UNCLASSIFIED

Merge branch 'release-gitlab-13-11-2' into 'development'

Update GitLab to the 13.11.2 Security Release

See merge request !84
17 jobs for development in 26 minutes and 7 seconds (queued for 36 minutes and 58 seconds)
Status Job ID Name Coverage
  .Pre
passed #3261304
ironbank
load scripts

00:00:06

 
  Preflight
passed #3261306
ironbank
folder structure

00:00:05

passed #3261307
ironbank
hardening_manifest

00:00:10

passed #3261305
ironbank
trufflehog

00:00:06

 
  Lint
failed #3261308
ironbank allowed to fail
wl compare lint

00:00:11

 
  Import Artifacts
passed #3261309
ironbank
import artifacts

00:00:44

 
  Scan Artifacts
passed #3261466
ironbank
clamav scan

00:05:36

failed #3261310
ironbank
clamav scan

00:00:05

 
  Build
passed #3261311
ironbank-isolated
build

00:04:24

 
  Scanning
passed #3261312
ironbank
anchore scan

00:07:41

passed #3261313
ironbank
openscap compliance

00:02:07

passed #3261314
ironbank
twistlock scan

00:07:12

 
  Csv Output
passed #3261315
ironbank
csv output

00:02:15

 
  Check Cves
failed #3261316
ironbank allowed to fail
check cves

00:00:15

 
  Documentation
passed #3261317
ironbank
documentation

00:01:57

 
  S3 Publish
passed #3261318
ironbank
upload to s3

00:02:34

 
  Vat
passed #3261319
ironbank
vat

00:00:09

 
Name Stage Failure
failed
check cves Check Cves
INFO: {Finding(scan_source='anchore_cve', cve_id='CVE-2020-29362', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29362', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22902', package='actionpack-6.0.3.6', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8286', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-11233', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3177', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27618', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8286', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8927', package='brotli-1.0.6-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2015-9284', package='omniauth-1.9.0', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35522', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13435', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-ww4x-rwq6-qpgf', package='omniauth-1.9.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/omniauth-1.9.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-31799', package='rdoc-6.1.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-226240', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3326', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25694', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-2542', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/webrick-1.6.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2016-11086', package='oauth-0.5.4', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-255039', package='rack-2.2.3', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rack-2.2.3.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-31799', package='rdoc-6.1.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rdoc-6.1.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35524', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24977', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35523', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-7wjx-3g7j-8584', package='actionpack-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35521', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='54858d850d41bc25ea11f14382b02d28', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83364-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-15298', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='6519f1f9895cdbfb04af57f2c58834c8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29362', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2016-2324', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22904', package='actionpack-6.0.3.6', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83377-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8231', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7020', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2014-9938', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8286', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-7619', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-28196', package='krb5-libs-1.18.2-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29363', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2014-9390', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27619', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.48.0-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-14867', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22902', package='rails-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rails-6.0.3.6.gemspec'), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3520', package='lz4-libs-1.8.3-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-8cr8-4vfw-mr7h', package='rexml-3.2.3', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/rexml-3.2.3.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15945', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25695', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7019', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8927', package='brotli-1.0.6-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-21300', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-19604', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35522', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3393', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-11008', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='GHSA-g8ww-46x2-2p65', package='actionpack-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec'), Finding(scan_source='anchore_comp', cve_id='41cb7cdf04850e33a11f80c42bf660b3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-3906', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-13776', package='systemd-239-41.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8284', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-pam-239-41.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80784-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-24032', package='libzstd-1.4.4-1.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8285', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22904', package='actionpack-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2017-1000117', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2013-0308', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2018-1000021', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29361', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.48.0-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2015-9357', package='akismet-3.0.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/akismet-3.0.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3177', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='f56825f2ad5275072ef798364f0263f7', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25696', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2008-4318', package='observer-0.1.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/observer-0.1.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35523', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-hjg4-8q5f-x6fm', package='actionpack-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8284', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29361', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8285', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35524', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.48.0-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14350', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22904', package='rails-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rails-6.0.3.6.gemspec'), Finding(scan_source='anchore_cve', cve_id='VULNDB-253149', package='asciidoctor-2.0.12', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/asciidoctor-2.0.12.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22885', package='actionpack-6.0.3.6', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8231', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-11235', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-25013', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8284', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14349', package='postgres-12.3', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35521', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22885', package='rails-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rails-6.0.3.6.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15358', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23336', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20229', package='postgres-12.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29363', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29361', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-7359-3c6r-hfc2', package='oauth-0.5.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/oauth-0.5.4.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13434', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8285', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22902', package='actionpack-6.0.3.6', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29363', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24977', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-8.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23336', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='cbff271f45d32e78dcc1979dbca9c14d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-31799', package='rdoc-6.2.1', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/rdoc-6.2.1.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-19486', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-239-41.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-libs-239-41.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8231', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7021', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27619', package='platform-python-3.6.8-31.el8', package_path=None)}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 2
ERROR: The following vulnerabilities are not whitelisted:
ERROR: scan_source cve_id package package_path
ERROR: anchore_cve CVE-2021-22902 actionpack-6.0.3.6 /srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec
ERROR: anchore_cve CVE-2021-22904 actionpack-6.0.3.6 /srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/actionpack-6.0.3.6.gemspec
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1
failed
wl compare lint Lint
Uploading artifacts for failed job
Uploading artifacts...
ci-artifacts/lint/: found 3 matching files and directories

Uploading artifacts as "archive" to coordinator... ok
id=3261308 responseStatus=201 Created token=yhYWQvf-
Uploading artifacts...
variables.env: found 1 matching files and directories

Uploading artifacts as "dotenv" to coordinator... ok
id=3261308 responseStatus=201 Created token=yhYWQvf-
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 3