chore(findings): gitlab/gitlab/gitlab-base
Summary
gitlab/gitlab/gitlab-base has 96 new findings discovered during continuous monitoring.
Layer: redhat/ubi/ubi9-micro:9.6 is EOL, please update if possible
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=gitlab/gitlab/gitlab-base&tag=18.6.2&branch=master
EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.
KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.
| id | source | severity | package | impact | workaround | epss_score | kev |
|---|---|---|---|---|---|---|---|
| CVE-2024-7264 | Twistlock CVE | Low | curl-7.76.1-34.el9 | 0.05357 | false | ||
| CVE-2024-7264 | Anchore CVE | Low | libcurl-7.76.1-34.el9 | 0.05357 | false | ||
| CVE-2024-7264 | Anchore CVE | Low | curl-7.76.1-34.el9 | 0.05357 | false | ||
| CVE-2024-9681 | Twistlock CVE | Low | curl-7.76.1-34.el9 | 0.01225 | false | ||
| CVE-2024-9681 | Anchore CVE | Low | libcurl-7.76.1-34.el9 | 0.01225 | false | ||
| CVE-2024-9681 | Anchore CVE | Low | curl-7.76.1-34.el9 | 0.01225 | false | ||
| CVE-2024-41996 | Twistlock CVE | Low | openssl-1:3.5.1-4.el9_7 | 0.00690 | false | ||
| CVE-2024-41996 | Anchore CVE | Low | openssl-libs-1:3.5.1-4.el9_7 | 0.00690 | false | ||
| CVE-2024-11053 | Twistlock CVE | Low | curl-7.76.1-34.el9 | 0.00337 | false | ||
| CVE-2024-11053 | Anchore CVE | Low | curl-7.76.1-34.el9 | 0.00337 | false | ||
| CVE-2024-11053 | Anchore CVE | Low | libcurl-7.76.1-34.el9 | 0.00337 | false | ||
| CVE-2025-14087 | Twistlock CVE | Medium | glib2-2.68.4-18.el9_7 | 0.00197 | false | ||
| CVE-2025-14087 | Anchore CVE | Medium | glib2-2.68.4-18.el9_7 | 0.00197 | false | ||
| CVE-2025-27113 | Twistlock CVE | Low | libxml2-2.9.13-14.el9_7 | 0.00184 | false | ||
| CVE-2025-27113 | Anchore CVE | Low | libxml2-2.9.13-14.el9_7 | 0.00184 | false | ||
| CVE-2023-32636 | Twistlock CVE | Low | glib2-2.68.4-18.el9_7 | 0.00165 | false | ||
| CVE-2023-32636 | Anchore CVE | Low | glib2-2.68.4-18.el9_7 | 0.00165 | false | ||
| CVE-2024-13176 | Twistlock CVE | Low | openssl-1:3.5.1-4.el9_7 | 0.00123 | false | ||
| CVE-2024-13176 | Anchore CVE | Low | openssl-libs-1:3.5.1-4.el9_7 | 0.00123 | false | ||
| CVE-2025-9086 | Twistlock CVE | Medium | curl-7.76.1-34.el9 | 0.00095 | false | ||
| CVE-2025-9086 | Anchore CVE | Medium | curl-7.76.1-34.el9 | 0.00095 | false | ||
| CVE-2025-9086 | Anchore CVE | Medium | libcurl-7.76.1-34.el9 | 0.00095 | false | ||
| CVE-2025-7039 | Twistlock CVE | Low | glib2-2.68.4-18.el9_7 | 0.00093 | false | ||
| CVE-2025-8277 | Twistlock CVE | Low | libssh-0.10.4-15.el9_7 | 0.00072 | false | ||
| CVE-2025-8277 | Anchore CVE | Low | libssh-0.10.4-15.el9_7 | 0.00072 | false | ||
| CVE-2025-8277 | Anchore CVE | Low | libssh-config-0.10.4-15.el9_7 | 0.00072 | false | ||
| CVE-2025-3360 | Twistlock CVE | Low | glib2-2.68.4-18.el9_7 | 0.00068 | false | ||
| CVE-2025-3360 | Anchore CVE | Low | glib2-2.68.4-18.el9_7 | 0.00068 | false | ||
| CVE-2025-5372 | Twistlock CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00058 | false | ||
| CVE-2025-5372 | Anchore CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00058 | false | ||
