First published: Wed Feb 12 2025(Updated: )
A denial of service vulnerability in GitLab CE/EE affecting all versions from 14.1 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to impact the availability of GitLab via unbounded symbol creation via the scopes parameter in a Personal Access Token.
Credit: cve@gitlab.com
Affected Software | Affected Version | How to fix |
---|---|---|
GitLab Community Edition | >=14.1<17.6.5>=17.7<17.7.4>=17.8<17.8.2 |
Upgrade to version 17.6.5, 17.7.4 or 17.8.2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12379 is classified as a denial of service vulnerability that can severely impact the availability of GitLab.
To fix CVE-2024-12379, you should upgrade GitLab CE/EE to version 17.6.5 or later, 17.7.4 or later, or 17.8.2 or later.
CVE-2024-12379 affects all GitLab CE/EE versions from 14.1 to earlier than 17.6.5, 17.7 to earlier than 17.7.4, and 17.8 to earlier than 17.8.2.
CVE-2024-12379 is a denial of service vulnerability that targets GitLab through unbounded symbol creation.
Yes, CVE-2024-12379 can be exploited remotely by an attacker to compromise the availability of the GitLab service.