UNCLASSIFIED

Merge branch 'patch-1' into 'development'

fix permissions

See merge request !26
19 jobs for development in 58 minutes and 1 second (queued for 57 minutes and 18 seconds)
Status Job ID Name Coverage
  .Pre
passed #1689533
ironbank
load scripts

00:00:47

 
  Preflight
passed #1689534
ironbank
folder structure

00:00:32

passed #1689536
ironbank
hardening_manifest

00:01:03

passed #1689535
ironbank
hardening_manifest migration

00:00:35

 
  Lint
passed #1689537
ironbank
wl compare lint

00:01:14

 
  Import Artifacts
passed #1689538
ironbank
import artifacts

00:07:51

 
  Scan Artifacts
passed #1689539
ironbank
clamav scan

00:04:14

 
  Build
passed #1689540
ironbank-isolated
build

00:11:56

 
  Scanning
passed #1689544
ironbank
anchore scan

00:19:32

passed #1689541
ironbank
openscap compliance

00:02:23

passed #1689542
ironbank
openscap cve

00:07:11

passed #1689543
ironbank
twistlock scan

00:02:09

 
  Csv Output
passed #1689545
ironbank
csv output

00:01:49

 
  Check Cves
failed #1689546
ironbank allowed to fail
check cves

00:00:14

 
  Documentation
passed #1689547
ironbank
sign image

00:02:58

passed #1689548
ironbank
sign manifest

00:00:45

passed #1689549
ironbank
write json documentation

00:00:45

 
  Publish
passed #1689550
ironbank
upload to s3

00:05:44

 
  Vat
passed #1689551
ironbank
vat

00:00:30

 
Name Stage Failure
failed
check cves Check Cves
INFO: {'tl_CVE-2020-36182-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-13956-httpclient-4.5.5', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_VULNDB-156102-okhttp-3.6.0', 'tl_CVE-2019-17571-log4j_log4j-1.2.17', 'tl_CVE-2020-36183-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_VULNDB-173701-nifi-0.7.0', 'anchorecve_CVE-2009-1523-jetty-3.1', 'tl_CVE-2020-35728-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'oscapcomp_CCE-82949-9', 'anchorecve_VULNDB-229673-ant-1.9.13', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_VULNDB-141255-spring_framework-4.3.19', 'anchorecve_VULNDB-223362-nifi-0.7.0', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'tl_CVE-2020-13956-org.apache.httpcomponents_httpclient-4.5.5', 'anchorecve_CVE-2007-5614-jetty-3.1', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-36180-jackson-databind-2.9.10.5', 'tl_CVE-2020-36185-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'tl_CVE-2020-36188-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'tl_CVE-2020-36181-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_VULNDB-237494-jackson-databind-2.9.10.5', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-167358-nifi-0.7.0', 'anchorecve_VULNDB-177199-commons_io-2.6', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'tl_CVE-2020-35491-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2017-7665-nifi-0.7.0', 'tl_CVE-2020-5408-spring-security-core_spring-security-core-4.2.13', 'oscapcomp_CCE-82472-2', 'tl_CVE-2020-35490-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-36182-jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-36186-jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'tl_CVE-2020-25649-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_GHSA-5949-rw7g-wx7w-jackson-databind-2.9.10.5', 'anchorecve_CVE-2009-1524-jetty-3.1', 'anchorecve_CVE-2020-35490-jackson-databind-2.9.10.5', 'tl_CVE-2020-24616-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'oscapcomp_CCE-82959-8', 'oscapcomp_CCE-82985-3', 'anchorecve_VULNDB-238682-spring_framework-4.3.19', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-36187-jackson-databind-2.9.10.5', 'tl_CVE-2021-3156-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-36181-jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2007-5613-jetty-3.1', 'tl_CVE-2019-20444-io.netty_netty-codec-4.1.42.Final', 