Running with gitlab-runner 17.8.0 (e4f782b3)
  on gitlab-runner-dsop-privileged-7c569bdb78-w7t5q t2_g2CUf, system ID: r_KxM1tK9mgcsY
  feature flags: FF_USE_FASTZIP:true
Resolving secrets
section_start:1743815860:prepare_executor
Preparing the "kubernetes" executor
Using Kubernetes namespace: gitlab-runner-dsop-privileged
Using Kubernetes executor with image [MASKED]/ironbank-pipelines/pipeline-runner-alpine:25.03.24-162625-01 ...
Using attach strategy to execute scripts...
section_end:1743815860:prepare_executor
section_start:1743815860:prepare_script
Preparing environment
Using FF_USE_POD_ACTIVE_DEADLINE_SECONDS, the Pod activeDeadlineSeconds will be set to the job timeout: 1h0m0s...
Waiting for pod gitlab-runner-dsop-privileged/runner-t2g2cuf-project-11791-concurrent-1-alahq7bj to be running, status is Pending
Waiting for pod gitlab-runner-dsop-privileged/runner-t2g2cuf-project-11791-concurrent-1-alahq7bj to be running, status is Pending
	ContainersNotInitialized: "containers with incomplete status: [istio-proxy init-permissions]"
	ContainersNotReady: "containers with unready status: [istio-proxy build helper]"
	ContainersNotReady: "containers with unready status: [istio-proxy build helper]"
Running on runner-t2g2cuf-project-11791-concurrent-1-alahq7bj via gitlab-runner-dsop-privileged-7c569bdb78-w7t5q...

section_end:1743815867:prepare_script
section_start:1743815867:get_sources
Getting source from Git repository
Fetching changes with git depth set to 50...
Initialized empty Git repository in /builds/dsop/opensource/haproxy/haproxy24/.git/
Created fresh repository.
Checking out 2f53910d as detached HEAD (ref is master)...

Skipping Git submodules setup

section_end:1743815867:get_sources
section_start:1743815867:download_artifacts
Downloading artifacts
Downloading artifacts for build-amd64 (44047140)...

Downloading artifacts 0 B (0 B/s)                
Downloading artifacts 25.72 MB (66.4 MB/s)                
Downloading artifacts from coordinator... ok        host=ib-prod-gitlab-artifacts.s3.us-gov-west-1.amazonaws.com id=44047140 responseStatus=200 OK token=glcbt-64
Downloading artifacts for setup (44047138)...

Downloading artifacts 0 B (0 B/s)                
Downloading artifacts 1.18 MB (8.5 MB/s)                
Downloading artifacts from coordinator... ok        host=ib-prod-gitlab-artifacts.s3.us-gov-west-1.amazonaws.com id=44047138 responseStatus=200 OK token=glcbt-64

section_end:1743815868:download_artifacts
section_start:1743815868:step_script
Executing "step_script" stage of the job script
$ "${PIPELINE_REPO_DIR}/pipeline1/3-scan/twistlock_scan.sh"
scanning amd64 ([MASKED]/opensource/haproxy/haproxy24@sha256:e6ce7647180b3620b40c9cd7e5a04b2ab5296ef40258ef41361e007b3ee82552)
Trying to pull [MASKED]/opensource/haproxy/haproxy24@sha256:e6ce7647180b3620b40c9cd7e5a04b2ab5296ef40258ef41361e007b3ee82552...
