UNCLASSIFIED

Merge branch '5.5.3' into 'development'

5.5.3 port

See merge request !5
19 jobs for development in 27 minutes and 32 seconds (queued for 24 minutes and 41 seconds)
Status Job ID Name Coverage
  .Pre
passed #2127089
ironbank
load scripts

00:00:09

 
  Preflight
passed #2127090
ironbank
folder structure

00:00:18

passed #2127092
ironbank
hardening_manifest

00:02:20

passed #2127091
ironbank
hardening_manifest migration

00:00:14

 
  Lint
passed #2127093
ironbank
wl compare lint

00:00:17

 
  Import Artifacts
passed #2127094
ironbank
import artifacts

00:00:12

 
  Scan Artifacts
passed #2127095
ironbank
clamav scan

00:01:07

 
  Build
passed #2127096
ironbank-isolated
build

00:05:00

 
  Scanning
passed #2127100
ironbank
anchore scan

00:09:20

passed #2127097
ironbank
openscap compliance

00:02:14

passed #2127098
ironbank
openscap cve

00:06:05

passed #2127099
ironbank
twistlock scan

00:01:44

 
  Csv Output
passed #2127101
ironbank
csv output

00:01:38

 
  Check Cves
failed #2127102
ironbank allowed to fail
check cves

00:00:21

 
  Documentation
passed #2127103
ironbank
sign image

00:02:02

passed #2127104
ironbank
sign manifest

00:01:00

passed #2127105
ironbank
write json documentation

00:00:50

 
  Publish
passed #2127106
ironbank
upload to s3

00:04:26

 
  Vat
passed #2127107
ironbank
vat

00:00:31

 
Name Stage Failure
failed
check cves Check Cves
INFO: Whitelisted vulnerabilities: {'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2017-15288-scala-2.1.3', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-13956-httpclient-4.5.11', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-12401-nss-3.53.1-17.el8_3', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2020-12399-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_GHSA-86wm-rrjm-8wh8-jetty-server-9.4.33.v20201020', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_VULNDB-243350-protobuf-3.13.0', 'anchorecve_GHSA-5mcr-gq6c-3hq2-netty-codec-http-4.1.50.Final', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-25648-nss-softokn-3.53.1-17.el8_3', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-15824-kotlin-1.4.0', 'anchorecve_CVE-2020-13956-httpclient-4.5.9', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.11', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_VULNDB-190269-jersey-2.25', 'anchorecve_CVE-2020-12399-nss-util-3.53.1-17.el8_3', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-12401-nss-softokn-3.53.1-17.el8_3', 'oscapcomp_CCE-80784-2', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'tl_CVE-2020-8908-com.google.guava_guava-28.1-android', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-10001-cups-libs-2.2.6-38.el8', 'tl_CVE-2020-8908-com.google.guava_guava-24.1.1-jre', 'tl_CVE-2018-20200-com.squareup.okhttp3_okhttp-3.9.0', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-35864-flatbuffers-1.9.0', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-android', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.9', 'anchorecve_CVE-2020-12401-nss-softokn-freebl-3.53.1-17.el8_3', 'anchorecve_VULNDB-243351-protobuf-3.13.0', 'tl_CVE-2020-14343-pyyaml-5.3.1', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82494-6', 'tl_CVE-2020-8908-com.google.guava_guava-26.0-jre', 'tl_CVE-2020-27218-org.eclipse.jetty_jetty-io-9.4.33.v20201020', 'tl_CVE-2021-21290-io.netty_netty-codec-4.1.47.Final', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'oscapcomp_CCE-82368-2', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_VULNDB-175810-slf4j-1.7.25', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'tl_CVE-2020-29582-kotlin-stdlib_kotlin-stdlib-1.4.0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-12399-nss-softokn-3.53.1-17.el8_3', 'oscapcomp_CCE-82472-2', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2020-13956-httpclient-4.5.3', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'anchorecve_CVE-2020-12401-nss-util-3.53.1-17.el8_3', 'oscapcomp_CCE-82395-5', 'anchorecve_VULNDB-177199-commons_io-2.5', 'anchorecve_CVE-2020-36242-cryptography-2.7', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'tl_CVE-2020-12399-nss-3.53.1-17.el8_3', 'anchorecve_GHSA-hggm-jpg3-v476-cryptography-2.7', 'anchorecve_VULNDB-248437-Jinja2-2.11.2', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'tl_CVE-2020-8908-com.google.guava_guava-27.1-jre', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-12399-nss-softokn-freebl-3.53.1-17.el8_3', 'tl_CVE-2020-12401-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'tl_CVE-2021-21290-io.netty_netty-codec-4.1.50.Final', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'anchorecve_VULNDB-93555-commons_codec-1.9', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_VULNDB-228971-hibernate_validator-6.1.2.Final', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'tl_CVE-2020-1971-cryptography-2.7', 'tl_CVE-2020-28493-jinja2-2.11.2', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_GHSA-5mcr-gq6c-3hq2-netty-codec-http-4.1.47.Final', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-25648-nss-util-3.53.1-17.el8_3', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_CVE-2020-25648-nss-softokn-freebl-3.53.1-17.el8_3', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'anchorecve_CVE-2020-12401-nss-sysinit-3.53.1-17.el8_3', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2018-20200-okhttp-3.9.0', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.3', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-28.1-jre', 'oscapcomp_CCE-82360-9', 'tl_CVE-2021-21290-io.netty_netty-all-4.1.50.Final', 'tl_CVE-2021-21290-io.netty_netty-codec-4.1.48.Final', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-29582-kotlin-1.4.0', 'anchorecve_CVE-2020-25648-nss-3.53.1-17.el8_3', 'tl_CVE-2020-25648-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-12399-nss-sysinit-3.53.1-17.el8_3', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-82168-6', 'oscapcomp_CCE-82880-6', 'anchorecve_GHSA-m8p2-495h-ccmh-hibernate-validator-6.0.17.Final', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-25648-nss-sysinit-3.53.1-17.el8_3', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8'}
