- published 1/21/25 9:17 AM •
- updated 09 January 2025 •
- 5 Min Read
Security Updates- GitLab Community Edition (CE) and Enterprise Edition (EE)
Alert Rating
Audience
Corporations, Government
On this page
Security Updates- GitLab Community Edition (CE) and Enterprise Edition (EE)
Critical Vulnerabilities:
- A series of vulnerabilities (CVE-2024-5655, CVE-2024-6385, CVE-2024-6678, CVE-2024-8970) were identified in GitLab's import functionality. To mitigate these issues, GitLab has redesigned the user contribution mapping functionality.
Medium-Severity Vulnerabilities:
- Access Token Exposure (CVE-2025-0194): A security vulnerability that could expose access tokens in GitLab logs under certain conditions
- Cyclic Reference of Epics (CVE-2024-6324): This vulnerability could lead to resource exhaustion and potential Denial of Service (DoS) attacks
- Unauthorized Issue Status Manipulation (CVE-2024-12431): Allowed unauthorized users to change issue statuses in public projects
- Instance SAML Bypass (CVE-2024-13041): A flaw that could allow users to bypass external provider settings
Fixed Versions:
- GitLab Patch Release: 17.7.1, 17.6.3, 17.5.5 for GitLab Community Edition (CE) and Enterprise Edition (EE).
Take Action
Protect yourself
The UAE Cyber Security Council recommends to upgrade the affected versions to the fixed versions at the earliest.
GET INVOLVED
Make a Difference
Other Threats
20 January 2025
Critical Vulnerability in F5 Traffix SDC
A critical vulnerability has been discovered in F5 Traffix SDC, linked to Apache Tomcat, which could allow attackers to gain unauthorized access to compromised systems.
Protecting
Corporations, Government
17 January 2025
NVIDIA has released security updates to address multiple vulnerabilities in the NVIDIA Container Toolkit and NVIDIA GPU Operator.
Protecting
Corporations, Government
16 January 2025
Critical Vulnerability in FortiSwitch Devices
A critical vulnerability (CVE-2023-37936) has been discovered in multiple versions of Fortinet FortiSwitch devices. This vulnerability, classified as a use of hard-coded cryptographic key [CWE-321], allows a remote unauthenticated attacker in possession of the key to execute unauthorized code via crafted cryptographic request.
Protecting
Corporations, Government