UNCLASSIFIED

Merge branch 'andymaks-development-patch-87633' into 'development'

Update README.md

See merge request !45
19 jobs for development in 24 minutes and 20 seconds (queued for 24 minutes and 7 seconds)
Status Job ID Name Coverage
  .Pre
passed #1857763
ironbank
load scripts

00:00:06

 
  Preflight
passed #1857764
ironbank
folder structure

00:00:05

passed #1857766
ironbank
hardening_manifest

00:00:09

failed #1857765
ironbank allowed to fail
hardening_manifest migration

00:00:05

 
  Lint
passed #1857767
ironbank
wl compare lint

00:00:08

 
  Import Artifacts
passed #1857768
ironbank
import artifacts

00:00:35

 
  Scan Artifacts
passed #1857769
ironbank
clamav scan

00:03:17

 
  Build
passed #1857770
ironbank-isolated
build

00:03:44

 
  Scanning
passed #1857774
ironbank
anchore scan

00:10:23

passed #1857771
ironbank
openscap compliance

00:01:34

passed #1857772
ironbank
openscap cve

00:04:22

passed #1857773
ironbank
twistlock scan

00:01:40

 
  Csv Output
passed #1857775
ironbank
csv output

00:01:03

 
  Check Cves
failed #1857776
ironbank allowed to fail
check cves

00:00:13

 
  Documentation
passed #1857777
ironbank
sign image

00:01:09

passed #1857778
ironbank
sign manifest

00:00:28

passed #1857779
ironbank
write json documentation

00:00:27

 
  Publish
passed #1857780
ironbank
upload to s3

00:02:55

 
  Vat
passed #1857781
ironbank
vat

00:00:30

 
Name Stage Failure
failed
check cves Check Cves
INFO: Whitelisted vulnerabilities: {'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2018-1000182-git-3.5.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13956-httpclient-4.5.11', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2003-1123-jdk-1.4', 'anchorecve_CVE-2020-10878-perl-macros-5.26.3-416.el8', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-8555-kubernetes-0.7.0', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'anchorecve_CVE-2020-2301-active_directory-1.0', 'anchorecve_CVE-2011-2730-spring_framework-2.5.6', 'anchorecve_CVE-2020-12723-perl-libs-5.26.3-416.el8', 'anchorecve_CVE-2019-1002100-kubernetes-0.7.0', 'tl_CVE-2021-21615-org.jenkins-ci.main_jenkins-core-2.263.2-cb-4', 'tl_CVE-2020-26259-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2019-1003006-groovy-1.27', 'anchorecve_CVE-2009-0580-tomcat-5.5.23', 'anchorecve_CVE-2020-13956-httpclient-4.5.10', 'tl_CVE-2018-10237-com.google.guava_guava-11.0.1', 'anchorecve_CVE-2009-0033-tomcat-5.5.23', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-1003010-git-3.5.1', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'tl_CVE-2020-8908-com.google.guava_guava-11.0.1', 'anchorecve_GHSA-fvm3-cfvj-gxqq-commons-fileupload-1.3.1-jenkins-2', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2007-5342-tomcat-5.5.23', 'anchorecve_VULNDB-103881-jersey-1.13', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecve_CVE-2013-7285-xstream-1.4', 'anchorecve_CVE-2013-4286-tomcat-5.5.23', 'anchorecve_CVE-2019-1003033-groovy-1.27', 'anchorecve_CVE-2020-12723-perl-macros-5.26.3-416.el8', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2011-5062-tomcat-5.5.23', 'anchorecve_CVE-2004-2540-jdk-1.4', 'anchorecve_CVE-2009-2901-tomcat-5.5.23', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2008-5515-tomcat-5.5.23', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2013-4590-tomcat-5.5.23', 'anchorecve_VULNDB-71558-tomcat-5.5.23', 'anchorecve_CVE-2013-4322-tomcat-5.5.23', 'anchorecve_CVE-2020-8557-kubernetes-0.7.0', 'anchorecve_CVE-2020-2136-git-3.5.1', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-26217-xstream-1.4', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-7226-cryptacular-1.1.0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_GHSA-6phf-73q6-gh87-commons-beanutils-1.9.3', 'anchorecve_VULNDB-217761-handlebars-1.1.