Getting image source signatures
Copying blob sha256:a51a27b42a0208175bc9211450943a26ab83401c13bfc60419acce0122e165c9
Copying blob sha256:d4cb20dd5cad1ea19f0e857b56614f8b02eb977288e4f1a49f5bbbef8ff64b43
Copying blob sha256:44d117d635acf411b6b4106c39d1cdcadbe7b7b49d48995c3585269733701f6a
Copying blob sha256:dbe3750b0a0499b64b74074ddea996c3531f69f6aba9b0ae1d8fec8f70500098
Copying config sha256:0cd3edbfcb6287befe1a37e929721db5f490137f8bf7306b042f1f831cbe2f27
Writing manifest to image destination
0cd3edbfcb6287befe1a37e929721db5f490137f8bf7306b042f1f831cbe2f27

Scan results for: image [MASKED]/opensource/haproxy/haproxy24@sha256:e6ce7647180b3620b40c9cd7e5a04b2ab5296ef40258ef41361e007b3ee82552 0cd3edbfcb6287befe1a37e929721db5f490137f8bf7306b042f1f831cbe2f27
Vulnerabilities
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
|      CVE       | SEVERITY | CVSS |     PACKAGE     |       VERSION       |    STATUS    |  PUBLISHED  | DISCOVERED |                    DESCRIPTION                     | CUSTOM LABELS |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-37967 | high     | 7.20 | krb5            | 1.21.1-4.el9_5      | affected     | > 2 years   | < 1 hour   | Windows Kerberos Elevation of Privilege            |               |
|                |          |      |                 |                     |              |             |            | Vulnerability                                      |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-4899  | medium   | 7.50 | zstd            | 1.5.1-2.el9         | will not fix | > 2 years   | < 1 hour   | A vulnerability was found in zstd v1.4.10, where   |               |
|                |          |      |                 |                     |              |             |            | an attacker can supply empty string as an argument |               |
|                |          |      |                 |                     |              |             |            | to the command line tool to cause buffer overrun.  |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-25950 | medium   | 7.30 | haproxy         | 2.4.22-3.el9_5.1    | will not fix | > 1 years   | < 1 hour   | HTTP request/response smuggling vulnerability in   |               |
|                |          |      |                 |                     |              |             |            | HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows   |               |
|                |          |      |                 |                     |              |             |            | a remote attacker to alter a legitimate user\'s    |               |
|                |          |      |                 |                     |              |             |            | requ...                                            |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-52533 | medium   | 7.00 | glib2           | 2.68.4-14.el9_4.1   | will not fix | > 4 months  | < 1 hour   | gio/gsocks4aproxy.c in GNOME GLib before 2.82.1    |               |
|                |          |      |                 |                     |              |             |            | has an off-by-one error and resultant buffer       |               |
|                |          |      |                 |                     |              |             |            | overflow because SOCKS4_CONN_MSG_LEN is not        |               |
|                |          |      |                 |                     |              |             |            | sufficient fo...                                   |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-0938  | medium   | 6.80 | python3.9       | 3.9.21-1.el9_5      | affected     | 63 days     | < 1 hour   | The Python standard library functions              |               |
|                |          |      |                 |                     |              |             |            | `urllib.parse.urlsplit` and `urlparse` accepted    |               |
|                |          |      |                 |                     |              |             |            | domain names that included square brackets which   |               |
|                |          |      |                 |                     |              |             |            | isn\'t valid ac...                                 |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-24528 | medium   | 6.50 | krb5            | 1.21.1-4.el9_5      | affected     | > 1 years   | < 1 hour   | A flaw was found in krb5. With incremental         |               |
|                |          |      |                 |                     |              |             |            | propagation enabled, an authenticated attacker     |               |
|                |          |      |                 |                     |              |             |            | can cause kadmind to write beyond the end of the   |               |
|                |          |      |                 |                     |              |             |            | mapped regi...                                     |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-1931  | medium   | 5.90 | unbound         | 1.16.2-8.el9_5.1    | affected     | > 1 years   | < 1 hour   | NLnet Labs Unbound version 1.18.0 up to and        |               |
|                |          |      |                 |                     |              |             |            | including version 1.19.1 contain a vulnerability   |               |
|                |          |      |                 |                     |              |             |            | that can cause denial of service by a certain code |               |
|                |          |      |                 |                     |              |             |            | path t...                                          |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2021-23336 | medium   | 5.90 | python3.9       | 3.9.21-1.el9_5      | affected     | > 4 years   | < 1 hour   | The package python/cpython from 0 and before       |               |
|                |          |      |                 |                     |              |             |            | 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0   |               |
|                |          |      |                 |                     |              |             |            | and before 3.8.8, from 3.9.0 and before 3.9.2 are  |               |
|                |          |      |                 |                     |              |             |            | vulner...                                          |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-35195 | medium   | 5.60 | python-requests | 2.25.1-8.el9        | affected     | > 10 months | < 1 hour   | Requests is a HTTP library. Prior to 2.32.0, when  |               |
|                |          |      |                 |                     |              |             |            | making requests through a Requests `Session`, if   |               |
|                |          |      |                 |                     |              |             |            | the first request is made with `verify=False` to   |               |