INFO: Vulnerabilities found in scanning stage: 142
INFO: {'anchorecve_CVE-2017-15288-scala-2.1.3', 'anchorecve_CVE-2020-10663-json-1.1.1', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13956-httpclient-4.5.11', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-12401-nss-3.53.1-17.el8_3', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-12399-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_GHSA-86wm-rrjm-8wh8-jetty-server-9.4.33.v20201020', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_VULNDB-243350-protobuf-3.13.0', 'anchorecve_GHSA-5mcr-gq6c-3hq2-netty-codec-http-4.1.50.Final', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-25648-nss-softokn-3.53.1-17.el8_3', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-15824-kotlin-1.4.0', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.11', 'anchorecve_CVE-2020-13956-httpclient-4.5.9', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_VULNDB-190269-jersey-2.25', 'anchorecve_CVE-2020-12399-nss-util-3.53.1-17.el8_3', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-12401-nss-softokn-3.53.1-17.el8_3', 'oscapcomp_CCE-80784-2', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'tl_CVE-2020-8908-com.google.guava_guava-28.1-android', 'anchorecve_CVE-2020-10001-cups-libs-2.2.6-38.el8', 'tl_CVE-2020-8908-com.google.guava_guava-24.1.1-jre', 'tl_CVE-2018-20200-com.squareup.okhttp3_okhttp-3.9.0', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-35864-flatbuffers-1.9.0', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-android', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.9', 'anchorecve_CVE-2020-12401-nss-softokn-freebl-3.53.1-17.el8_3', 'anchorecve_VULNDB-243351-protobuf-3.13.0', 'tl_CVE-2020-14343-pyyaml-5.3.1', 'tl_CVE-2020-8908-com.google.guava_guava-26.0-jre', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82494-6', 'tl_CVE-2020-27218-org.eclipse.jetty_jetty-io-9.4.33.v20201020', 'tl_CVE-2021-21290-io.netty_netty-codec-4.1.47.Final', 'oscapcomp_CCE-82368-2', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_VULNDB-175810-slf4j-1.7.25', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'tl_CVE-2020-29582-kotlin-stdlib_kotlin-stdlib-1.4.0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-12399-nss-softokn-3.53.1-17.el8_3', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-13956-httpclient-4.5.3', 'anchorecve_CVE-2020-12401-nss-util-3.53.1-17.el8_3', 'oscapcomp_CCE-82395-5', 'anchorecve_VULNDB-177199-commons_io-2.5', 'anchorecve_CVE-2020-36242-cryptography-2.7', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'tl_CVE-2020-12399-nss-3.53.1-17.el8_3', 'anchorecve_GHSA-hggm-jpg3-v476-cryptography-2.7', 'anchorecve_VULNDB-248437-Jinja2-2.11.2', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'tl_CVE-2020-8908-com.google.guava_guava-27.1-jre', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-12399-nss-softokn-freebl-3.53.1-17.el8_3', 'tl_CVE-2020-12401-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'tl_CVE-2021-21290-io.netty_netty-codec-4.1.50.Final', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_VULNDB-93555-commons_codec-1.9', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_VULNDB-228971-hibernate_validator-6.1.2.Final', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-1971-cryptography-2.7', 'tl_CVE-2020-28493-jinja2-2.11.2', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_GHSA-5mcr-gq6c-3hq2-netty-codec-http-4.1.47.Final', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-25648-nss-util-3.53.1-17.el8_3', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'anchorecve_CVE-2020-25648-nss-softokn-freebl-3.53.1-17.el8_3', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-12401-nss-sysinit-3.53.1-17.el8_3', 'anchorecve_CVE-2018-20200-okhttp-3.9.0', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.3', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-28.1-jre', 'oscapcomp_CCE-82360-9', 'tl_CVE-2021-21290-io.netty_netty-all-4.1.50.Final', 'tl_CVE-2021-21290-io.netty_netty-codec-4.1.48.Final', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-29582-kotlin-1.4.0', 'tl_CVE-2020-25648-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-25648-nss-3.53.1-17.el8_3', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'oscapcomp_CCE-83401-0', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-12399-nss-sysinit-3.53.1-17.el8_3', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-82168-6', 'oscapcomp_CCE-82880-6', 'anchorecve_GHSA-m8p2-495h-ccmh-hibernate-validator-6.0.17.Final', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-25648-nss-sysinit-3.53.1-17.el8_3', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - CVE-2020-10663-json-1.1.1
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1