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_CVE-2011-3190-tomcat-5.5.23', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-25649-jackson-databind-2.10.0', 'anchorecve_CVE-2007-6286-tomcat-5.5.23', 'tl_CVE-2020-26258-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'anchorecve_CVE-2011-4969-jquery-1.2.1', 'tl_CVE-2018-1272-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2007-3382-tomcat-5.5.23', 'anchorecve_CVE-2008-1947-tomcat-5.5.23', 'anchorecve_VULNDB-47464-tomcat-5.5.23', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-2302-active_directory-1.0', 'anchorecve_CVE-2020-14363-libX11-1.6.8-3.el8', 'anchorecve_VULNDB-198882-handlebars-1.1.1', 'anchorecve_CVE-2008-1232-tomcat-5.5.23', 'anchorecve_CVE-2020-10543-perl-libs-5.26.3-416.el8', 'anchorecve_CVE-2015-9251-jquery-1.2.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-8908-guava-19.0', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-35492-cairo-1.15.12-3.el8', 'anchorecve_GHSA-mvr2-9pj6-7w5j-guava-19.0', 'tl_CVE-2017-12621-commons-jelly_commons-jelly-tags-fmt-1.0', 'oscapcomp_CCE-83401-0', 'anchorecve_VULNDB-228533-jquery-1.2.1', 'oscapcomp_CCE-80784-2', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2012-5887-tomcat-5.5.23', 'anchorecve_CVE-2019-9946-kubernetes-0.7.0', 'anchorecve_CVE-2007-3385-tomcat-5.5.23', 'anchorecve_CVE-2019-1003009-active_directory-1.0', 'anchorecve_VULNDB-62054-tomcat-5.5.23', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2019-11358-jquery-1.2.1', 'anchorecve_VULNDB-179708-guava-11.0.1', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2010-1622-spring_framework-2.5.6', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8552-kubernetes-0.7.0', 'anchorecve_CVE-2020-10543-perl-macros-5.26.3-416.el8', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'anchorecve_CVE-2009-3548-tomcat-5.5.23', 'anchorecve_CVE-2019-11254-kubernetes-0.7.0', 'tl_CVE-2020-27218-org.eclipse.jetty_jetty-io-9.4.33.v20201020', 'anchorecve_VULNDB-210753-grpc-1.22.1', 'anchorecve_CVE-2020-2299-active_directory-1.0', 'anchorecve_CVE-2010-1157-tomcat-5.5.23', 'anchorecve_CVE-2020-10878-perl-interpreter-5.26.3-416.el8', 'anchorecve_CVE-2011-2526-tomcat-5.5.23', 'tl_CVE-2016-3674-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2010-3700-acegi-security-1.0.7', 'anchorecve_CVE-2019-10358-maven-3.1', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-71557-tomcat-5.5.23', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8', 'tl_CVE-2020-14363-libX11-1.6.8-3.el8', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'anchorecve_GHSA-7x9j-7223-rg5m-commons-fileupload-1.3.1-jenkins-2', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2013-6357-tomcat-5.5.23', 'anchorecve_CVE-2020-10543-perl-interpreter-5.26.3-416.el8', 'anchorecve_VULNDB-106409-commons_beanutils-1.9.3', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8', 'anchorecve_CVE-2008-5519-tomcat-5.5.23', 'anchorecve_CVE-2019-10320-credentials-1.24', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2019-11250-kubernetes-0.7.0', 'tl_CVE-2016-9878-spring framework_spring-core-2.5.6', 'tl_CVE-2020-26217-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2011-1184-tomcat-5.5.23', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2011-5063-tomcat-5.5.23', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-179708-guava-19.0', 'anchorecve_CVE-2021-3272-jasper-libs-2.0.14-4.el8', 'anchorecve_CVE-2020-17521-groovy-2.4.12', 'anchorecve_CVE-2017-7957-xstream-1.4', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-8908-guava-11.0.1', 'anchorecve_CVE-2016-3674-xstream-1.4', 'anchorecve_CVE-2005-3905-jdk-1.4', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'anchorecve_CVE-2009-0783-tomcat-5.5.23', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2011-5064-tomcat-5.5.23', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2012-0022-tomcat-5.5.23', 'anchorecve_CVE-2020-26259-xstream-1.4', 'anchorecve_VULNDB-106409-commons_digester-2.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_GHSA-86wm-rrjm-8wh8-jetty-server-9.4.33.v20201020', 'anchorecve_CVE-2020-27828-jasper-libs-2.0.14-4.el8', 'anchorecve_VULNDB-36079-tomcat-5.5.23', 'anchorecve_CVE-2017-2649-active_directory-1.0', 'anchorecve_CVE-2020-26258-xstream-1.4', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'tl_CVE-2020-5421-spring framework_spring-core-2.5.6', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2011-0766-crypto-1.5', 'anchorecve_CVE-2020-14363-libX11-common-1.6.8-3.el8', 'anchorecve_CVE-2020-14344-libX11-1.6.8-3.