|                |          |      |                 |                     |              |             |            | di...                                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-0395  | medium   | 5.50 | glibc           | 2.34-125.el9_5.3    | affected     | 72 days     | < 1 hour   | When the assert() function in the GNU C Library    |               |
|                |          |      |                 |                     |              |             |            | versions 2.13 to 2.40 fails, it does not allocate  |               |
|                |          |      |                 |                     |              |             |            | enough space for the assertion failure message     |               |
|                |          |      |                 |                     |              |             |            | strin...                                           |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2021-3997  | medium   | 5.50 | systemd         | 252-46.el9_5.3      | affected     | > 2 years   | < 1 hour   | A flaw was found in systemd. An uncontrolled       |               |
|                |          |      |                 |                     |              |             |            | recursion in systemd-tmpfiles may lead to a denial |               |
|                |          |      |                 |                     |              |             |            | of service at boot time when too many nested       |               |
|                |          |      |                 |                     |              |             |            | directori...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-12243 | medium   | 5.30 | gnutls          | 3.8.3-4.el9_4       | affected     | 53 days     | < 1 hour   | A flaw was found in GnuTLS, which relies on        |               |
|                |          |      |                 |                     |              |             |            | libtasn1 for ASN.1 data processing. Due to an      |               |
|                |          |      |                 |                     |              |             |            | inefficient algorithm in libtasn1, decoding        |               |
|                |          |      |                 |                     |              |             |            | certain DER-enco...                                |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-12133 | medium   | 5.30 | libtasn1        | 4.16.0-8.el9_1      | affected     | 53 days     | < 1 hour   | A flaw in libtasn1 causes inefficient handling of  |               |
|                |          |      |                 |                     |              |             |            | specific certificate data. When processing a large |               |
|                |          |      |                 |                     |              |             |            | number of elements in a certificate, libtasn1      |               |
|                |          |      |                 |                     |              |             |            | tak...                                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-30571 | medium   | 5.30 | libarchive      | 3.5.3-4.el9         | will not fix | > 1 years   | < 1 hour   | Libarchive through 3.6.2 can cause directories     |               |
|                |          |      |                 |                     |              |             |            | to have world-writable permissions. The umask()    |               |
|                |          |      |                 |                     |              |             |            | call inside archive_write_disk_posix.c changes the |               |
|                |          |      |                 |                     |              |             |            | umas...                                            |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2021-45941 | medium   | 4.50 | libbpf          | 1.4.0-1.el9         | will not fix | > 3 years   | < 1 hour   | libbpf 0.6.0 and 0.6.1 has a heap-based buffer     |               |
|                |          |      |                 |                     |              |             |            | overflow (8 bytes) in __bpf_object__open           |               |
|                |          |      |                 |                     |              |             |            | (called from bpf_object__open_mem and              |               |
|                |          |      |                 |                     |              |             |            | bpf-object-fuzzer.c).                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2021-45940 | medium   | 4.50 | libbpf          | 1.4.0-1.el9         | will not fix | > 3 years   | < 1 hour   | libbpf 0.6.0 and 0.6.1 has a heap-based buffer     |               |
|                |          |      |                 |                     |              |             |            | overflow (4 bytes) in __bpf_object__open           |               |
|                |          |      |                 |                     |              |             |            | (called from bpf_object__open_mem and              |               |
|                |          |      |                 |                     |              |             |            | bpf-object-fuzzer.c).                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-29040 | medium   | 4.40 | tpm2-tss        | 3.2.3-1.el9         | affected     | > 9 months  | < 1 hour   | This repository hosts source code implementing     |               |
|                |          |      |                 |                     |              |             |            | the Trusted Computing Group\'s (TCG) TPM2 Software |               |
|                |          |      |                 |                     |              |             |            | Stack (TSS). The JSON Quote Info returned by       |               |
|                |          |      |                 |                     |              |             |            | Fapi_Qu...                                         |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-25724 | medium   | 4.00 | libarchive      | 3.5.3-4.el9         | affected     | 33 days     | < 1 hour   | list_item_verbose in tar/util.c in libarchive      |               |
|                |          |      |                 |                     |              |             |            | through 3.7.7 does not check an strftime return    |               |
|                |          |      |                 |                     |              |             |            | value, which can lead to a denial of service or    |               |
|                |          |      |                 |                     |              |             |            | unspecif...                                        |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-2953  | low      | 7.10 | openldap        | 2.6.6-3.el9         | affected     | > 1 years   | < 1 hour   | A vulnerability was found in openldap. This        |               |
