Running with gitlab-runner 13.8.0 (775dd39d)  on global-shared-gitlab-runner-89dbd4db8-gbfgw 79hzYLUT section_start:1614616167:resolve_secrets Resolving secrets section_end:1614616167:resolve_secrets section_start:1614616167:prepare_executor Preparing the "kubernetes" executor Using Kubernetes namespace: gitlab-runner WARNING: Pulling GitLab Runner helper image from Docker Hub. Helper image is migrating to registry.gitlab.com, for more information see https://docs.gitlab.com/runner/configuration/advanced-configuration.html#migrating-helper-image-to-registrygitlabcom Using Kubernetes executor with image ${GITLAB_INTERNAL_REGISTRY}/ironbank-tools/ironbank-pipeline/ib-pipeline-image:0.1 ... section_end:1614616167:prepare_executor section_start:1614616167:prepare_script Preparing environment Waiting for pod gitlab-runner/runner-79hzylut-project-3540-concurrent-0gj2wz to be running, status is Pending Running on runner-79hzylut-project-3540-concurrent-0gj2wz via global-shared-gitlab-runner-89dbd4db8-gbfgw... section_end:1614616170:prepare_script section_start:1614616170:get_sources Getting source from Git repository Fetching changes with git depth set to 50... Initialized empty Git repository in /builds/dsop/opensource/jupyter/jupyterlab/.git/ Created fresh repository. Checking out 1af2855a as development... Skipping Git submodules setup section_end:1614616171:get_sources section_start:1614616171:download_artifacts Downloading artifacts Downloading artifacts for load scripts (2240279)... Downloading artifacts from coordinator... ok  id=2240279 responseStatus=200 OK token=P1rQrv8M Downloading artifacts for hardening_manifest (2240282)... Downloading artifacts from coordinator... ok  id=2240282 responseStatus=200 OK token=VEG-txx5 Downloading artifacts for wl compare lint (2240283)... Downloading artifacts from coordinator... ok  id=2240283 responseStatus=200 OK token=zspwLV5B Downloading artifacts for openscap compliance (2240287)... Downloading artifacts from coordinator... ok  id=2240287 responseStatus=200 OK token=_G9zZ57Q Downloading artifacts for openscap cve (2240288)... Downloading artifacts from coordinator... ok  id=2240288 responseStatus=200 OK token=hyZExuH- Downloading artifacts for twistlock scan (2240289)... Downloading artifacts from coordinator... ok  id=2240289 responseStatus=200 OK token=k38nAgQs Downloading artifacts for anchore scan (2240290)... Downloading artifacts from coordinator... ok  id=2240290 responseStatus=200 OK token=d7x7gk-- section_end:1614616172:download_artifacts section_start:1614616172:step_script Executing "step_script" stage of the job script $ PROJ_PATH=$(echo "${CI_PROJECT_PATH}" | sed -e 's/.*dsop\/\(.*\)/\1/') $ export PROJ_PATH $ pip3 install jsonschema Collecting jsonschema Downloading jsonschema-3.2.0-py2.py3-none-any.whl (56 kB) Collecting pyrsistent>=0.14.0 Downloading pyrsistent-0.17.3.tar.gz (106 kB) Collecting importlib-metadata; python_version < "3.8" Downloading importlib_metadata-3.7.0-py3-none-any.whl (11 kB) Collecting attrs>=17.4.0 Downloading attrs-20.3.0-py2.py3-none-any.whl (49 kB) Requirement already satisfied: six>=1.11.0 in /opt/app-root/lib/python3.6/site-packages (from jsonschema) (1.15.0) Requirement already satisfied: setuptools in /opt/app-root/lib/python3.6/site-packages (from jsonschema) (39.2.0) Collecting zipp>=0.5 Downloading zipp-3.4.0-py3-none-any.whl (5.2 kB) Collecting typing-extensions>=3.6.4; python_version < "3.8" Downloading typing_extensions-3.7.4.3-py3-none-any.whl (22 kB) Building wheels for collected packages: pyrsistent Building wheel for pyrsistent (setup.py): started Building wheel for pyrsistent (setup.py): finished with status 'done' Created wheel for pyrsistent: filename=pyrsistent-0.17.3-cp36-cp36m-linux_x86_64.whl size=55876 