UNCLASSIFIED

Merge branch 'alfontaine-development-patch-62122' into 'development'

Update Dockerfile

See merge request !80
18 jobs for development in 11 minutes and 18 seconds (queued for 12 minutes and 18 seconds)
Status Job ID Name Coverage
  .Pre
passed #2338091
ironbank
load scripts

00:00:12

 
  Preflight
passed #2338092
ironbank
folder structure

00:00:05

passed #2338093
ironbank
hardening_manifest

00:00:10

 
  Lint
passed #2338094
ironbank
wl compare lint

00:00:09

 
  Import Artifacts
passed #2338095
ironbank
import artifacts

00:00:11

 
  Scan Artifacts
passed #2338096
ironbank
clamav scan

00:00:57

 
  Build
passed #2338097
ironbank-isolated
build

00:01:59

 
  Scanning
passed #2338101
ironbank
anchore scan

00:02:04

passed #2338098
ironbank
openscap compliance

00:01:02

passed #2338099
ironbank
openscap cve

00:04:14

passed #2338100
ironbank
twistlock scan

00:00:20

 
  Csv Output
passed #2338102
ironbank
csv output

00:00:53

 
  Check Cves
failed #2338103
ironbank allowed to fail
check cves

00:00:14

 
  Documentation
passed #2338104
ironbank
sign image

00:00:27

passed #2338105
ironbank
sign manifest

00:00:20

passed #2338106
ironbank
write json documentation

00:00:20

 
  Publish
passed #2338107
ironbank
upload to s3

00:01:20

 
  Vat
passed #2338108
ironbank
vat

00:00:27

 
Name Stage Failure
failed
check cves Check Cves
INFO: Vulnerabilities found in scanning stage: 107
INFO: {Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-12.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29363', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8286', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35512', package='dbus-1.12.8-12.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8284', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23336', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80784-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-7.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-13776', package='systemd-239-41.el8_3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35512', package='dbus-tools-1.12.8-12.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24977', package='python3-libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3326', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8231', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8286', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27619', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8285', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8285', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2008-4318', package='observer-0.1.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/observer-0.1.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-libs-239-41.el8_3.1', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8927', package='brotli-1.0.6-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35512', package='dbus-libs-1.12.8-12.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15358', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-7.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8285', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-7.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='VULNDB-115884', package='urllib3-1.24.2', package_path='/usr/lib/python3.6/site-packages/urllib3'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29362', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-25013', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3326', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-28196', package='krb5-libs-1.18.2-5.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8927', package='brotli-1.0.6-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27619', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29361', package='p11-kit-trust-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/webrick-1.6.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35512', package='dbus-daemon-1.12.8-12.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-35512', package='dbus-common-1.12.8-12.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13434', package='sqlite-libs-3.26.0-11.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8231', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3177', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29362', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29363', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-26137', package='urllib3-1.24.2', package_path='/usr/lib/python3.6/site-packages/urllib3'), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-minimal-langpack-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8286', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8284', package='libcurl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29362', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-3881', package='bundler-1.17.3', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/bundler-1.17.3.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-239-41.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29361', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-29363', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-27618', package='glibc-common-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24977', package='libxml2-2.9.7-8.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-25013', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-13776', package='systemd-pam-239-41.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-31.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-8231', package='curl-7.61.1-14.el8_3.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3177', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23336', package='python3-libs-3.6.8-31.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-27618', package='glibc-2.28-127.el8_3.2', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-7.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-12.el8_3', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-29361', package='p11-kit-0.23.14-5.el8_0', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-8284', package='curl-7.61.1-14.el8_3.1', package_path=None)}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: scan_source cve_id package package_path
ERROR: anchore_cve CVE-2020-25613 webrick-1.6.0 /usr/lib64/ruby/gems/2.7.0/specifications/default/webrick-1.6.0.gemspec
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1