|                |          |      |                 |                     |              |             |            | security flaw causes a null pointer dereference in |               |
|                |          |      |                 |                     |              |             |            | ber_memalloc_x() function.                         |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-50495 | low      | 6.50 | ncurses         | 6.2-10.20210508.el9 | affected     | > 1 years   | < 1 hour   | NCurse v6.4-20230418 was discovered to             |               |
|                |          |      |                 |                     |              |             |            | contain a segmentation fault via the component     |               |
|                |          |      |                 |                     |              |             |            | _nc_wrap_entry().                                  |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-32636 | low      | 6.20 | glib2           | 2.68.4-14.el9_4.1   | affected     | > 1 years   | < 1 hour   | A flaw was found in glib, where the gvariant       |               |
|                |          |      |                 |                     |              |             |            | deserialization code is vulnerable to a denial of  |               |
|                |          |      |                 |                     |              |             |            | service introduced by additional input validation  |               |
|                |          |      |                 |                     |              |             |            | added...                                           |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-3219  | low      | 6.20 | gnupg2          | 2.3.3-4.el9         | affected     | > 2 years   | < 1 hour   | GnuPG can be made to spin on a relatively small    |               |
|                |          |      |                 |                     |              |             |            | input by (for example) crafting a public key with  |               |
|                |          |      |                 |                     |              |             |            | thousands of signatures attached, compressed down  |               |
|                |          |      |                 |                     |              |             |            | to...                                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-4156  | low      | 6.10 | gawk            | 5.1.0-6.el9         | affected     | > 1 years   | < 1 hour   | A heap out-of-bounds read flaw was found in        |               |
|                |          |      |                 |                     |              |             |            | builtin.c in the gawk package. This issue may lead |               |
|                |          |      |                 |                     |              |             |            | to a crash and could be used to read sensitive     |               |
|                |          |      |                 |                     |              |             |            | informat...                                        |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-29458 | low      | 6.10 | ncurses         | 6.2-10.20210508.el9 | affected     | > 2 years   | < 1 hour   | ncurses 6.3 before patch 20220416 has an           |               |
|                |          |      |                 |                     |              |             |            | out-of-bounds read and segmentation violation      |               |
|                |          |      |                 |                     |              |             |            | in convert_strings in tinfo/read_entry.c in the    |               |
|                |          |      |                 |                     |              |             |            | terminfo librar...                                 |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-41996 | low      | 5.90 | openssl         | 3.2.2-6.el9_5.1     | will not fix | > 7 months  | < 1 hour   | Validating the order of the public keys in the     |               |
|                |          |      |                 |                     |              |             |            | Diffie-Hellman Key Agreement Protocol, when        |               |
|                |          |      |                 |                     |              |             |            | an approved safe prime is used, allows remote      |               |
|                |          |      |                 |                     |              |             |            | attackers (fr...                                   |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-11053 | low      | 5.90 | curl            | 7.76.1-31.el9       | affected     | > 3 months  | < 1 hour   | When asked to both use a `.netrc` file for         |               |
|                |          |      |                 |                     |              |             |            | credentials and to follow HTTP redirects, curl     |               |
|                |          |      |                 |                     |              |             |            | could leak the password used for the first host to |               |
|                |          |      |                 |                     |              |             |            | the follo...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2020-12413 | low      | 5.90 | nss             | 3.101.0-10.el9_2    | will not fix | > 2 years   | < 1 hour   | The Raccoon attack is a timing attack on DHE       |               |
|                |          |      |                 |                     |              |             |            | ciphersuites inherit in the TLS specification.     |               |
|                |          |      |                 |                     |              |             |            | To mitigate this vulnerability, Firefox disabled   |               |
|                |          |      |                 |                     |              |             |            | support f...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-34459 | low      | 5.50 | libxml2         | 2.9.13-6.el9_5.2    | affected     | > 10 months | < 1 hour   | An issue was discovered in xmllint (from libxml2)  |               |
|                |          |      |                 |                     |              |             |            | before 2.11.8 and 2.12.x before 2.12.7. Formatting |               |
|                |          |      |                 |                     |              |             |            | error messages with xmllint --htmlout can result   |               |
|                |          |      |                 |                     |              |             |            | ...                                                |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-47011 | low      | 5.50 | gdb             | 14.2-3.el9          | affected     | > 1 years   | < 1 hour   | An issue was discovered function                   |               |
