.md -->
<p>On June 7, 2023, we released versions 16.0.3 for GitLab Community Edition and Enterprise Edition.</p>
<p>These versions resolve a number of regressions and bugs.</p>
<h2 id="gitlab-community-edition-and-enterprise-edition">GitLab Community Edition and Enterprise Edition</h2>
<h3 id="1603">16.0.3</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122395">Fix serialization of pull_requests in Bitbucket Server Import</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122539">Fix memory leak in CI config includes entry</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122466">Fix MR approval rules sync when disabling scan result policy</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122349">LFS: Serve pre-signed URLs in <code>/lfs/objects/batch</code></a></li>
</ul>
<h2 id="important-notes-on-upgrading">Important notes on upgrading</h2>
<p>This version does not include any new migrations, and for multi-node deployments, <a href="https://docs.gitlab.com/ee/update/#upgrading-without-downtime">should not require any downtime</a>.</p>
<p>Please be aware that by default the Omnibus packages will stop, run migrations,
and start again, no matter how “big” or “small” the upgrade is. This behavior
can be changed by adding a <a href="http://docs.gitlab.com/omnibus/update/README.html"><code>/etc/gitlab/skip-auto-reconfigure</code></a> file,
which is only used for <a href="https://docs.gitlab.com/omnibus/update/README.html">updates</a>.</p>
<h2 id="updating">Updating</h2>
<p>To update, check out our <a href="https://about.gitlab.com/update/">update page</a>.</p>
<h2 id="gitlab-subscriptions">GitLab subscriptions</h2>
<p>Access to GitLab Premium and Ultimate features is granted by a paid <a href="https://about.gitlab.com/pricing/">subscription</a>.</p>
<p>Alternatively, <a href="https://gitlab.com/users/sign_in">sign up for GitLab.com</a>
to use GitLab&rsquo;s own infrastructure.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Security Release: 16.0.2, 15.11.7, and 15.10.8</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-2-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-2-released/</id><published>2023-06-05T00:00:00Z</published><updated>2023-06-05T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On June 5, 2023, we released versions 16.0.2, 15.11.7, and 15.10.8 for GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
<p>These versions contain important security fixes, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#stored-xss-with-csp-bypass-in-merge-requests">Stored-XSS with CSP-bypass in Merge requests</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#redos-via-frontmatterfilter-in-any-markdown-fields">ReDoS via FrontMatterFilter in any Markdown fields</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#redos-via-inlinedifffilter-in-any-markdown-fields">ReDoS via InlineDiffFilter in any Markdown fields</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#redos-via-dollarmathpostfilter-in-markdown-fields">ReDoS via DollarMathPostFilter in Markdown fields</a></td>
          <td>high</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#dos-via-malicious-test-report-artifacts">DoS via malicious test report artifacts</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#restricted-ip-addresses-can-clone-repositories-of-public-projects">Restricted IP addresses can clone repositories of public projects</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#reflected-xss-in-report-abuse-functionality">Reflected XSS in Report Abuse Functionality</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#privilege-escalation-from-maintainer-to-owner-by-importing-members-from-a-project">Privilege escalation from maintainer to owner by importing members from a project</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#bypassing-tags-protection-in-gitlab">Bypassing tags protection in GitLab</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#denial-of-service-using-multiple-labels-with-arbitrarily-large-descriptions">Denial of Service using multiple labels with arbitrarily large descriptions</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#ability-to-use-an-unverified-email-for-public-and-commit-emails">Ability to use an unverified email for public and commit emails</a></td>
          <td>medium</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#open-redirection-through-http-response-splitting">Open Redirection Through HTTP Response Splitting</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#disclosure-of-issue-notes-to-an-unauthorized-user-when-exporting-a-project">Disclosure of issue notes to an unauthorized user when exporting a project</a></td>
          <td>low</td>
      </tr>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-2-released/#ambiguous-branch-name-exploitation">Ambiguous branch name exploitation</a></td>
          <td>low</td>
      </tr>
  </tbody>
</table>