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-8022-tomcat-5.5.23', 'tl_CVE-2019-10086-commons-beanutils_commons-beanutils-1.9.3', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_VULNDB-103918-velocity-1.7', 'anchorecve_GHSA-rc75-cf5c-mxvh-pac4j-saml-1.9.9', 'anchorecve_CVE-2008-2370-tomcat-5.5.23', 'anchorecve_GHSA-mvr2-9pj6-7w5j-guava-11.0.1', 'anchorecve_CVE-2010-2227-tomcat-5.5.23', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2020-2303-active_directory-1.0', 'anchorecve_VULNDB-239195-commons-io-2.7', 'tl_CVE-2020-14344-libX11-1.6.8-3.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2019-11248-kubernetes-0.7.0', 'anchorecve_CVE-2009-2693-tomcat-5.5.23', 'tl_CVE-2018-1270-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2020-8563-kubernetes-0.7.0', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_VULNDB-177199-commons_io-2.6', 'anchorecve_CVE-2009-0781-tomcat-5.5.23', 'anchorecve_CVE-2007-3386-tomcat-5.5.23', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2004-1029-jdk-1.4', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2012-5886-tomcat-5.5.23', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'anchorecve_CVE-2018-20200-okhttp-3.9.0', 'anchorecve_CVE-2013-2185-tomcat-5.5.23', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2007-5333-tomcat-5.5.23', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2012-5885-tomcat-5.5.23', 'anchorecve_CVE-2018-1000110-git-3.5.1', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-12723-perl-interpreter-5.26.3-416.el8', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-14344-libX11-common-1.6.8-3.el8', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2006-1259-support-1.0', 'anchorecve_CVE-2011-2204-tomcat-5.5.23', 'anchorecve_CVE-2020-10878-perl-libs-5.26.3-416.el8', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-2300-active_directory-1.0', 'tl_CVE-2021-3326-glibc-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_VULNDB-93555-httpclient-4.5.10', 'anchorecve_VULNDB-179707-guava-11.0.1', 'anchorecve_VULNDB-226908-jquery-1.2.1', 'anchorecve_CVE-2013-4444-tomcat-5.5.23', 'anchorecve_VULNDB-179707-guava-19.0', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82979-6', 'tl_CVE-2016-1000031-commons-fileupload_commons-fileupload-1.3.1-jenkins-2', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2012-6708-jquery-1.2.1', 'tl_CVE-2018-1271-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2005-3906-jdk-1.4', 'tl_CVE-2017-7957-org.jvnet.hudson_xstream-1.4.7-jenkins-1'}
INFO: Vulnerabilities found in scanning stage: 231
INFO: {'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2018-1000182-git-3.5.1', 'anchorecve_CVE-2020-13956-httpclient-4.5.11', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2003-1123-jdk-1.4', 'anchorecve_CVE-2020-10878-perl-macros-5.26.3-416.el8', 'anchorecve_CVE-2020-8555-kubernetes-0.7.0', 'anchorecve_CVE-2020-2301-active_directory-1.0', 'anchorecve_CVE-2011-2730-spring_framework-2.5.6', 'anchorecve_CVE-2020-12723-perl-libs-5.26.3-416.el8', 'anchorecve_CVE-2019-1002100-kubernetes-0.7.0', 'tl_CVE-2021-21615-org.jenkins-ci.main_jenkins-core-2.263.2-cb-4', 'tl_CVE-2020-26259-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'anchorecve_GHSA-5mcr-gq6c-3hq2-netty-codec-http-4.1.51.Final', 'anchorecve_CVE-2019-1003006-groovy-1.27', 'anchorecve_CVE-2009-0580-tomcat-5.5.23', 'anchorecve_CVE-2020-13956-httpclient-4.5.10', 'tl_CVE-2018-10237-com.google.guava_guava-11.0.1', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2009-0033-tomcat-5.5.23', 'anchorecve_CVE-2019-1003010-git-3.5.1', 'anchorecve_GHSA-fvm3-cfvj-gxqq-commons-fileupload-1.3.1-jenkins-2', 'tl_CVE-2020-8908-com.google.guava_guava-11.0.1', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2007-5342-tomcat-5.5.23', 'anchorecve_VULNDB-103881-jersey-1.13', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-12723-perl-macros-5.26.3-416.el8', 