|                |          |      |                 |                     |              |             |            | parse_stab_struct_fields in stabs.c in Binutils    |               |
|                |          |      |                 |                     |              |             |            | 2.34 thru 2.38, allows attackers to cause a denial |               |
|                |          |      |                 |                     |              |             |            | of service due to ...                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-47010 | low      | 5.50 | gdb             | 14.2-3.el9          | affected     | > 1 years   | < 1 hour   | An issue was discovered function pr_function_type  |               |
|                |          |      |                 |                     |              |             |            | in prdbg.c in Binutils 2.34 thru 2.38, allows      |               |
|                |          |      |                 |                     |              |             |            | attackers to cause a denial of service due to      |               |
|                |          |      |                 |                     |              |             |            | memory l...                                        |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-47007 | low      | 5.50 | gdb             | 14.2-3.el9          | affected     | > 1 years   | < 1 hour   | An issue was discovered function                   |               |
|                |          |      |                 |                     |              |             |            | stab_demangle_v3_arg in stabs.c in Binutils 2.34   |               |
|                |          |      |                 |                     |              |             |            | thru 2.38, allows attackers to cause a denial of   |               |
|                |          |      |                 |                     |              |             |            | service due to memo...                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-27943 | low      | 5.50 | gcc             | 11.5.0-5.el9_5      | affected     | > 3 years   | < 1 hour   | libiberty/rust-demangle.c in GNU GCC 11.2          |               |
|                |          |      |                 |                     |              |             |            | allows stack consumption in demangle_const, as     |               |
|                |          |      |                 |                     |              |             |            | demonstrated by nm-new.                            |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-7264  | low      | 5.30 | curl            | 7.76.1-31.el9       | affected     | > 8 months  | < 1 hour   | libcurl\'s ASN1 parser code has the `GTime2str()`  |               |
|                |          |      |                 |                     |              |             |            | function, used for parsing an ASN.1 Generalized    |               |
|                |          |      |                 |                     |              |             |            | Time field. If given an syntactically incorrect    |               |
|                |          |      |                 |                     |              |             |            | fiel...                                            |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-41409 | low      | 5.30 | pcre2           | 10.40-6.el9         | affected     | > 1 years   | < 1 hour   | Integer overflow vulnerability in pcre2test        |               |
|                |          |      |                 |                     |              |             |            | before 10.41 allows attackers to cause a denial of |               |
|                |          |      |                 |                     |              |             |            | service or other unspecified impacts via negative  |               |
|                |          |      |                 |                     |              |             |            | input...                                           |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-57360 | low      | 5.00 | gdb             | 14.2-3.el9          | affected     | 73 days     | < 1 hour   | https://www.gnu.org/software/binutils/ nm >=2.43   |               |
|                |          |      |                 |                     |              |             |            | is affected by: Incorrect Access Control. The type |               |
|                |          |      |                 |                     |              |             |            | of exploitation is: local. The component is: `nm   |               |
|                |          |      |                 |                     |              |             |            | -...                                               |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-0397  | low      | 5.00 | python3.9       | 3.9.21-1.el9_5      | affected     | > 9 months  | < 1 hour   | A defect was discovered in the Python “ssl” module |               |
|                |          |      |                 |                     |              |             |            | where there is a memory race condition with the    |               |
|                |          |      |                 |                     |              |             |            | ssl.SSLContext methods “cert_store_stats()”...     |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-7592  | low      | 4.80 | python3.9       | 3.9.21-1.el9_5      | affected     | > 7 months  | < 1 hour   | There is a LOW severity vulnerability affecting    |               |
|                |          |      |                 |                     |              |             |            | CPython, specifically the \'http.cookies\'         |               |
|                |          |      |                 |                     |              |             |            | standard library module.   When parsing cookies    |               |
|                |          |      |                 |                     |              |             |            | that contai...                                     |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-43168 | low      | 4.80 | unbound         | 1.16.2-8.el9_5.1    | affected     | > 7 months  | < 1 hour   | DISPUTE NOTE: this issue does not pose a security  |               |
|                |          |      |                 |                     |              |             |            | risk as it (according to analysis by the original  |               |
|                |          |      |                 |                     |              |             |            | software developer, NLnet Labs) falls within the   |               |
