UNCLASSIFIED

Update amazon/aws-cli Docker tag to v2.1.21

14 jobs for renovate/docker-amazon-aws-cli-2.x in 22 minutes and 38 seconds (queued for 20 seconds)
Status Job ID Name Coverage
  .Pre
passed #1596005
ironbank
load scripts

00:00:06

 
  Preflight
passed #1596006
ironbank
folder structure

00:00:09

passed #1596008
ironbank
hardening_manifest

00:00:12

passed #1596007
ironbank
hardening_manifest migration

00:00:12

 
  Lint
passed #1596009
ironbank
wl compare lint

00:00:20

 
  Import Artifacts
passed #1596010
ironbank
import artifacts

00:00:51

 
  Scan Artifacts
passed #1596011
ironbank
clamav scan

00:03:50

 
  Build
passed #1596012
ironbank-isolated
build

00:02:48

 
  Scanning
passed #1596016
ironbank
anchore scan

00:11:58

passed #1596013
ironbank
openscap compliance

00:01:45

passed #1596014
ironbank
openscap cve

00:08:52

passed #1596015
ironbank
twistlock scan

00:00:39

 
  Csv Output
passed #1596017
ironbank
csv output

00:02:01

 
  Check Cves
failed #1596018
ironbank allowed to fail
check cves

00:00:26

 
Name Stage Failure
failed
check cves Check Cves
INFO: Vulnerabilities found in scanning stage: 72
INFO: {'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'oscapcomp_CCE-82368-2', 'oscapcomp_CCE-82985-3', 'oscapcomp_CCE-82360-9', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82494-6', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8', 'oscapcomp_CCE-82979-6', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82395-5', 'anchorecve_GHSA-hggm-jpg3-v476-cryptography-2.8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 2
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - GHSA-hggm-jpg3-v476-cryptography-2.8
ERROR: Twistlock CVE - CVE-2021-23239-sudo-1.8.29-6.el8
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1