<h2 id="stored-xss-with-csp-bypass-in-merge-requests">Stored-XSS with CSP-bypass in Merge requests</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/893 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A specially crafted merge request could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N</code>, 8.7). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2442">CVE-2023-2442</a>.</p>
<p>Thanks <a href="https://hackerone.com/yvvdwf">yvvdwf</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="redos-via-frontmatterfilter-in-any-markdown-fields">ReDoS via FrontMatterFilter in any Markdown fields</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/888 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2199">CVE-2023-2199</a>.</p>
<p>Thanks <a href="https://hackerone.com/ryhmnlfj">ryhmnlfj</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="redos-via-inlinedifffilter-in-any-markdown-fields">ReDoS via InlineDiffFilter in any Markdown fields</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/887 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2198">CVE-2023-2198</a>.</p>
<p>Thanks <a href="https://hackerone.com/ryhmnlfj">ryhmnlfj</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="redos-via-dollarmathpostfilter-in-markdown-fields">ReDoS via DollarMathPostFilter in Markdown fields</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/881 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A DollarMathPostFilter Regular Expression Denial of Service in was possible by sending crafted payloads to the preview_markdown endpoint. This is a high severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</code>, 7.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2132">CVE-2023-2132</a>.</p>
<p>Thanks <a href="https://hackerone.com/ryhmnlfj">ryhmnlfj</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="dos-via-malicious-test-report-artifacts">DoS via malicious test report artifacts</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/850 -->
<p>A denial of service issue was discovered in GitLab CE/EE affecting all versions starting from 13.2.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2 which allows an attacker to cause high resource consumption using malicious test report artifacts. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</code>, 6.5). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0121">CVE-2023-0121</a>.</p>
<p>Thanks <a href="https://hackerone.com/luryus">luryus</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="restricted-ip-addresses-can-clone-repositories-of-public-projects">Restricted IP addresses can clone repositories of public projects</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/889 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N</code>, 5.9). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2589">CVE-2023-2589</a>.</p>
<p>Thanks <a href="https://hackerone.com/ali_shehab">ali_shehab</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="reflected-xss-in-report-abuse-functionality">Reflected XSS in Report Abuse Functionality</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/875 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.8 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A reflected XSS was possible when creating new abuse reports which allows attackers to perform arbitrary actions on behalf of victims. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N</code>, 4.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2015">CVE-2023-2015</a>.</p>
<p>Thanks <a href="https://hackerone.com/akadrian">akadrian</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="privilege-escalation-from-maintainer-to-owner-by-importing-members-from-a-project">Privilege escalation from maintainer to owner by importing members from a project</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/892 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A malicious maintainer in a project can escalate other users to Owners in that project if they import members from another project that those other users are Owners of. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N</code>, 4.4). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2485">CVE-2023-2485</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="bypassing-tags-protection-in-gitlab">Bypassing tags protection in GitLab</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/890 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker was able to spoof protected tags, which could potentially lead a victim to download malicious code. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2001">CVE-2023-2001</a>.</p>
<p>Thanks <a href="https://hackerone.com/inspector-ambitious">inspector-ambitious</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="denial-of-service-using-multiple-labels-with-arbitrarily-large-descriptions">Denial of Service using multiple labels with arbitrarily large descriptions</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/880 -->