| CVE-2025-5372 | Anchore CVE | Medium | libssh-config-0.10.4-15.el9_7 | 0.00058 | false | ||
| CVE-2023-50495 | Twistlock CVE | Low | ncurses-6.2-12.20210508.el9 | 0.00051 | false | ||
| CVE-2022-27943 | Twistlock CVE | Low | gcc-11.5.0-11.el9 | 0.00050 | false | ||
| CVE-2025-45582 | Twistlock CVE | Medium | tar-2:1.34-7.el9 | 0.00040 | false | ||
| CVE-2025-45582 | Anchore CVE | Medium | tar-2:1.34-7.el9 | 0.00040 | false | ||
| CVE-2023-39804 | Twistlock CVE | Low | tar-2:1.34-7.el9 | 0.00039 | false | ||
| CVE-2023-39804 | Anchore CVE | Low | tar-2:1.34-7.el9 | 0.00039 | false | ||
| CVE-2025-5987 | Twistlock CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00038 | false | ||
| CVE-2025-5987 | Anchore CVE | Medium | libssh-config-0.10.4-15.el9_7 | 0.00038 | false | ||
| CVE-2025-5987 | Anchore CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00038 | false | ||
| CVE-2025-14512 | Twistlock CVE | Medium | glib2-2.68.4-18.el9_7 | 0.00034 | false | ||
| CVE-2025-14512 | Anchore CVE | Medium | glib2-2.68.4-18.el9_7 | 0.00034 | false | ||
| CVE-2025-58185 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00033 | false | ||
| CVE-2025-8114 | Twistlock CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00030 | false | ||
| CVE-2025-8114 | Anchore CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00030 | false | ||
| CVE-2025-8114 | Anchore CVE | Medium | libssh-config-0.10.4-15.el9_7 | 0.00030 | false | ||
| CVE-2025-58186 | Twistlock CVE | Low | net/http-1.24.6 | 0.00029 | false | ||
| CVE-2025-58186 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00029 | false | ||
| CVE-2025-5351 | Twistlock CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00028 | false | ||
| CVE-2025-5351 | Anchore CVE | Medium | libssh-0.10.4-15.el9_7 | 0.00028 | false | ||
| CVE-2025-5351 | Anchore CVE | Medium | libssh-config-0.10.4-15.el9_7 | 0.00028 | false | ||
| CVE-2025-9232 | Twistlock CVE | Low | openssl-1:3.5.1-4.el9_7 | 0.00027 | false | ||
| CVE-2025-9232 | Anchore CVE | Low | openssl-libs-1:3.5.1-4.el9_7 | 0.00027 | false | ||
| CVE-2025-61725 | Anchore CVE | High | stdlib-go1.24.6 | 0.00026 | false | ||
| CVE-2025-61723 | Twistlock CVE | Low | encoding/pem-1.24.6 | 0.00026 | false | ||
| CVE-2025-61723 | Anchore CVE | High | stdlib-go1.24.6 | 0.00026 | false | ||
| CVE-2025-61724 | Twistlock CVE | Low | net/textproto-1.24.6 | 0.00025 | false | ||
| CVE-2025-61724 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00025 | false | ||
| CVE-2025-47912 | Twistlock CVE | Low | net/url-1.24.6 | 0.00025 | false | ||
| CVE-2025-47912 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00025 | false | ||
| CVE-2025-61727 | Twistlock CVE | Low | crypto/x509-1.24.6 | 0.00021 | false | ||
| CVE-2025-61727 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00021 | false | ||
| CVE-2025-6176 | Twistlock CVE | High | brotli-1.0.9-7.el9_5 | 0.00020 | false | ||
| CVE-2025-6176 | Anchore CVE | High | libbrotli-1.0.9-7.el9_5 | 0.00020 | false | ||
| CVE-2025-58189 | Twistlock CVE | Low | crypto/tls-1.24.6 | 0.00019 | false | ||
| CVE-2025-58189 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00019 | false | ||
