UNCLASSIFIED

Update docker.io/zookeeper:3.7.0 Docker digest to 530b281

14 jobs for renovate/docker-docker.io-zookeeper-3.7.0 in 15 minutes and 9 seconds (queued for 7 seconds)
Status Job ID Name Coverage
  .Pre
passed #2692227
ironbank
load scripts

00:00:07

 
  Preflight
passed #2692228
ironbank
folder structure

00:00:05

passed #2692229
ironbank
hardening_manifest

00:00:09

 
  Lint
passed #2692230
ironbank
wl compare lint

00:00:09

 
  Finding Compare
failed #2692231
ironbank allowed to fail
vat compare

00:00:07

 
  Import Artifacts
passed #2692232
ironbank
import artifacts

00:00:38

 
  Scan Artifacts
passed #2692233
ironbank
clamav scan

00:03:48

 
  Build
passed #2692234
ironbank-isolated
build

00:03:27

 
  Scanning
passed #2692238
ironbank
anchore scan

00:02:14

passed #2692235
ironbank
openscap compliance

00:00:59

passed #2692236
ironbank
openscap cve

00:05:32

passed #2692237
ironbank
twistlock scan

00:00:32

 
  Csv Output
passed #2692239
ironbank
csv output

00:00:51

 
  Check Cves
failed #2692240
ironbank allowed to fail
check cves

00:00:15

 
Name Stage Failure
failed
check cves Check Cves
ERROR: anchore_cve                   GHSA-26vr-8j45-3r4w           jetty-io-9.4.38.v20210224     /apache-zookeeper-3.7.0-bin/lib/jetty-io-9.4.38.v20210224.jar    
ERROR: anchore_cve CVE-2019-17571 log4j-1.2.17 /apache-zookeeper-3.7.0-bin/lib/log4j-1.2.17.jar
ERROR: anchore_cve CVE-2020-9488 log4j-1.2.17 /apache-zookeeper-3.7.0-bin/lib/log4j-1.2.17.jar
ERROR: anchore_cve GHSA-2qrg-x229-3v8q log4j-1.2.17 /apache-zookeeper-3.7.0-bin/lib/log4j-1.2.17.jar
ERROR: twistlock_cve CVE-2021-21295 io.netty_netty-codec-4.1.59.Final None
ERROR: twistlock_cve CVE-2021-21409 io.netty_netty-codec-4.1.59.Final None
ERROR: twistlock_cve CVE-2021-28163 org.eclipse.jetty_jetty-io-9.4.38.v20210224 None
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1
failed
vat compare Finding Compare
INFO: ('CVE-2020-35512', 'anchore_cve', 'dbus-libs-1.12.8-12.el8_3\nhttps://access.redhat.com/security/cve/CVE-2020-35512', 'dbus-libs-1.12.8-12.el8_3', None)
INFO: ('CVE-2020-35512', 'anchore_cve', 'dbus-tools-1.12.8-12.el8_3\nhttps://access.redhat.com/security/cve/CVE-2020-35512', 'dbus-tools-1.12.8-12.el8_3', None)
INFO: ('CVE-2021-23840', 'twistlock_cve', 'Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).', 'openssl-1.1.1g-15.el8_3', None)
Uploading artifacts for failed job
Uploading artifacts...
ci-artifacts/compare/: found 2 matching files and directories

Uploading artifacts as "archive" to coordinator... ok
id=2692231 responseStatus=201 Created token=5b9zhzsi
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 4