Hi everyone. In view of the recent vulnerability (CVE-2023-38545), it is recommended to get curl updated to version 8.4.0.
I am using self-managed gitlab instance (omnibus installation), and my cloud security center is flagging to me that there is a curl tool version 8.0.1-DEV , under the path “/opt/gitlab/embedded/lib/libcurl.so.4.8.0”.
I tried updating curl on my linux self-managed instance, but it seems to only update the curl tool under “usr/” path, but not the one in “/opt/gitlab/embedded/lib/libcurl.so.4.8.0”.
Appreciate if anyone knows how we can get it updated in “/opt/gitlab/embedded/lib/libcurl.so.4.8.0”.
Thank you in advance.
Gitlab 16.5.0 has been released, so you may wish to upgrade to this to see if the problem has been fixed. Although from the CVE link you provided, there is no such vulnerability anyway even with the older curl version - mainly because Gitlab isn’t configured in such a way that the vulnerability can be abused. It would require you to be using a SOCKS5 proxy somewhere in your configuration. So unless you configured this externally to Gitlab, or attempted to integrate it with your Gitlab configuration, you are not affected.
Confirming that 16.5.0 uses Curl v8.4.0:
root@gitlab:~# head -1 /opt/gitlab/version-manifest.txt
root@gitlab:~# grep curl /opt/gitlab/version-manifest.txt
curl curl-840 git:d31a8424e8bac2725ee54a1678f1b679c5e31a18
Hi @iwalker @JamesRLopes apologies for the late reply, got distracted with other work.
Thanks for the info both! I have upgraded my GitLab to 16.5.0 and verified the curl is now v8.4.0.