UNCLASSIFIED

Merge branch 'python-update' into 'development'

Python update

See merge request dsop/opensource/trufflehog/truffelhog3!16
19 jobs for development in 13 minutes and 28 seconds (queued for 15 minutes and 26 seconds)
Status Job ID Name Coverage
  .Pre
passed #2666122
ironbank
load scripts

00:00:06

 
  Preflight
passed #2666123
ironbank
folder structure

00:00:05

passed #2666124
ironbank
hardening_manifest

00:00:09

 
  Lint
passed #2666125
ironbank
wl compare lint

00:00:09

 
  Finding Compare
failed #2666126
ironbank allowed to fail
vat compare

00:00:07

 
  Import Artifacts
passed #2666127
ironbank
import artifacts

00:00:07

 
  Scan Artifacts
passed #2666128
ironbank
clamav scan

00:02:48

 
  Build
passed #2666129
ironbank-isolated
build

00:02:20

 
  Scanning
passed #2666133
ironbank
anchore scan

00:02:10

passed #2666130
ironbank
openscap compliance

00:01:06

passed #2666131
ironbank
openscap cve

00:04:19

passed #2666132
ironbank
twistlock scan

00:00:32

 
  Csv Output
passed #2666134
ironbank
csv output

00:00:53

 
  Check Cves
failed #2666135
ironbank allowed to fail
check cves

00:00:15

 
  Documentation
passed #2666136
ironbank
sign image

00:00:32

passed #2666137
ironbank
sign manifest

00:00:21

passed #2666138
ironbank
write json documentation

00:00:20

 
  S3 Publish
passed #2666139
ironbank
upload to s3

00:01:29

 
  Vat
passed #2666140
ironbank
vat

00:00:07

 
Name Stage Failure
failed
check cves Check Cves
ERROR: anchore_cve                   CVE-2020-10878                perl-interpreter-5.26.3-417.el8_3    None                          
ERROR: anchore_cve CVE-2020-10543 perl-libs-5.26.3-417.el8_3 None
ERROR: anchore_cve CVE-2020-10878 perl-libs-5.26.3-417.el8_3 None
ERROR: anchore_cve CVE-2020-10543 perl-macros-5.26.3-417.el8_3 None
ERROR: anchore_cve CVE-2020-10878 perl-macros-5.26.3-417.el8_3 None
ERROR: twistlock_cve CVE-2021-23840 openssl-1.1.1g-15.el8_3 None
ERROR: twistlock_cve CVE-2021-23841 openssl-1.1.1g-15.el8_3 None
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1
failed
vat compare Finding Compare
('CVE-2021-3450', 'anchore_cve', 'python-3.9.2\nVendor Specific News/Changelog Entry: https://downloads.nodesource.com/\nVendor Specific Advisory URL: https://support2.windriver.com/index.php?page=security-notices&on=view&id=7055\nCVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3450\nMail List Post: https://mta.openssl.org/pipermail/openssl-announce/2021-March/000196.html\nVendor Specific Advisory URL: https://www.openssl.org/news/secadv/20210325.txt\nVendor Specific Advisory URL: https://www.openssl.org/news/vulnerabilities.html\nBug Tracker: https://github.com/openssl/openssl/issues/14670\nVendor Specific Solution URL: https://github.com/openssl/openssl/commit/2a40b7bc7b94dd7de897a74571e7024f0cf0d63b\nVendor Specific Advisory URL: https://access.redhat.com/security/cve/cve-2021-3450\nBug Tracker: https://bugzilla.redhat.com/show_bug.cgi?id=1941547\nVendor Specific Advisory URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd\nVendor Specific Advisory URL: https://www.freebsd.org/security/advisories/FreeBSD-SA-21:07.openssl.asc\nOther Advisory URL: https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=35948\nOther Advisory URL: http://jvn.jp/vu/JVNVU92126369/index.html\nVendor Specific Advisory URL: https://security.netapp.com/advisory/ntap-20210326-0006/\nVendor Specific Advisory URL: https://support.f5.com/csp/article/K52171694\nNews Article: https://www.bankinfosecurity.com/openssl-fixes-flaws-that-could-lead-to-server-takedowns-a-16276\nNews Article: https://www.bleepingcomputer.com/news/security/openssl-fixes-severe-dos-certificate-validation-vulnerabilities/\nNews Article: https://arstechnica.com/gadgets/2021/03/openssl-fixes-high-severity-flaw-that-allows-hackers-to-crash-servers/\nVendor Specific Advisory URL: https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc\nVendor Specific Solution URL: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b\nOther Advisory URL: http://www.openwall.com/lists/oss-security/2021/03/27/1\nOther Advisory URL: http://www.openwall.com/lists/oss-security/2021/03/27/2\nMail List Post: https://seclists.org/oss-sec/2021/q1/266\nOther Advisory URL: http://www.openwall.com/lists/oss-security/2021/03/28/3\nOther Advisory URL: http://www.openwall.com/lists/oss-security/2021/03/28/4\nOther Advisory URL: https://matrix.org/blog/2021/03/26/synapse-1-30-1-released/\nRedHat RHSA: http://rhn.redhat.com/errata/RHSA-2021-1024.html\nVendor Specific Advisory URL: https://news.cpanel.com/easyapache-4-march-31-release/\nVendor Specific Advisory URL: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/\nVendor Specific Solution URL: https://security.gentoo.org/glsa/202103-03\nVendor Specific News/Changelog Entry: https://www.tenable.com/security/tns-2021-05\nOther Advisory URL: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/\nVendor Specific News/Changelog Entry: https://pythoninsider.blogspot.com/2021/04/python-393-and-389-are-now-available.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PythonInsider+%28Python+Insider%29\nVendor Specific News/Changelog Entry: https://www.python.org/downloads/release/python-393/\nVendor Specific News/Changelog Entry: https://www.python.org/downloads/release/python-389/\nVendor Specific News/Changelog Entry: https://pythoninsider.blogspot.com/2021/04/python-394-hotfix-is-now-available.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PythonInsider+%28Python+Insider%29\nVendor Specific Advisory URL: https://nodejs.org/en/blog/vulnerability/april-2021-security-releases/\nOther Advisory URL: https://www.tenable.com/security/tns-2021-08\n', 'python-3.9.2', '/usr/local/lib/libpython3.9.so.1.0')
Findings from direct query not in api
('cbff271f45d32e78dcc1979dbca9c14d', 'anchore_comp', 'User root found as effective user, which is explicity not allowed\n Gate: dockerfile\n Trigger: effective_user\n Policy ID: DoDEffectiveUserChecks', None, None)
Uploading artifacts for failed job
Uploading artifacts...
ci-artifacts/compare/: found 2 matching files and directories

Uploading artifacts as "archive" to coordinator... ok
id=2666126 responseStatus=201 Created token=mtvhFF3f
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 4