<p>A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0921">CVE-2023-0921</a>.</p>
<p>Thanks <a href="https://hackerone.com/cryptopone">cryptopone</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="ability-to-use-an-unverified-email-for-public-and-commit-emails">Ability to use an unverified email for public and commit emails</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/867 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings. This is a medium severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</code>, 4.3). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1204">CVE-2023-1204</a>.</p>
<p>Thanks <a href="https://hackerone.com/theluci">theluci</a> for reporting this vulnerability through our HackerOne bug bounty program</p>
<h2 id="open-redirection-through-http-response-splitting">Open Redirection Through HTTP Response Splitting</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/885 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. Open redirection was possible via HTTP response splitting in the NPM package API. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0508">CVE-2023-0508</a>.</p>
<p>Thanks <a href="https://hackerone.com/akadrian">akadrian</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="disclosure-of-issue-notes-to-an-unauthorized-user-when-exporting-a-project">Disclosure of issue notes to an unauthorized user when exporting a project</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/854 -->
<p>An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N</code>, 3.1). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1825">CVE-2023-1825</a>.</p>
<p>This vulnerability has been discovered internally by GitLab team member.</p>
<h2 id="ambiguous-branch-name-exploitation">Ambiguous branch name exploitation</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/886 -->
<p>An issue has been discovered in GitLab CE/EE affecting all versions starting from 1.2 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code. This is a low severity issue (<code>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N</code>, 2.6). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2013">CVE-2023-2013</a>.</p>
<p>Thanks <a href="https://hackerone.com/inspector-ambitious">inspector-ambitious</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="update-mattermost">Update Mattermost</h2>
<p>Mattermost has been updated to version 7.9.3 in order to mitigate security issues.</p>
<h2 id="update-ncurses">Update Ncurses</h2>
<p>Ncurses has been updated to version 6.4-20230225 in order to mitigate security issues.</p>
<h2 id="update-postgresql">Update PostgreSQL</h2>
<p>PostgreSQL has been updated to versions 12.14 and 13.11 in order to mitigate security issues.</p>
<h2 id="non-security-patches">Non Security Patches</h2>
<p>This security release also includes the following non-security patches.</p>
<h3 id="1602">16.0.2</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121518">Update the upgrade path for 15.11 and 16.x</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121470">Introduce parallelised BitBucket Server Importer</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121872">Fix Sidekiq crash when gitlab.yml contains UTF-8 characters</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121745">Revert &ldquo;Remove legacy project routes&rdquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121843">Merge branch &lsquo;344594-fix-migration&rsquo; into &lsquo;16-0-stable-ee&rsquo;</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121606">Do not run notify-package-and-test-failure on sec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121894">Add task to fix migrations for 15.11 upgrades (16.0 Stable)</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/122345">Do not requeue the indexing worker if failures occur</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/6918">Stop supporting and using deprecated Gitaly configuration</a></li>
</ul>
<h3 id="15117">15.11.7</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/gitaly/-/merge_requests/5868">Backport &lsquo;Remove uncessary fields from pack-objects cache key computation&rsquo; to 15.11</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121608">Do not run notify-package-and-test-failure on sec</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121895">Add task to fix migrations for 15.11 upgrades (15.11 Stable)</a></li>
</ul>
<h3 id="15108">15.10.8</h3>
<ul>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1397">Update redis-namespace dependency in MailRoom</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1406">Skip weak dependencies during install on UBI</a></li>
<li><a href="https://gitlab.com/gitlab-org/build/CNG/-/merge_requests/1404">Fix restore with azcopy</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/120163">Backport &lsquo;fix-container-replication&rsquo; into 15.10</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121305">Convert some regex to use Gitlab::UntrustedRegexp</a></li>