| CVE-2025-6170 | Twistlock CVE | Low | libxml2-2.9.13-14.el9_7 | 0.00017 | false | ||
| CVE-2025-6170 | Anchore CVE | Low | libxml2-2.9.13-14.el9_7 | 0.00017 | false | ||
| CVE-2025-10966 | Twistlock CVE | Medium | curl-7.76.1-34.el9 | 0.00017 | false | ||
| CVE-2025-10966 | Anchore CVE | Medium | curl-7.76.1-34.el9 | 0.00017 | false | ||
| CVE-2025-10966 | Anchore CVE | Medium | libcurl-7.76.1-34.el9 | 0.00017 | false | ||
| CVE-2025-61729 | Twistlock CVE | Low | crypto/x509-1.24.6 | 0.00016 | false | ||
| CVE-2025-61729 | Anchore CVE | High | stdlib-go1.24.6 | 0.00016 | false | ||
| CVE-2025-8556 | Twistlock CVE | Low | github.com/cloudflare/circl-v1.6.0 | 0.00015 | false | ||
| CVE-2025-58187 | Twistlock CVE | Low | crypto/x509-1.24.6 | 0.00015 | false | ||
| CVE-2025-58187 | Anchore CVE | High | stdlib-go1.24.6 | 0.00015 | false | ||
| CVE-2025-13601 | Twistlock CVE | Medium | glib2-2.68.4-18.el9_7 | 0.00015 | false | ||
| CVE-2025-13601 | Anchore CVE | Medium | glib2-2.68.4-18.el9_7 | 0.00015 | false | ||
| CVE-2025-58188 | Twistlock CVE | Low | crypto/x509-1.24.6 | 0.00014 | false | ||
| CVE-2025-58188 | Anchore CVE | High | stdlib-go1.24.6 | 0.00014 | false | ||
| CVE-2025-58183 | Twistlock CVE | Low | archive/tar-1.24.6 | 0.00014 | false | ||
| CVE-2025-58183 | Anchore CVE | Medium | stdlib-go1.24.6 | 0.00014 | false | ||
| CVE-2025-14104 | Twistlock CVE | Medium | util-linux-2.37.4-21.el9 | 0.00014 | false | ||
| CVE-2025-14104 | Anchore CVE | Medium | libblkid-2.37.4-21.el9 | 0.00014 | false | ||
| CVE-2025-14104 | Anchore CVE | Medium | libuuid-2.37.4-21.el9 | 0.00014 | false | ||
| CVE-2025-14104 | Anchore CVE | Medium | libmount-2.37.4-21.el9 | 0.00014 | false | ||
| CVE-2025-4878 | Twistlock CVE | Low | libssh-0.10.4-15.el9_7 | 0.00011 | false | ||
| CVE-2025-4878 | Anchore CVE | Low | libssh-config-0.10.4-15.el9_7 | 0.00011 | false | ||
| CVE-2025-4878 | Anchore CVE | Low | libssh-0.10.4-15.el9_7 | 0.00011 | false | ||
| CVE-2025-62813 | Anchore CVE | Low | lz4-libs-1.9.3-5.el9 | N/A | false | ||
| GHSA-vvgc-356p-c3xw | Anchore CVE | Medium | golang.org/x/net-v0.37.0 | N/A | N/A | ||
| GHSA-j5w8-q4qc-rx2x | Anchore CVE | Medium | golang.org/x/crypto-v0.37.0 | N/A | N/A | ||
| GHSA-f6x5-jh6r-wrfv | Anchore CVE | Medium | golang.org/x/crypto-v0.37.0 | N/A | N/A | ||
| GHSA-2x5j-vhc8-9cwm | Anchore CVE | Low | github.com/cloudflare/circl-v1.6.0 | N/A | N/A | ||
| CCE-90828-5 | OSCAP Compliance | Medium | N/A | N/A | |||
| CCE-87721-7 | OSCAP Compliance | Medium | N/A | N/A |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=gitlab/gitlab/gitlab-base&tag=18.6.2&branch=master
Tasks
Contributor:
-
Apply the StatusReview label to this issue for a merge request reviewand wait for feedback
OR
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue for a VAT justifications reviewand wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
RevieworVerificationlabel will be removed and the issue will be sent back toTo-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theRevieworVerificationlabel.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.