|                |          |      |                 |                     |              |             |            | e...                                               |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-13176 | low      | 4.70 | openssl         | 3.2.2-6.el9_5.1     | affected     | 74 days     | < 1 hour   | Issue summary: A timing side-channel which could   |               |
|                |          |      |                 |                     |              |             |            | potentially allow recovering the private key       |               |
|                |          |      |                 |                     |              |             |            | exists in the ECDSA signature computation.  Impact |               |
|                |          |      |                 |                     |              |             |            | summa...                                           |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-0232  | low      | 4.70 | sqlite          | 3.34.1-7.el9_3      | affected     | > 1 years   | < 1 hour   | A heap use-after-free issue has been identified    |               |
|                |          |      |                 |                     |              |             |            | in SQLite in the jsonParseAddNodeArray() function  |               |
|                |          |      |                 |                     |              |             |            | in sqlite3.c. This flaw allows a local attacker to |               |
|                |          |      |                 |                     |              |             |            | l...                                               |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2021-3572  | low      | 4.50 | python-pip      | 21.3.1-1.el9        | affected     | > 3 years   | < 1 hour   | A flaw was found in python-pip in the way it       |               |
|                |          |      |                 |                     |              |             |            | handled Unicode separators in git references. A    |               |
|                |          |      |                 |                     |              |             |            | remote attacker could possibly use this issue to   |               |
|                |          |      |                 |                     |              |             |            | install ...                                        |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-3606  | low      | 4.40 | libbpf          | 1.4.0-1.el9         | will not fix | > 2 years   | < 1 hour   | A vulnerability was found in Linux Kernel. It      |               |
|                |          |      |                 |                     |              |             |            | has been classified as problematic. This affects   |               |
|                |          |      |                 |                     |              |             |            | the function find_prog_by_sec_insn of the file     |               |
|                |          |      |                 |                     |              |             |            | tools/li...                                        |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-0725  | low      | 4.00 | curl            | 7.76.1-31.el9       | affected     | 58 days     | < 1 hour   | When libcurl is asked to perform automatic gzip    |               |
|                |          |      |                 |                     |              |             |            | decompression of content-encoded HTTP responses    |               |
|                |          |      |                 |                     |              |             |            | with the `CURLOPT_ACCEPT_ENCODING` option, **using |               |
|                |          |      |                 |                     |              |             |            | zli...                                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-25260 | low      | 4.00 | elfutils        | 0.191-4.el9         | affected     | > 1 years   | < 1 hour   | elfutils v0.189 was discovered to contain a        |               |
|                |          |      |                 |                     |              |             |            | NULL pointer dereference via the handle_verdef()   |               |
|                |          |      |                 |                     |              |             |            | function at readelf.c.                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-9681  | low      | 3.90 | curl            | 7.76.1-31.el9       | affected     | > 4 months  | < 1 hour   | When curl is asked to use HSTS, the expiry time    |               |
|                |          |      |                 |                     |              |             |            | for a subdomain might overwrite a parent domain\'s |               |
|                |          |      |                 |                     |              |             |            | cache entry, making it end sooner or later than    |               |
|                |          |      |                 |                     |              |             |            | oth...                                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-33655 | low      | 3.70 | unbound         | 1.16.2-8.el9_5.1    | affected     | > 10 months | < 1 hour   | The DNS protocol in RFC 1035 and updates allows    |               |
|                |          |      |                 |                     |              |             |            | remote attackers to cause a denial of service      |               |
|                |          |      |                 |                     |              |             |            | (resource consumption) by arranging for DNS        |               |
|                |          |      |                 |                     |              |             |            | queries to b...                                    |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-3198  | low      | 3.30 | gdb             | 14.2-3.el9          | affected     | 23 hours    | < 1 hour   | A vulnerability has been found in GNU Binutils     |               |
|                |          |      |                 |                     |              |             |            | 2.43/2.44 and classified as problematic. Affected  |               |
|                |          |      |                 |                     |              |             |            | by this vulnerability is the function display_info |               |
|                |          |      |                 |                     |              |             |            | of...                                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1632  | low      | 3.30 | libarchive      | 3.5.3-4.el9         | affected     | 39 days     | < 1 hour   | A vulnerability was found in libarchive up to      |               |
|                |          |      |                 |                     |              |             |            | 3.7.7. It has been classified as problematic. This |               |
|                |          |      |                 |                     |              |             |            | affects the function list of the file bsdunzip.c.  |               |