'anchorecve_CVE-2019-1003033-groovy-1.27', 'anchorecve_CVE-2013-7285-xstream-1.4', 'anchorecve_CVE-2013-4286-tomcat-5.5.23', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2004-2540-jdk-1.4', 'anchorecve_CVE-2005-3906-jdk-1.4', 'anchorecve_CVE-2011-5062-tomcat-5.5.23', 'anchorecve_CVE-2009-2901-tomcat-5.5.23', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2013-4590-tomcat-5.5.23', 'anchorecve_CVE-2008-5515-tomcat-5.5.23', 'anchorecve_CVE-2013-4322-tomcat-5.5.23', 'anchorecve_CVE-2020-8557-kubernetes-0.7.0', 'anchorecve_CVE-2020-2136-git-3.5.1', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-7226-cryptacular-1.1.0', 'anchorecve_CVE-2020-26217-xstream-1.4', 'anchorecve_VULNDB-217761-handlebars-1.1.1', 'anchorecve_GHSA-6phf-73q6-gh87-commons-beanutils-1.9.3', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2011-3190-tomcat-5.5.23', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-25649-jackson-databind-2.10.0', 'anchorecve_CVE-2007-6286-tomcat-5.5.23', 'tl_CVE-2020-26258-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'anchorecve_CVE-2011-4969-jquery-1.2.1', 'tl_CVE-2018-1272-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2007-3382-tomcat-5.5.23', 'anchorecve_CVE-2008-1947-tomcat-5.5.23', 'anchorecve_VULNDB-47464-tomcat-5.5.23', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-2302-active_directory-1.0', 'anchorecve_CVE-2020-14363-libX11-1.6.8-3.el8', 'anchorecve_VULNDB-198882-handlebars-1.1.1', 'anchorecve_CVE-2008-1232-tomcat-5.5.23', 'anchorecve_CVE-2020-10543-perl-libs-5.26.3-416.el8', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_GHSA-mvr2-9pj6-7w5j-guava-19.0', 'anchorecve_CVE-2015-9251-jquery-1.2.1', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-35492-cairo-1.15.12-3.el8', 'anchorecve_CVE-2020-8908-guava-19.0', 'tl_CVE-2017-12621-commons-jelly_commons-jelly-tags-fmt-1.0', 'oscapcomp_CCE-83401-0', 'anchorecve_VULNDB-228533-jquery-1.2.1', 'oscapcomp_CCE-80784-2', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2019-9946-kubernetes-0.7.0', 'anchorecve_CVE-2012-5887-tomcat-5.5.23', 'anchorecve_CVE-2007-3385-tomcat-5.5.23', 'anchorecve_CVE-2019-1003009-active_directory-1.0', 'anchorecve_VULNDB-62054-tomcat-5.5.23', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2019-11358-jquery-1.2.1', 'anchorecve_VULNDB-179708-guava-11.0.1', 'anchorecve_CVE-2010-1622-spring_framework-2.5.6', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8552-kubernetes-0.7.0', 'anchorecve_CVE-2020-10543-perl-macros-5.26.3-416.el8', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'anchorecve_CVE-2019-11254-kubernetes-0.7.0', 'anchorecve_CVE-2009-3548-tomcat-5.5.23', 'tl_CVE-2020-27218-org.eclipse.jetty_jetty-io-9.4.33.v20201020', 'anchorecve_VULNDB-210753-grpc-1.22.1', 'anchorecve_CVE-2020-2299-active_directory-1.0', 'anchorecve_CVE-2010-1157-tomcat-5.5.23', 'anchorecve_CVE-2020-10878-perl-interpreter-5.26.3-416.el8', 'anchorecve_CVE-2011-2526-tomcat-5.5.23', 'tl_CVE-2016-3674-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2010-3700-acegi-security-1.0.7', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2019-10358-maven-3.1', 'anchorecve_VULNDB-71557-tomcat-5.5.23', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8', 'tl_CVE-2020-14363-libX11-1.6.8-3.el8', 'anchorecve_GHSA-7x9j-7223-rg5m-commons-fileupload-1.3.1-jenkins-2', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2013-6357-tomcat-5.5.23', 'anchorecve_CVE-2020-10543-perl-interpreter-5.26.3-416.el8', 'anchorecve_VULNDB-106409-commons_beanutils-1.9.3', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8', 'anchorecve_CVE-2008-5519-tomcat-5.5.23', 'anchorecve_CVE-2019-10320-credentials-1.24', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2019-11250-kubernetes-0.7.0', 'tl_CVE-2016-9878-spring framework_spring-core-2.5.6', 'tl_CVE-2016-1000031-commons-fileupload_commons-fileupload-1.3.1-jenkins-2', 'anchorecve_VULNDB-71558-tomcat-5.5.23', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2011-1184-tomcat-5.5.23', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2011-5063-tomcat-5.5.23', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-179708-guava-19.0', 