UNCLASSIFIED

removed the copy of the envoy_policy.yaml.tmpl since that file no longer exists in the base image

14 jobs for initial in 13 minutes and 34 seconds (queued for 20 seconds)
Status Job ID Name Coverage
  .Pre
passed #1593080
ironbank
load scripts

00:00:06

 
  Preflight
passed #1593081
ironbank
folder structure

00:00:05

passed #1593083
ironbank
hardening_manifest

00:00:08

passed #1593082
ironbank
hardening_manifest migration

00:00:05

 
  Lint
passed #1593084
ironbank
wl compare lint

00:00:17

 
  Import Artifacts
passed #1593085
ironbank
import artifacts

00:00:53

 
  Scan Artifacts
passed #1593086
ironbank
clamav scan

00:02:33

 
  Build
passed #1593087
ironbank-isolated
build

00:02:35

 
  Scanning
passed #1593091
ironbank
anchore scan

00:05:30

passed #1593088
ironbank
openscap compliance

00:01:04

passed #1593089
ironbank
openscap cve

00:03:58

passed #1593090
ironbank
twistlock scan

00:00:45

 
  Csv Output
passed #1593092
ironbank
csv output

00:01:12

 
  Check Cves
failed #1593093
ironbank allowed to fail
check cves

00:00:13

 
Name Stage Failure
failed
check cves Check Cves
INFO: Whitelisted vulnerabilities: {'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-82168-6', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecomp_953dfbea1b1e9d5829fbed2e390bd3af', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80935-0', 'oscapcomp_CCE-82395-5', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'oscapcomp_CCE-82985-3', 'oscapcomp_CCE-80938-4', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8'}
INFO: Vulnerabilities found in scanning stage: 71
INFO: {'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82473-0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82472-2', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'oscapcomp_CCE-82220-5', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'oscapcomp_CCE-82985-3', 'oscapcomp_CCE-80938-4', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'oscapcomp_CCE-82979-6', 'oscapcomp_CCE-82395-5', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82949-9'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Twistlock CVE - CVE-2021-23239-sudo-1.8.29-6.el8
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1