<li><a href="https://gitlab.com/gitlab-org/gitlab/-/merge_requests/121609">Do not run notify-package-and-test-failure on sec</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/6887">Add SMTP timeout configuration options</a></li>
<li><a href="https://gitlab.com/gitlab-org/omnibus-gitlab/-/merge_requests/6877">Validate that SMTP settings do not enable both TLS and STARTTLS</a></li>
</ul>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry><entry><title>GitLab Critical Security Release: 16.0.1</title><link href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-1-released/" rel="alternate"/><id>https://docs.gitlab.com/releases/patches/patch-release-gitlab-16-0-1-released/</id><published>2023-05-23T00:00:00Z</published><updated>2023-05-23T00:00:00Z</updated><author><name>Rohit Shambhuni</name></author><content type="html"><![CDATA[<!-- markdownlint-disable -->
<!-- vale off -->
<p>On May 23, 2023, we released version 16.0.1 for GitLab Community Edition (CE) and Enterprise Edition (EE). It is only required for installations running 16.0.0. Earlier versions are not affected.</p>
<p>This version contains important security fixes, and we strongly recommend that GitLab installations running 16.0.0 be upgraded immediately. GitLab.com is already running the patched version.</p>
<p>GitLab releases patches for vulnerabilities in dedicated security releases. There are two types of security releases: a monthly, scheduled security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. For more information, you can visit our <a href="https://about.gitlab.com/security/faq/">security FAQ</a>. You can see all of our regular and security release blog posts <a href="https://about.gitlab.com/releases/categories/releases/">here</a>. In addition, the issues detailing each vulnerability are made public on our <a href="https://gitlab.com/gitlab-org/gitlab/-/issues/?sort=created_date&amp;state=closed&amp;label_name%5B%5D=bug%3A%3Avulnerability&amp;confidential=no&amp;first_page_size=100">issue tracker</a> 30 days after the release in which they were patched.</p>
<p>We are dedicated to ensuring all aspects of GitLab that are exposed to customers or that host customer data are held to the highest security standards. As part of maintaining good security hygiene, it is highly recommended that all customers upgrade to the latest security release for their supported version. You can read more <a href="https://about.gitlab.com/blog/gitlab-instance-security-best-practices/">best practices in securing your GitLab instance</a> in our blog post.</p>
<h3 id="recommended-action">Recommended Action</h3>
<p>We <strong>strongly recommend</strong> that all installations running a version affected by the issues described below are <strong>upgraded to the latest version as soon as possible</strong>.</p>
<p>When no specific deployment type (omnibus, source code, helm chart, etc.) of a product is mentioned, this means all types are affected.</p>
<h2 id="table-of-fixes">Table of Fixes</h2>
<table>
  <thead>
      <tr>
          <th>Title</th>
          <th>Severity</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><a href="/releases/patches/patch-release-gitlab-16-0-1-released/#arbitrary-file-read-via-uploads-path-traversal">Arbitrary file read via uploads path traversal</a></td>
          <td>critical</td>
      </tr>
  </tbody>
</table>
<h2 id="arbitrary-file-read-via-uploads-path-traversal">Arbitrary file read via uploads path traversal</h2>
<!-- https://gitlab.com/gitlab-org/security/gitlab/-/issues/891 -->
<p>An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read
arbitrary files on the server when an attachment exists in a public project nested within at least five groups. This is a critical severity issue (<code>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N</code>, 10.0). It is now mitigated in the latest release and is assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2825">CVE-2023-2825</a>.</p>
<p>Thanks <a href="https://hackerone.com/pwnie">pwnie</a> for reporting this vulnerability through our HackerOne bug bounty program.</p>
<h2 id="updating">Updating</h2>
<p>To update GitLab, see the <a href="https://about.gitlab.com/update/">update page</a>.
To update Gitlab Runner, see the <a href="https://docs.gitlab.com/runner/install/linux-repository.html#updating-the-runner">Updating the Runner page</a>.</p>
<h2 id="receive-security-release-notifications">Receive Security Release Notifications</h2>
<p>To receive security release blog notifications delivered to your inbox, visit our <a href="https://about.gitlab.com/company/contact/">contact us</a> page.
To receive release notifications via RSS, subscribe to our <a href="https://docs.gitlab.com/releases/security-releases.xml">security release RSS feed</a> or our <a href="https://docs.gitlab.com/releases/all-releases.xml">RSS feed for all releases</a>.</p>
<!-- vale on -->
<!-- markdownlint-enable -->]]></content></entry></feed>