'anchorecve_CVE-2021-3272-jasper-libs-2.0.14-4.el8', 'anchorecve_CVE-2020-17521-groovy-2.4.12', 'anchorecve_CVE-2017-7957-xstream-1.4', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-8908-guava-11.0.1', 'anchorecve_CVE-2016-3674-xstream-1.4', 'anchorecve_CVE-2005-3905-jdk-1.4', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2009-0783-tomcat-5.5.23', 'anchorecve_VULNDB-106409-commons_digester-2.1', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-26259-xstream-1.4', 'anchorecve_CVE-2012-0022-tomcat-5.5.23', 'anchorecve_CVE-2011-5064-tomcat-5.5.23', 'anchorecve_VULNDB-36079-tomcat-5.5.23', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_GHSA-86wm-rrjm-8wh8-jetty-server-9.4.33.v20201020', 'anchorecve_CVE-2020-27828-jasper-libs-2.0.14-4.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-26258-xstream-1.4', 'anchorecve_CVE-2017-2649-active_directory-1.0', 'tl_CVE-2020-5421-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-14363-libX11-common-1.6.8-3.el8', 'anchorecve_CVE-2020-14344-libX11-1.6.8-3.el8', 'anchorecve_CVE-2011-0766-crypto-1.5', 'anchorecve_CVE-2020-8022-tomcat-5.5.23', 'tl_CVE-2019-10086-commons-beanutils_commons-beanutils-1.9.3', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_VULNDB-103918-velocity-1.7', 'anchorecve_GHSA-rc75-cf5c-mxvh-pac4j-saml-1.9.9', 'anchorecve_CVE-2008-2370-tomcat-5.5.23', 'anchorecve_GHSA-mvr2-9pj6-7w5j-guava-11.0.1', 'anchorecve_CVE-2010-2227-tomcat-5.5.23', 'anchorecve_CVE-2020-2303-active_directory-1.0', 'anchorecve_VULNDB-239195-commons-io-2.7', 'tl_CVE-2020-14344-libX11-1.6.8-3.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8563-kubernetes-0.7.0', 'tl_CVE-2018-1270-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2019-11248-kubernetes-0.7.0', 'anchorecve_CVE-2009-2693-tomcat-5.5.23', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_VULNDB-177199-commons_io-2.6', 'anchorecve_CVE-2009-0781-tomcat-5.5.23', 'anchorecve_CVE-2007-3386-tomcat-5.5.23', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2004-1029-jdk-1.4', 'anchorecve_CVE-2012-5886-tomcat-5.5.23', 'anchorecve_CVE-2018-20200-okhttp-3.9.0', 'anchorecve_CVE-2013-2185-tomcat-5.5.23', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2007-5333-tomcat-5.5.23', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2018-1000110-git-3.5.1', 'anchorecve_CVE-2012-5885-tomcat-5.5.23', 'anchorecve_CVE-2020-12723-perl-interpreter-5.26.3-416.el8', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-14344-libX11-common-1.6.8-3.el8', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2011-2204-tomcat-5.5.23', 'anchorecve_CVE-2006-1259-support-1.0', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-2300-active_directory-1.0', 'tl_CVE-2021-3326-glibc-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_VULNDB-93555-httpclient-4.5.10', 'anchorecve_VULNDB-179707-guava-11.0.1', 'anchorecve_VULNDB-226908-jquery-1.2.1', 'anchorecve_CVE-2013-4444-tomcat-5.5.23', 'anchorecve_VULNDB-179707-guava-19.0', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82979-6', 'tl_CVE-2020-26217-org.jvnet.hudson_xstream-1.4.7-jenkins-1', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2012-6708-jquery-1.2.1', 'tl_CVE-2018-1271-spring framework_spring-core-2.5.6', 'anchorecve_CVE-2020-10878-perl-libs-5.26.3-416.el8', 'tl_CVE-2017-7957-org.jvnet.hudson_xstream-1.4.7-jenkins-1'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - GHSA-5mcr-gq6c-3hq2-netty-codec-http-4.1.51.Final
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1
failed
hardening_manifest migration Preflight
Skipping Git submodules setup
Downloading artifacts
Downloading artifacts for load scripts (1857763)...
Downloading artifacts from coordinator... ok
id=1857763 responseStatus=200 OK token=sboYXsTp
Executing "step_script" stage of the job script
$ if ! [[ -f hardening_manifest.yaml ]]; then # collapsed multi-line command
LABEL found in Dockerfile, move all LABELs to the hardening_manifest.yaml file
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1