UNCLASSIFIED

forced ssl.conf to listen on 8443, updated allowed TLS

14 jobs for jweatherford-development-patch-36408 in 10 minutes and 18 seconds (queued for 29 seconds)
Status Job ID Name Coverage
  .Pre
passed #2113444
ironbank
load scripts

00:00:06

 
  Preflight
passed #2113445
ironbank
folder structure

00:00:05

passed #2113447
ironbank
hardening_manifest

00:02:09

passed #2113446
ironbank
hardening_manifest migration

00:00:05

 
  Lint
passed #2113448
ironbank
wl compare lint

00:00:10

 
  Import Artifacts
passed #2113449
ironbank
import artifacts

00:00:10

 
  Scan Artifacts
passed #2113450
ironbank
clamav scan

00:01:24

 
  Build
passed #2113451
ironbank-isolated
build

00:01:45

 
  Scanning
passed #2113455
ironbank
anchore scan

00:03:30

passed #2113452
ironbank
openscap compliance

00:00:49

passed #2113453
ironbank
openscap cve

00:03:28

passed #2113454
ironbank
twistlock scan

00:00:19

 
  Csv Output
passed #2113456
ironbank
csv output

00:00:46

 
  Check Cves
failed #2113457
ironbank allowed to fail
check cves

00:00:13

 
Name Stage Failure
failed
check cves Check Cves
INFO: Vulnerabilities found in scanning stage: 79
INFO: {'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82949-9', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82220-5', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'oscapcomp_CCE-83401-0', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82214-8', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-80784-2', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-26137-python3-urllib3-1.24.2-4.el8', 'oscapcomp_CCE-80938-4', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82395-5', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82473-0'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 2
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - CVE-2021-23336-platform-python-3.6.8-31.el8
ERROR: Anchore CVE - CVE-2021-23336-python3-libs-3.6.8-31.el8
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1