Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.0273 GitLab Security Release: 15.7.5, 15.6.6, 15.5.9 18 January 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: GitLab Community Edition (CE) GitLab Enterprise Edition (EE) Publisher: GitLab Operating System: Windows Linux variants Resolution: Patch/Upgrade Original Bulletin: https://about.gitlab.com/releases/2023/01/17/critical-security-release-gitlab-15-7-5-released Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- Today we are releasing versions 15.7.5, 15.6.6, 15.5.9 for GitLab Community Edition (CE) and Enterprise Edition (EE). These versions contain important security fixes and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately. You can see details in this security release https://about.gitlab.com/releases/2023/01/17/critical-security-release-gitlab-15-7-5-released To receive security release blog notifications delivered to your inbox, visit our contact us page. To receive release notifications via RSS, subscribe to our security release RSS feed or our RSS feed for all releases. GitLab releases patches for vulnerabilities in two types of dedicated security releases: a monthly security release, released a week after the feature release (which deploys on the 22nd of each month), and ad-hoc security releases for critical vulnerabilities. Sincerely, GitLab Security Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY8dfdskNZI30y1K9AQjBAhAAkBCu8c3/IKqrXGLU4SzUDF3FbYlpyIz1 5C7/Hs7l/Jgljkif6sjjdt9J3ez1yftXZebMQEq+QHtN9s1xCWtFf7OPk9QEyqLZ pg9H4zq93oWKSBy6F/O1/mplIXdea+4IABQ+2qj5ROunlSnLpwLwQ187kgB5do7f /9nE28R25EKceP6bdROE+u58QVameD+nkLkCEeU3mBxOOV92JWvlG6xrZlzICYZo bDrgbFlMbarU66BokyMHmT+irTiHa0ZtcUZEWfhCyoJEflNZJiK/e2JYW77z7B7z Lx8lJCA6UkbV4ZHC+RK92amWj4zAHSf2kQA90UiTzeBxskvtz9hHBYQ+WsAQHkgJ d9HCD25g1Y2O3wKHZXJCEQJbMdp3+SWTVdpQOaeQQ+gKsSX/LlgCb/A6/llGJrN8 90n0U8ruzJmoGEFUP07l0YDJ4tdB/XpCsekLE8DgYsHY/h1ySXVYD9scC0mucJ7o JX4QazUDzHrk3UF7+aA4MBmj1/F7EWB9Si4peffZeJCDh4yUzbMEyfObbFuGrQ19 q0rYG5/oFrAaArshxB3Hfd+EqwH0KuIIPNLG+1mNhyix+FnVMUvOyToBLvc/N9Vk eTA3YWqlqdHDdOEIBp8QKeImZGI/a1yCkzpawdyuT+GaLsLJG1RZqIX+dHTNp4E7 +wfjoDuCYXk= =9Eqv -----END PGP SIGNATURE-----