UNCLASSIFIED

Merge branch 'release-gitlab-13-12-0' into 'development'

Update GitLab to the 13.12.0 Feature Release

See merge request !89
16 jobs for development in 8 minutes and 24 seconds (queued for 9 minutes and 20 seconds)
Status Job ID Name Coverage
  .Pre
passed #3554869
ironbank
load scripts

00:00:06

 
  Preflight
passed #3554871
ironbank
folder structure

00:00:06

passed #3554872
ironbank
hardening_manifest

00:00:08

passed #3554870
ironbank
trufflehog

00:00:06

 
  Lint
passed #3554873
ironbank
wl compare lint

00:00:08

 
  Import Artifacts
passed #3554874
ironbank
import artifacts

00:00:13

 
  Scan Artifacts
passed #3554875
ironbank
clamav scan

00:00:55

 
  Build
passed #3554876
ironbank-isolated
build

00:01:46

 
  Scanning
passed #3554877
ironbank
anchore scan

00:02:20

passed #3554878
ironbank
openscap compliance

00:01:04

passed #3554879
ironbank
twistlock scan

00:00:40

 
  Csv Output
passed #3554880
ironbank
csv output

00:00:24

 
  Check Cves
failed #3554881
ironbank allowed to fail
check cves

00:00:08

 
  Documentation
passed #3554882
ironbank
documentation

00:00:49

 
  S3 Publish
passed #3554883
ironbank
upload to s3

00:01:11

 
  Vat
passed #3554884
ironbank
vat

00:00:08

 
Name Stage Failure
failed
check cves Check Cves
INFO: {Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-83401-0', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/webrick-1.6.0.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3e5fad1c039f3ecfd1dcdc94d2f1f9a0', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='bcd159901fe47efddae5c095b4b0d7fd', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-24370', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82959-8', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82949-9', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82494-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28153', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='320a97c6816565eedf3545833df99dd0', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82880-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='curl-7.61.1-18.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82360-9', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='fbfb22b68d356635a55049f927c8bd46', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82472-2', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82979-6', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='abb121e9621abdd452f65844954cf1c1', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-25613', package='webrick-1.6.0', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3516', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80938-4', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3541', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-24032', package='libzstd-1.4.4-1.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-config-0.9.4-2.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23841', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-31799', package='rdoc-6.2.1', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/rdoc-6.2.1.gemspec'), Finding(scan_source='oscap_comp', cve_id='CCE-82168-6', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='34de21e516c0ca50a96e5386f163f8bf', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='3752db4f702a5d0ca7d6ab35e09b44bd', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-15945', package='lua-libs-5.3.4-11.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='e7573262736ef52353cde3bae2617782', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82220-5', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='463a9a24225c26f7a5bf3f38908e5cb3', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-22876', package='libcurl-7.61.1-18.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-80935-0', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-common-2.28-151.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='3456a263793066e9b5063ada6e47917d', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-14155', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2019-20838', package='pcre-8.42-4.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3541', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='addbb93c22e9b0988b8b40392a4538cb', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3537', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82474-8', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='python3-libs-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20231', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82267-6', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_comp', cve_id='c2e44319ae5b3b040044d8ae116d1c2f', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2020-16135', package='libssh-0.9.4-2.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82985-3', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-2.28-151.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82368-2', package=None, package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82473-0', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='698044205a9c4a6d48b7937e66a6bf4f', package=None, package_path=None), Finding(scan_source='anchore_comp', cve_id='639f6f1177735759703e928c14714a59', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-31799', package='rdoc-6.2.1', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3426', package='platform-python-3.6.8-37.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27645', package='glibc-minimal-langpack-2.28-151.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='GHSA-8cr8-4vfw-mr7h', package='rexml-3.2.3', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/rexml-3.2.3.gemspec'), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3518', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82214-8', package=None, package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-28965', package='rexml-3.2.3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3421', package='rpm-build-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='oscap_comp', cve_id='CCE-82395-5', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20266', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2008-4318', package='observer-0.1.0', package_path='/usr/lib64/ruby/gems/2.7.0/specifications/default/observer-0.1.0.gemspec'), Finding(scan_source='anchore_comp', cve_id='c4ad80832b361f81df2a31e5b6b09864', package=None, package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-23840', package='openssl-libs-1.1.1g-15.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27219', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='python3-hawkey-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3445', package='libdnf-0.55.0-7.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-27218', package='glib2-2.56.4-9.el8', package_path=None), Finding(scan_source='twistlock_cve', cve_id='CVE-2021-20232', package='gnutls-3.6.14-8.el8_3', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='python3-rpm-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3517', package='python3-libxml2-2.9.7-9.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-20271', package='rpm-libs-4.14.3-13.el8', package_path=None), Finding(scan_source='anchore_cve', cve_id='CVE-2021-3520', package='lz4-libs-1.8.3-2.el8', package_path=None)}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 2
ERROR: The following vulnerabilities are not whitelisted:
ERROR: scan_source cve_id package package_path
ERROR: anchore_comp 3752db4f702a5d0ca7d6ab35e09b44bd None None
ERROR: anchore_comp fbfb22b68d356635a55049f927c8bd46 None None
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1