UNCLASSIFIED

Merge branch 'release-gitlab-14-1-0' into 'development'

Update GitLab to the 14.1.0 Minor Feature Release

See merge request !94
16 jobs for development in 22 minutes and 41 seconds (queued for 22 minutes and 1 second)
Status Job ID Name Coverage
  .Pre
passed #5080584
load-scripts

00:00:10

 
  Preflight
passed #5080586
folder-structure

00:00:08

passed #5080587
hardening-manifest

00:00:11

passed #5080585
trufflehog

00:00:09

 
  Lint
passed #5080588
wl-compare-lint

00:00:12

 
  Import Artifacts
passed #5080589
import-artifacts

00:00:47

 
  Scan Artifacts
passed #5080590
clamav-scan

00:03:10

 
  Build
passed #5080591
build

00:04:27

 
  Scanning
passed #5080592
anchore-scan

00:06:24

passed #5080593
ironbank-dsop-privileged
openscap-compliance

00:02:13

passed #5080594
twistlock-scan

00:03:52

 
  Csv Output
passed #5080595
csv-output

00:02:00

 
  Check Cves
failed #5080596
allowed to fail
check-cves

00:00:13

 
  Documentation
passed #5080597
documentation

00:01:56

 
  S3 Publish
passed #5080598
upload-to-s3

00:02:49

 
  Vat
passed #5080599
vat

00:00:17

 
Name Stage Failure
failed
check-cves Check Cves
INFO: {Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-15298', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22925', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='0724e63c9480b16207b35a14ca825a82', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-2542', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-17541', package='libjpeg-turbo-1.5.3-10.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-19604', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='cbff271f45d32e78dcc1979dbca9c14d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-8cr8-4vfw-mr7h', package='rexml-3.2.3', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/rexml-3.2.3.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22137', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22922', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22924', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22135', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2008-4318', package='observer-0.1.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/observer-0.1.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36086', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36086', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='6519f1f9895cdbfb04af57f2c58834c8', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='f56825f2ad5275072ef798364f0263f7', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-14867', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='41cb7cdf04850e33a11f80c42bf660b3', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='54858d850d41bc25ea11f14382b02d28', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2016-11086', package='oauth-0.5.4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22898', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2014-9390', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-11233', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35522', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33574', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22925', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2015-9284', package='omniauth-1.9.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22922', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22898', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-35942', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22924', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33560', package='libgcrypt-1.8.5-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-11008', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3200', package='libsolv-0.7.16-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35524', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33574', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36085', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-33560', package='libgcrypt-1.8.5-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-1000021', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2015-9357', package='akismet-3.0.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/akismet-3.0.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35524', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35521', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36087', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2010-3906', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35523', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36084', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35942', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3572', package='python3-pip-wheel-9.0.3-19.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36222', package='krb5-libs-1.18.2-8.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-226240', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7021', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-33575', package='plist-3.6.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/plist-3.6.0.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7019', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-32027', package='postgres-13.2', package_path=None), Finding(scan_source='anchore_comp', cve_id='66210db816d1648b1a5f6e2bb7670772', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22898', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-7359-3c6r-hfc2', package='oauth-0.5.4', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/oauth-0.5.4.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-35523', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2016-2324', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35938', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2014-9938', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-36087', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2017-1000117', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-7020', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2013-0308', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3580', package='nettle-3.4.1-4.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22923', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-14.el8_4', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-17541', package='libjpeg-turbo-1.5.3-10.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35939', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35521', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35522', package='libtiff-4.0.9-18.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-21300', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-31799', package='rdoc-6.2.1', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/rdoc-6.2.1.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-7619', package='elasticsearch-6.8.2', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/elasticsearch-6.8.2.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-11235', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='VULNDB-255039', package='rack-2.2.3', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/rack-2.2.3.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-35937', package='rpm-4.14.3-14.el8_4', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2018-19486', package='git-1.7.0', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/git-1.7.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/webrick-1.6.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-10.el8_4', package_path=None), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-36084', package='libsepol-2.9-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-ww4x-rwq6-qpgf', package='omniauth-1.9.1', package_path='/srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/omniauth-1.9.1.gemspec')}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 2
ERROR: The following vulnerabilities are not whitelisted:
ERROR: scan_source cve_id package package_path
ERROR: anchore_cve GHSA-ww4x-rwq6-qpgf omniauth-1.9.1 /srv/gitlab/vendor/bundle/ruby/2.7.0/specifications/omniauth-1.9.1.gemspec
ERROR: twistlock_cve CVE-2015-9284 omniauth-1.9.1 None
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1