UNCLASSIFIED - NO CUI

chore(findings): gitlab/gitlab/gitlab-workhorse

Summary

gitlab/gitlab/gitlab-workhorse has 89 new findings discovered during continuous monitoring.

Layer: redhat/ubi/ubi9-micro:9.6 is EOL, please update if possible

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=gitlab/gitlab/gitlab-workhorse&tag=18.6.2&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2023-50495 Anchore CVE Low ncurses-6.2-12.20210508.el9 0.00051 false
CVE-2022-27943 Anchore CVE Low libstdc++-11.5.0-11.el9 0.00050 false
CVE-2025-58185 Twistlock CVE Low encoding/asn1-1.24.6 0.00033 false
CVE-2025-58185 Anchore CVE Medium stdlib-go1.24.6 0.00033 false
CVE-2025-58185 Anchore CVE Medium stdlib-go1.24.6 0.00033 false
CVE-2025-58185 Anchore CVE Medium stdlib-go1.24.6 0.00033 false
CVE-2025-58185 Anchore CVE Medium stdlib-go1.24.6 0.00033 false
CVE-2025-58186 Twistlock CVE Low net/http-1.24.6 0.00029 false
CVE-2025-58186 Anchore CVE Medium stdlib-go1.24.6 0.00029 false
CVE-2025-58186 Anchore CVE Medium stdlib-go1.24.6 0.00029 false
CVE-2025-58186 Anchore CVE Medium stdlib-go1.24.6 0.00029 false
CVE-2025-58186 Anchore CVE Medium stdlib-go1.24.6 0.00029 false
CVE-2025-61725 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61725 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61725 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61725 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61723 Twistlock CVE Low encoding/pem-1.24.6 0.00026 false
CVE-2025-61723 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61723 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61723 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61723 Anchore CVE High stdlib-go1.24.6 0.00026 false
CVE-2025-61724 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-61724 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-61724 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-61724 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-61724 Twistlock CVE Low net/textproto-1.24.6 0.00025 false
CVE-2025-47912 Twistlock CVE Low net/url-1.24.6 0.00025 false
CVE-2025-47912 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-47912 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-47912 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-47912 Anchore CVE Medium stdlib-go1.24.6 0.00025 false
CVE-2025-61727 Twistlock CVE Low crypto/x509-1.24.6 0.00021 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.6 0.00021 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.6 0.00021 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.6 0.00021 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.6 0.00021 false
CVE-2025-58189 Twistlock CVE Low crypto/tls-1.24.6 0.00019 false
CVE-2025-58189 Anchore CVE Medium stdlib-go1.24.6 0.00019 false
CVE-2025-58189 Anchore CVE Medium stdlib-go1.24.6 0.00019 false
CVE-2025-58189 Anchore CVE Medium stdlib-go1.24.6 0.00019 false
CVE-2025-58189 Anchore CVE Medium stdlib-go1.24.6 0.00019 false
CVE-2025-61729 Twistlock CVE Low crypto/x509-1.24.6 0.00016 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.6 0.00016 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.6 0.00016 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.6 0.00016 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.6 0.00016 false
CVE-2025-58187 Twistlock CVE Low crypto/x509-1.24.6 0.00015 false
CVE-2025-58187 Anchore CVE High stdlib-go1.24.6 0.00015 false
CVE-2025-58187 Anchore CVE High stdlib-go1.24.6 0.00015 false
CVE-2025-58187 Anchore CVE High stdlib-go1.24.6 0.00015 false
CVE-2025-58187 Anchore CVE High stdlib-go1.24.6 0.00015 false
CVE-2025-58188 Twistlock CVE Low crypto/x509-1.24.6 0.00014 false
CVE-2025-58188 Anchore CVE High stdlib-go1.24.6 0.00014 false
CVE-2025-58188 Anchore CVE High stdlib-go1.24.6 0.00014 false
CVE-2025-58188 Anchore CVE High stdlib-go1.24.6 0.00014 false
CVE-2025-58188 Anchore CVE High stdlib-go1.24.6 0.00014 false
CVE-2025-58183 Anchore CVE Medium stdlib-go1.24.6 0.00014 false
CVE-2025-58183 Anchore CVE Medium stdlib-go1.24.6 0.00014 false
CVE-2025-58183 Anchore CVE Medium stdlib-go1.24.6 0.00014 false
CVE-2025-58183 Anchore CVE Medium stdlib-go1.24.6 0.00014 false
GHSA-x8qc-rrcw-4r46 Anchore CVE High npm-1.0.1 N/A N/A
GHSA-wx77-rp39-c6vg Anchore CVE Low markdown-1.0.0 N/A N/A
GHSA-w457-6q6x-cgp9 Anchore CVE Critical handlebars-1.0.0 N/A N/A
GHSA-v3jv-wrf4-5845 Anchore CVE Low npm-1.0.1 N/A N/A
GHSA-qqgx-2p2h-9c37 Anchore CVE High ini-1.0.0 N/A N/A
GHSA-q42p-pg8m-cqh6 Anchore CVE High handlebars-1.0.0 N/A N/A
GHSA-q2c6-c6pm-g3gh Anchore CVE High handlebars-1.0.0 N/A N/A
GHSA-ph34-pc88-72gc Anchore CVE High npm-1.0.1 N/A N/A
GHSA-p493-635q-r6gr Anchore CVE Medium pug-1.0.0 N/A N/A
GHSA-m6cx-g6qm-p2cx Anchore CVE High npm-1.0.1 N/A N/A
GHSA-m5h6-hr3q-22h5 Anchore CVE High npm-1.0.1 N/A N/A
GHSA-j5w8-q4qc-rx2x Anchore CVE Medium golang.org/x/crypto-v0.41.0 N/A N/A
GHSA-j5w8-q4qc-rx2x Anchore CVE Medium golang.org/x/crypto-v0.41.0 N/A N/A
GHSA-h6ch-v84p-w6p9 Anchore CVE High diff-1.0.0 N/A N/A
GHSA-g9r4-xpmj-mj65 Anchore CVE High handlebars-1.0.0 N/A N/A
GHSA-f6x5-jh6r-wrfv Anchore CVE Medium golang.org/x/crypto-v0.41.0 N/A N/A
GHSA-f6x5-jh6r-wrfv Anchore CVE Medium golang.org/x/crypto-v0.41.0 N/A N/A
GHSA-f2jv-r9rf-7988 Anchore CVE Critical handlebars-1.0.0 N/A N/A
GHSA-9prh-257w-9277 Anchore CVE Medium handlebars-1.0.0 N/A N/A
GHSA-93f3-23rq-pjfp Anchore CVE Medium npm-1.0.1 N/A N/A
GHSA-765h-qjxv-5f44 Anchore CVE Critical handlebars-1.0.0 N/A N/A
GHSA-4328-8hgf-7wjr Anchore CVE High npm-1.0.1 N/A N/A
GHSA-3cqr-58rm-57f8 Anchore CVE High handlebars-1.0.0 N/A N/A
GHSA-3c6g-pvg8-gqw2 Anchore CVE High json-1.0.0 N/A N/A
GHSA-3965-hpx2-q597 Anchore CVE Medium pug-1.0.0 N/A N/A
GHSA-2cf5-4w76-r9qv Anchore CVE High handlebars-1.0.0 N/A N/A
CCE-88048-4 OSCAP Compliance Medium N/A N/A
CCE-83613-0 OSCAP Compliance Low N/A N/A
82146aec4e12f16ec2c3fe690f9484e5 Anchore Compliance Critical N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=gitlab/gitlab/gitlab-workhorse&tag=18.6.2&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information