GitHub Enterprise – 3.14.19
Please note this list of changes is not exhaustive, but has been curated to changes which affect users of the NC State GitHub service.
This encompasses the full set of changes between 3.14.4-3.14.19.
A full list of changes can be found on the official GitHub Enterprise 3.14 Release Notes.
Security fixes
- CRITICAL: Redis has been upgraded to version 6.2.20 to address CVE-2025-49844 (also known as RediShell).
- HIGH: A privilege escalation vulnerability in GitHub Enterprise Server allowed an authenticated enterprise admin to gain root SSH access.
- HIGH: An attacker could execute arbitrary code in the context of other users' browsers.
- HIGH: An improper access control vulnerability was identified in GitHub Enterprise Server that allowed users with access to any repository to retrieve limited code content from another repository by creating a diff between the repositories.
- MEDIUM: An attacker could inject HTML in the instances web UI because the web commit dialog did not properly sanitize repository rule violation messages.
- MEDIUM: An attacker could view private repository names, which the signed-in user is not authorized to see, in the GitHub Advanced Security Overview.
- HIGH: An attacker could access environment variables in the debug artifacts uploaded by the CodeQL action after a failed code scanning workflow run.
- Packages have been updated to the latest security versions.