'tl_CVE-2020-24750-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'tl_CVE-2020-36179-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'tl_CVE-2020-36187-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_VULNDB-171100-commons_net-3.6', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_VULNDB-237495-jackson-databind-2.9.10.5', 'anchorecve_GHSA-mm9x-g8pc-w292-netty-handler-4.1.42.Final', 'anchorecve_VULNDB-243649-nifi-1.12.1', 'anchorecve_CVE-2020-36185-jackson-databind-2.9.10.5', 'oscapcomp_CCE-80935-0', 'anchorecve_VULNDB-153070-nifi-0.7.0', 'anchorecve_VULNDB-190923-spring_framework-4.3.19', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-237007-jackson-databind-2.9.10.5', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'tl_CVE-2018-20200-com.squareup.okhttp3_okhttp-3.6.0', 'anchorecve_GHSA-cqqj-4p63-rrmm-netty-handler-4.1.42.Final', 'anchorecve_CVE-2005-3747-jetty-3.1', 'tl_CVE-2020-9488-log4j_log4j-1.2.17', 'tl_CVE-2019-20445-io.netty_netty-codec-4.1.42.Final', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2009-5048-jetty-3.1', 'anchorecve_VULNDB-176992-nifi-0.7.0', 'anchorecve_VULNDB-190269-jersey-2.26', 'anchorecve_CVE-2018-20200-okhttp-3.6.0', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35491-jackson-databind-2.9.10.5', 'tl_CVE-2020-36184-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'tl_CVE-2020-36180-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'tl_CVE-2018-15756-spring-core_spring-core-4.3.19', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2016-8748-nifi-0.7.0', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-36184-jackson-databind-2.9.10.5', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8', 'oscapcomp_CCE-82220-5', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-jre', 'anchorecve_CVE-2020-25649-jackson-databind-2.9.10.5', 'oscapcomp_CCE-80938-4', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_VULNDB-131525-nifi-0.7.0', 'tl_CVE-2021-20190-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2020-9488-log4j-1.2.17', 'anchorecve_CVE-2020-36188-jackson-databind-2.9.10.5', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2011-4461-jetty-3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-11612-io.netty_netty-codec-4.1.42.Final', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_VULNDB-181112-nifi-0.7.0', 'anchorecve_CVE-2009-5049-jetty-3.1', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_GHSA-86wm-rrjm-8wh8-jetty-server-9.4.26.v20200117', 'anchorecve_VULNDB-220038-log4j-1.2.17', 'anchorecve_CVE-2017-15806-mail-1.4', 'tl_CVE-2020-36186-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'tl_CVE-2020-36189-com.fasterxml.jackson.core_jackson-databind-2.9.10.5', 'tl_CVE-2020-27218-org.eclipse.jetty_jetty-io-9.4.26.v20200117', 'tl_CVE-2020-27216-org.eclipse.jetty_jetty-io-9.4.26.v20200117', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'anchorecve_GHSA-2qrg-x229-3v8q-log4j-1.2.17', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35728-jackson-databind-2.9.10.5', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_GHSA-p2v9-g2qv-p635-netty-handler-4.1.42.Final', 'anchorecve_VULNDB-204607-logback-1.2.3', 'oscapcomp_CCE-82473-0', 'tl_CVE-2020-5421-spring-core_spring-core-4.3.19', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_VULNDB-236893-jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-36183-jackson-databind-2.9.10.5', 'anchorecve_CVE-2020-17521-groovy-2.5.4', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-36179-jackson-databind-2.9.10.5', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_VULNDB-153069-nifi-0.7.0', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-36189-jackson-databind-2.9.10.5', 'anchorecve_CVE-2017-7667-nifi-0.7.0'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 3
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - GHSA-5949-rw7g-wx7w-jackson-databind-2.9.10.5
ERROR: Twistlock CVE - CVE-2021-20190-com.fasterxml.jackson.core_jackson-databind-2.9.10.5
ERROR: Twistlock CVE - CVE-2021-3156-sudo-1.8.29-6.el8
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1