GitLab has announced the release of critical updates to its Community Edition (CE) and Enterprise Edition (EE), specifically versions 17.7.1, 17.6.3, and 17.5.5.
These updates are essential for maintaining security and stability across all self-managed GitLab installations and should be implemented immediately.
The company has already rolled out the patched version on GitLab.com, and GitLab Dedicated customers are advised they need not take any action.
The newly released versions address significant bug fixes and security vulnerabilities, including several identified through GitLab’s HackerOne bug bounty program.
GitLab emphasizes its commitment to security and encourages all self-managed customers to upgrade to the latest versions to protect their instances effectively.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
A detailed analysis of each vulnerability will be publicly available on GitLab’s issue tracker 30 days post-release.
GitLab structures its patch releases to include both scheduled updates, occurring twice monthly, and ad-hoc critical patches for high-severity vulnerabilities.
Among the critical vulnerabilities patched in this release are:
In addition to security updates, GitLab has introduced enhancements to its import functionality in version 17.7.1.
This new user contribution and membership mapping feature allows for improved post-import operations, such as mapping imported contributions to the correct users on the destination instance.
The new process operates independently of email addresses, providing users greater control over their contributions.
For GitLab self-managed and dedicated customers, it is crucial to understand the risk posed by these vulnerabilities, especially as exploitation requires authenticated user access.
GitLab advises users to disable importers until they have upgraded to version 17.7.1 or later. The steps to disable import features are straightforward and can be performed through the Admin settings.
With the potential risks associated with these vulnerabilities, GitLab strongly recommends that all users upgrade to the latest patch release as soon as possible.
Adhering to these updates not only secures your instance but also enhances the overall performance and reliability of GitLab’s services.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched…
A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to trick…
The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in a…
Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows trojans…
A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has…
The Green Bay Packers, Inc. has confirmed that its online merchandise store was hacked, leading…