sha256=374f66b450fee1c9e618e307a7677fe2fb28c0e0830afd1c03398cc524dbb51c Stored in directory: /tmp/pip-ephem-wheel-cache-zp06en3a/wheels/34/13/19/294da8e11bce7e563afee51251b9fa878185e14f4b5caf00cb Successfully built pyrsistent Installing collected packages: pyrsistent, zipp, typing-extensions, importlib-metadata, attrs, jsonschema Successfully installed attrs-20.3.0 importlib-metadata-3.7.0 jsonschema-3.2.0 pyrsistent-0.17.3 typing-extensions-3.7.4.3 zipp-3.4.0 WARNING: You are using pip version 20.2.4; however, version 21.0.1 is available. You should consider upgrading via the '/opt/app-root/bin/python3.6 -m pip install --upgrade pip' command. $ python3 "${PIPELINE_REPO_DIR}/stages/check-cves/pipeline_wl_compare.py" INFO: Log level set to info INFO: Number of whitelisted vulnerabilities: 117 INFO: Whitelisted vulnerabilities: {'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_VULNDB-229216-pip-9.0.3', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf', 'oscapcomp_CCE-82959-8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3177-python3-libs-3.6.8-31.el8', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'oscapcomp_CCE-83401-0', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2020-26116-platform-python-devel-3.6.8-31.el8', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'anchorecve_CVE-2021-23840-openssl-libs-1.1.1g-12.el8_3', 'anchorecve_CVE-2021-3177-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27619-platform-python-devel-3.6.8-31.el8', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82368-2', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'oscapcomp_CCE-82168-6', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82472-2', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecomp_41cb7cdf04850e33a11f80c42bf660b3', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8', 'oscapcomp_CCE-80784-2', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23841-openssl-libs-1.1.1g-12.el8_3', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecomp_953dfbea1b1e9d5829fbed2e390bd3af', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8', 'oscapcomp_CCE-82979-6', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82985-3'} INFO: Vulnerabilities found in scanning stage: 108 INFO: {'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_VULNDB-229216-pip-9.0.3', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2021-27645-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-12.el8_3', 'anchorecve_CVE-2020-10878-perl-libs-5.26.3-417.el8_3', 'oscapcomp_CCE-82959-8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-3326-glibc-langpack-en-2.28-127.el8_3.2', 'anchorecve_CVE-2020-10878-perl-macros-5.26.3-417.el8_3', 'anchorecve_CVE-2020-26137-urllib3-1.24.2', 'anchorecve_GHSA-vv2x-vrpj-qqpq-bleach-3.2.1', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23336-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-3177-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2021-23239-sudo-1.8.29-6.el8_3.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-12.el8_3', 'anchorecve_CVE-2021-23336-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80935-0', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23336-platform-python-devel-3.6.8-31.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-83401-0', 'tl_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-12.el8_3', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-23841-openssl-1.1.1g-12.el8_3', 'anchorecve_CVE-2021-27645-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23840-openssl-1.1.1g-12.el8_3', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_VULNDB-115884-urllib3-1.24.2', 'anchorecve_CVE-2021-23840-openssl-libs-1.1.1g-12.el8_3', 'anchorecve_CVE-2020-10878-perl-interpreter-5.26.3-417.el8_3', 