UNCLASSIFIED

Merge branch 'release-gitlab-13-10-3' into 'development'

Update GitLab to the 13.10.3 Security Release

See merge request !80
20 jobs for development in 36 minutes and 34 seconds (queued for 35 minutes and 20 seconds)
Status Job ID Name Coverage
  .Pre
passed #2900000
ironbank
load scripts

00:00:06

 
  Preflight
passed #2900002
ironbank
folder structure

00:00:05

passed #2900003
ironbank
hardening_manifest

00:00:10

passed #2900001
ironbank
trufflehog

00:00:06

 
  Lint
passed #2900004
ironbank
wl compare lint

00:00:09

 
  Finding Compare
passed #2900005
ironbank
vat compare

00:00:09

 
  Import Artifacts
passed #2900006
ironbank
import artifacts

00:00:48

 
  Scan Artifacts
passed #2900007
ironbank
clamav scan

00:06:09

 
  Build
passed #2900008
ironbank-isolated
build

00:06:09

 
  Scanning
passed #2900009
ironbank
anchore scan

00:06:52

passed #2900010
ironbank
openscap compliance

00:11:36

passed #2900011
ironbank
openscap cve

00:14:07

passed #2900012
ironbank
twistlock scan

00:02:29

 
  Csv Output
passed #2900013
ironbank
csv output

00:02:41

 
  Check Cves
failed #2900014
ironbank allowed to fail
check cves

00:00:16

 
  Documentation
passed #2900015
ironbank
sign image

00:01:31

passed #2900016
ironbank
sign manifest

00:00:34

passed #2900017
ironbank
write json documentation

00:00:34

 
  S3 Publish
passed #2900018
ironbank
upload to s3

00:04:03

 
  Vat
passed #2900019
ironbank
vat

00:00:08

 
Name Stage Failure
failed
check cves Check Cves
INFO: Vulnerabilities found in scanning stage: 197
INFO: {Finding(scan_source='anchore_cve', cve_id='VULNDB-253149', package='asciidoctor-2.0.12', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/asciidoctor-2.0.12.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2015-9284', package='omniauth-1.9.0', package_path=None), Finding(scan_source='anchore_comp', cve_id='f56825f2ad5275072ef798364f0263f7', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.48.0-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3177', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8285', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14349', package='postgres-12.3', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8231', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-19486', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2019-19604', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35521', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35522', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29361', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-libs-239-41.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24977', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8286', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-1000021', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.48.0-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-11235', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83377-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8927', package='brotli-1.0.6-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-pam-239-41.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22881', package='rails-6.0.3.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rails-6.0.3.4.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-11233', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25739', package='gon-6.2.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/gon-6.2.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2014-9938', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-252080', package='kramdown-2.3.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/kramdown-2.3.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8231', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35522', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-fwcm-636p-68r5', package='carrierwave-1.3.1', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/carrierwave-1.3.1.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28834', package='kramdown-2.3.0', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35523', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3177', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23336', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2016-2324', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='6519f1f9895cdbfb04af57f2c58834c8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8286', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23336', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-cf3w-g86h-35x4', package='carrierwave-1.3.1', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/carrierwave-1.3.1.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7020', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-83364-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-15298', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29362', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25694', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35524', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='41cb7cdf04850e33a11f80c42bf660b3', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/webrick-1.6.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='GHSA-52p9-v744-mwjj', package='kramdown-2.3.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/kramdown-2.3.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2015-9357', package='akismet-3.0.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/akismet-3.0.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13434', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35521', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25695', package='postgres-12.3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29362', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-14867', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15358', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-21300', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14350', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-2542', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29363', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2008-4318', package='observer-0.1.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/observer-0.1.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25696', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13435', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-25013', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-28196', package='krb5-libs-1.18.2-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.48.0-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29361', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-ww4x-rwq6-qpgf', package='omniauth-1.9.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/omniauth-1.9.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22881', package='actionpack-6.0.3.4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3393', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24977', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-7359-3c6r-hfc2', package='oauth-0.5.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/oauth-0.5.4.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-239-41.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35523', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-24032', package='libzstd-1.4.4-1.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8284', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8285', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-8hc4-xxm3-5ppp', package='activerecord-6.0.3.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/activerecord-6.0.3.4.gemspec'), Finding(scan_source='anchore_comp', cve_id='cbff271f45d32e78dcc1979dbca9c14d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29362', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8284', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-1000117', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27618', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20229', package='postgres-12.3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80784-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8231', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-226240', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22880', package='activerecord-6.0.3.4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27619', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35524', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7021', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-11008', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-13776', package='systemd-239-41.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29363', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27619', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8927', package='brotli-1.0.6-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3326', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2014-9390', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-7619', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8285', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-12762', package='json-c-0.13.1-0.2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2013-0308', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25739', package='gon-6.2.0', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-8877-prq4-9xfw', package='actionpack-6.0.3.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.4.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-12762', package='json-c-0.13.1-0.2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-3906', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='54858d850d41bc25ea11f14382b02d28', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29363', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7019', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-21305', package='carrierwave-1.3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29361', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22881', package='actionpack-6.0.3.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.4.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8284', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-21288', package='carrierwave-1.3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22880', package='rails-6.0.3.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rails-6.0.3.4.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15945', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8286', package='curl-7.61.1-14.el8_3.1', package_path=None)}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: scan_source cve_id package package_path
ERROR: anchore_cve GHSA-7359-3c6r-hfc2 oauth-0.5.4 /srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/oauth-0.5.4.gemspec
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1