|                |          |      |                 |                     |              |             |            | The...                                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1377  | low      | 3.30 | elfutils        | 0.191-4.el9         | affected     | 46 days     | < 1 hour   | A vulnerability, which was classified as           |               |
|                |          |      |                 |                     |              |             |            | problematic, has been found in GNU elfutils 0.192. |               |
|                |          |      |                 |                     |              |             |            | This issue affects the function gelf_getsymshndx   |               |
|                |          |      |                 |                     |              |             |            | of the fi...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1371  | low      | 3.30 | elfutils        | 0.191-4.el9         | affected     | 46 days     | < 1 hour   | A vulnerability has been found in GNU              |               |
|                |          |      |                 |                     |              |             |            | elfutils 0.192 and classified as problematic.      |               |
|                |          |      |                 |                     |              |             |            | This vulnerability affects the function            |               |
|                |          |      |                 |                     |              |             |            | handle_dynamic_symtab of t...                      |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2023-39804 | low      | 3.30 | tar             | 1.34-7.el9          | affected     | > 1 years   | < 1 hour   | In GNU tar before 1.35, mishandled extension       |               |
|                |          |      |                 |                     |              |             |            | attributes in a PAX archive can lead to an         |               |
|                |          |      |                 |                     |              |             |            | application crash in xheader.c.                    |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1795  | low      | 3.10 | python3.9       | 3.9.21-1.el9_5      | affected     | 35 days     | < 1 hour   | During an address list folding when a separating   |               |
|                |          |      |                 |                     |              |             |            | comma ends up on a folded line and that line is    |               |
|                |          |      |                 |                     |              |             |            | to be unicode-encoded then the separator itself is |               |
|                |          |      |                 |                     |              |             |            | al...                                              |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1153  | low      | 3.10 | gdb             | 14.2-3.el9          | affected     | 53 days     | < 1 hour   | A vulnerability classified as problematic was      |               |
|                |          |      |                 |                     |              |             |            | found in GNU Binutils 2.43/2.44. Affected by this  |               |
|                |          |      |                 |                     |              |             |            | vulnerability is the function bfd_set_format of    |               |
|                |          |      |                 |                     |              |             |            | the fi...                                          |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1152  | low      | 3.10 | gdb             | 14.2-3.el9          | affected     | 53 days     | < 1 hour   | A vulnerability classified as problematic has      |               |
|                |          |      |                 |                     |              |             |            | been found in GNU Binutils 2.43. Affected is the   |               |
|                |          |      |                 |                     |              |             |            | function xstrdup of the file xstrdup.c of the      |               |
|                |          |      |                 |                     |              |             |            | component...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1151  | low      | 3.10 | gdb             | 14.2-3.el9          | affected     | 53 days     | < 1 hour   | A vulnerability was found in GNU Binutils 2.43. It |               |
|                |          |      |                 |                     |              |             |            | has been rated as problematic. This issue affects  |               |
|                |          |      |                 |                     |              |             |            | the function xmemdup of the file xmemdup.c of      |               |
|                |          |      |                 |                     |              |             |            | the...                                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1150  | low      | 3.10 | gdb             | 14.2-3.el9          | affected     | 53 days     | < 1 hour   | A vulnerability was found in GNU Binutils          |               |
|                |          |      |                 |                     |              |             |            | 2.43. It has been declared as problematic. This    |               |
|                |          |      |                 |                     |              |             |            | vulnerability affects the function bfd_malloc of   |               |
|                |          |      |                 |                     |              |             |            | the file li...                                     |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-7531  | low      | 3.10 | nss             | 3.101.0-10.el9_2    | affected     | > 8 months  | < 1 hour   | Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 |               |
|                |          |      |                 |                     |              |             |            | and the same buffer for input and output can       |               |
|                |          |      |                 |                     |              |             |            | result in plaintext on an Intel Sandy Bridge       |               |
|                |          |      |                 |                     |              |             |            | processor...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2022-33070 | low      | 3.10 | protobuf-c      | 1.3.3-13.el9        | affected     | > 2 years   | < 1 hour   | Protobuf-c v1.4.0 was discovered to contain        |               |
|                |          |      |                 |                     |              |             |            | an invalid arithmetic shift via the function       |               |