'anchorecve_CVE-2021-3177-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-27618-glibc-langpack-en-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8_3.2', 'anchorecve_CVE-2020-27619-platform-python-devel-3.6.8-31.el8', 'anchorecve_CVE-2021-3326-glibc-common-2.28-127.el8_3.2', 'anchorecve_VULNDB-248437-Jinja2-2.11.2', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82368-2', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-10543-perl-libs-5.26.3-417.el8_3', 'tl_CVE-2021-3326-glibc-2.28-127.el8_3.2', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2021-27645-glibc-minimal-langpack-2.28-127.el8_3.2', 'tl_CVE-2020-28493-jinja2-2.11.2', 'oscapcomp_CCE-82168-6', 'tl_CVE-2021-23840-openssl-1.1.1g-12.el8_3', 'tl_CVE-2021-23240-sudo-1.8.29-6.el8_3.1', 'oscapcomp_CCE-82880-6', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2021-23240-sudo-1.8.29-6.el8_3.1', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-12.el8_3', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2021-23239-sudo-1.8.29-6.el8_3.1', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2021-3326-glibc-minimal-langpack-2.28-127.el8_3.2', 'anchorecve_CVE-2019-25013-glibc-langpack-en-2.28-127.el8_3.2', 'anchorecve_CVE-2020-10543-perl-interpreter-5.26.3-417.el8_3', 'oscapcomp_CCE-80784-2', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82220-5', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2021-27645-glibc-langpack-en-2.28-127.el8_3.2', 'anchorecve_CVE-2021-23841-openssl-libs-1.1.1g-12.el8_3', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2021-3177-platform-python-devel-3.6.8-31.el8', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2021-23841-openssl-1.1.1g-12.el8_3', 'anchorecve_CVE-2020-10543-perl-macros-5.26.3-417.el8_3', 'oscapcomp_CCE-82979-6', 'oscapcomp_CCE-82985-3'} ERROR: NON-WHITELISTED VULNERABILITIES FOUND ERROR: Number of non-whitelisted vulnerabilities: 27 ERROR: The following vulnerabilities are not whitelisted: ERROR: Anchore CVE - CVE-2019-25013-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2020-10543-perl-interpreter-5.26.3-417.el8_3 ERROR: Anchore CVE - CVE-2020-10543-perl-libs-5.26.3-417.el8_3 ERROR: Anchore CVE - CVE-2020-10543-perl-macros-5.26.3-417.el8_3 ERROR: Anchore CVE - CVE-2020-10878-perl-interpreter-5.26.3-417.el8_3 ERROR: Anchore CVE - CVE-2020-10878-perl-libs-5.26.3-417.el8_3 ERROR: Anchore CVE - CVE-2020-10878-perl-macros-5.26.3-417.el8_3 ERROR: Anchore CVE - CVE-2020-26137-urllib3-1.24.2 ERROR: Anchore CVE - CVE-2020-27618-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2021-23239-sudo-1.8.29-6.el8_3.1 ERROR: Anchore CVE - CVE-2021-23240-sudo-1.8.29-6.el8_3.1 ERROR: Anchore CVE - CVE-2021-23336-platform-python-devel-3.6.8-31.el8 ERROR: Anchore CVE - CVE-2021-23840-openssl-1.1.1g-12.el8_3 ERROR: Anchore CVE - CVE-2021-23841-openssl-1.1.1g-12.el8_3 ERROR: Anchore CVE - CVE-2021-27645-glibc-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2021-27645-glibc-common-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2021-27645-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2021-27645-glibc-minimal-langpack-2.28-127.el8_3.2 ERROR: Anchore CVE - CVE-2021-3177-platform-python-devel-3.6.8-31.el8 ERROR: Anchore CVE - CVE-2021-3326-glibc-langpack-en-2.28-127.el8_3.2 ERROR: Anchore CVE - GHSA-vv2x-vrpj-qqpq-bleach-3.2.1 ERROR: Anchore CVE - VULNDB-248437-Jinja2-2.11.2 ERROR: Twistlock CVE - CVE-2020-28493-jinja2-2.11.2 ERROR: Twistlock CVE - CVE-2021-23239-sudo-1.8.29-6.el8_3.1 ERROR: Twistlock CVE - CVE-2021-23240-sudo-1.8.29-6.el8_3.1 ERROR: Twistlock CVE - CVE-2021-23840-openssl-1.1.1g-12.el8_3 ERROR: Twistlock CVE - CVE-2021-23841-openssl-1.1.1g-12.el8_3 section_end:1614616180:step_script section_start:1614616180:cleanup_file_variables Cleaning up file based variables section_end:1614616180:cleanup_file_variables ERROR: Job failed: command terminated with exit code 1