|                |          |      |                 |                     |              |             |            | parse_tag_and_wiretype in protobuf-c/protobuf-c.c. |               |
|                |          |      |                 |                     |              |             |            | This vulne...                                      |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-27113 | low      | 2.90 | libxml2         | 2.9.13-6.el9_5.2    | affected     | 45 days     | < 1 hour   | libxml2 before 2.12.10 and 2.13.x before 2.13.6    |               |
|                |          |      |                 |                     |              |             |            | has a NULL pointer dereference in xmlPatMatch in   |               |
|                |          |      |                 |                     |              |             |            | pattern.c.                                         |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2024-43167 | low      | 2.80 | unbound         | 1.16.2-8.el9_5.1    | affected     | > 7 months  | < 1 hour   | DISPUTE NOTE: this issue does not pose a security  |               |
|                |          |      |                 |                     |              |             |            | risk as it (according to analysis by the original  |               |
|                |          |      |                 |                     |              |             |            | software developer, NLnet Labs) falls within the   |               |
|                |          |      |                 |                     |              |             |            | e...                                               |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-30258 | low      | 2.70 | gnupg2          | 2.3.3-4.el9         | affected     | 16 days     | < 1 hour   | In GnuPG before 2.5.5, if a user chooses to import |               |
|                |          |      |                 |                     |              |             |            | a certificate with certain crafted subkey data     |               |
|                |          |      |                 |                     |              |             |            | that lacks a valid backsig or that has incorrect   |               |
|                |          |      |                 |                     |              |             |            | usa...                                             |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+
| CVE-2025-1376  | low      | 2.50 | elfutils        | 0.191-4.el9         | affected     | 46 days     | < 1 hour   | A vulnerability classified as problematic was      |               |
|                |          |      |                 |                     |              |             |            | found in GNU elfutils 0.192. This vulnerability    |               |
|                |          |      |                 |                     |              |             |            | affects the function elf_strptr in the library     |               |
|                |          |      |                 |                     |              |             |            | /libelf/e...                                       |               |
+----------------+----------+------+-----------------+---------------------+--------------+-------------+------------+----------------------------------------------------+---------------+

Vulnerabilities found for image [MASKED]/opensource/haproxy/haproxy24@sha256:e6ce7647180b3620b40c9cd7e5a04b2ab5296ef40258ef41361e007b3ee82552: total - 62, critical - 0, high - 1, medium - 17, low - 44
Custom Labels [release:1738643550 version:9.5 architecture:x86_64 mil.dso.ironbank.image.keywords:network,load balancer,proxy mil.dso.ironbank.image.parent:[MASKED]/redhat/ubi/ubi9:9.5@sha256:da82aaf3695997c3a7083268269bfede289bc829290e353834a9aa7d11dbbebe org.opencontainers.image.revision:2f53910d517cdb0b947ee082a9421cd09f5092ac org.opencontainers.image.version:2.4.22 vendor:Red Hat, Inc. description:The Universal Base Image is designed and engineered to be the base layer for all of your containerized applications, middleware and utilities. This base image is freely redistributable, but Red Hat only supports Red Hat technologies through subscriptions for Red Hat products. This image is maintained by Red Hat and updated regularly. io.openshift.tags:base rhel9 mil.dso.ironbank.os-type:ubi9-container org.opencontainers.image.description:HAProxy is a free, open source high availability solution, providing load balancing org.opencontainers.image.vendor:HAProxy Technologies, LLC com.redhat.license_terms:https://www.redhat.com/en/about/red-hat-end-user-license-agreements#UBI io.openshift.expose-services: maintainer:ironbank@dsop.io build-date:2025-02-04T04:32:30Z io.k8s.description:The Universal Base Image is designed and engineered to be the base layer for all of your containerized applications, middleware and utilities. This base image is freely redistributable, but Red Hat only supports Red Hat technologies through subscriptions for Red Hat products. This image is maintained by Red Hat and updated regularly. org.opencontainers.image.title:haproxy24 url:https://www.redhat.com com.redhat.component:ubi9-container mil.dso.ironbank.ci.id:4081203 org.opencontainers.image.licenses:GPL-2.0-only vcs-ref:f4371344f505f230dd8b447590dba1946ab022b7 org.opencontainers.image.source:https://repo1.dso.mil/dsop/opensource/haproxy/haproxy24 org.opencontainers.image.url:www.haproxy.org summary:Provides the latest release of Red Hat Universal Base Image 9. vcs-type:git io.buildah.version:1.38.1 mil.dso.ironbank.product.name:haproxy mil.dso.ironbank.project.id:11791 name:ubi9 org.opencontainers.image.created:2025-04-05 01:16:58+00:00 distribution-scope:public io.k8s.display-name:Red Hat Universal Base Image 9 mil.dso.ironbank.image.type:opensource]
Vulnerability threshold check results: PASS

Compliance found for image [MASKED]/opensource/haproxy/haproxy24@sha256:e6ce7647180b3620b40c9cd7e5a04b2ab5296ef40258ef41361e007b3ee82552: total - 0, critical - 0, high - 0, medium - 0, low - 0
Compliance threshold check results: PASS
Link to the results in Console: [MASKED]/#!/monitor/vulnerabilities/images/ci?search=0cd3edbfcb6287befe1a37e929721db5f490137f8bf7306b042f1f831cbe2f27
Wrote scan results to ci-artifacts/scan-results/twistlock/amd64/twistlock_cve.json
ci-artifacts/scan-results/twistlock/amd64/twistlock_cve.json

section_end:1743815876:step_script
section_start:1743815876:upload_artifacts_on_success
Uploading artifacts for successful job
Uploading artifacts...
ci-artifacts/scan-results/twistlock/amd64/: found 3 matching artifact files and directories 

Uploading artifacts 0 B (0 B/s)                
Uploading artifacts 171.60 KB (300.7 KB/s)                
Uploading artifacts as "archive" to coordinator... 201 Created  id=44047146 responseStatus=201 Created token=glcbt-64

section_end:1743815877:upload_artifacts_on_success
section_start:1743815877:cleanup_file_variables
Cleaning up project directory and file based variables

section_end:1743815878:cleanup_file_variables
Job succeeded