UNCLASSIFIED

Merge branch 'renovate/sonarsource-docker-sonarqube-8.x' into 'development'

Update dependency SonarSource/docker-sonarqube to v8.6.1.40680

See merge request !23
19 jobs for development in 34 minutes and 22 seconds (queued for 34 minutes and 21 seconds)
Status Job ID Name Coverage
  .Pre
passed #1711403
ironbank
load scripts

00:00:11

 
  Preflight
passed #1711404
ironbank
folder structure

00:00:14

passed #1711406
ironbank
hardening_manifest

00:00:43

passed #1711405
ironbank
hardening_manifest migration

00:00:28

 
  Lint
passed #1711407
ironbank
wl compare lint

00:00:33

 
  Import Artifacts
passed #1711408
ironbank
import artifacts

00:07:05

 
  Scan Artifacts
passed #1711409
ironbank
clamav scan

00:04:38

 
  Build
passed #1711410
ironbank-isolated
build

00:04:21

 
  Scanning
passed #1711414
ironbank
anchore scan

00:11:29

passed #1711411
ironbank
openscap compliance

00:04:17

passed #1711412
ironbank
openscap cve

00:07:32

passed #1711413
ironbank
twistlock scan

00:01:08

 
  Csv Output
passed #1711415
ironbank
csv output

00:01:10

 
  Check Cves
failed #1711416
ironbank allowed to fail
check cves

00:00:12

 
  Documentation
passed #1711417
ironbank
sign image

00:00:57

passed #1711418
ironbank
sign manifest

00:00:31

passed #1711419
ironbank
write json documentation

00:00:30

 
  Publish
passed #1711420
ironbank
upload to s3

00:02:29

 
  Vat
passed #1711421
ironbank
vat

00:00:27

 
Name Stage Failure
failed
check cves Check Cves
INFO: Whitelisted vulnerabilities: {'tl_CVE-2020-25649-com.fasterxml.jackson.core_jackson-databind-2.10.4', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82979-6', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_VULNDB-204607-logback-1.2.3', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82985-3', 'anchorecomp_abb121e9621abdd452f65844954cf1c1', 'anchorecomp_e7573262736ef52353cde3bae2617782', 'anchorecve_GHSA-vwqq-5vrc-xw9h-log4j-core-2.11.1', 'anchorecomp_320a97c6816565eedf3545833df99dd0', 'anchorecve_CVE-2020-8022-tomcat-8.5.60', 'oscapcomp_CCE-82959-8', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecomp_c2e44319ae5b3b040044d8ae116d1c2f', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'oscapcomp_CCE-82494-6', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecomp_639f6f1177735759703e928c14714a59', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.11.1', 'oscapcomp_CCE-82474-8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_VULNDB-193302-jackson-core-2.9.7', 'anchorecve_VULNDB-193304-jackson-core-2.9.7', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-29.0-jre', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecomp_3e5fad1c039f3ecfd1dcdc94d2f1f9a0', 'anchorecomp_c4ad80832b361f81df2a31e5b6b09864', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_VULNDB-239195-commons-io-2.7', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-25649-jackson-databind-2.10.4', 'anchorecomp_3456a263793066e9b5063ada6e47917d', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-28.2-jre', 'oscapcomp_CCE-80935-0', 'tl_CVE-2020-8908-com.google.guava_guava-10.0.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-jre', 'oscapcomp_CCE-82214-8', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-26.0-jre', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.8.2', 'oscapcomp_CCE-82168-6', 'anchorecomp_68e630cef4a8533b139875aa5fc54da5', 'anchorecve_CVE-2020-8908-guava-10.0.1', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecomp_bcd159901fe47efddae5c095b4b0d7fd', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecomp_463a9a24225c26f7a5bf3f38908e5cb3', 'anchorecomp_698044205a9c4a6d48b7937e66a6bf4f', 'anchorecve_CVE-2020-10663-json-1.1.1', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecomp_addbb93c22e9b0988b8b40392a4538cb', 'oscapcomp_CCE-80938-4', 'anchorecve_VULNDB-193303-jackson-core-2.9.7', 'anchorecomp_34de21e516c0ca50a96e5386f163f8bf'}
INFO: Vulnerabilities found in scanning stage: 89
INFO: {'tl_CVE-2020-25649-com.fasterxml.jackson.core_jackson-databind-2.10.4', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82979-6', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_VULNDB-204607-logback-1.2.3', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82985-3', 'anchorecve_GHSA-vwqq-5vrc-xw9h-log4j-core-2.11.1', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-8022-tomcat-8.5.60', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'oscapcomp_CCE-82494-6', 'anchorecve_VULNDB-247072-elasticsearch-7.9.3', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'oscapcomp_CCE-82360-9', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.11.1', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_VULNDB-193302-jackson-core-2.9.7', 'anchorecve_VULNDB-193304-jackson-core-2.9.7', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-29.0-jre', 'oscapcomp_CCE-82220-5', 'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_VULNDB-239195-commons-io-2.7', 'oscapcomp_CCE-82395-5', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-25649-jackson-databind-2.10.4', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'tl_CVE-2020-8908-com.google.guava_guava-28.2-jre', 'oscapcomp_CCE-80935-0', 'tl_CVE-2020-8908-com.google.guava_guava-10.0.1', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'oscapcomp_CCE-82214-8', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-jre', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8908-com.google.guava_guava-26.0-jre', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.8.2', 'oscapcomp_CCE-82168-6', 'anchorecve_CVE-2020-8908-guava-10.0.1', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-10663-json-1.1.1', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'oscapcomp_CCE-82267-6', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80938-4', 'anchorecve_VULNDB-193303-jackson-core-2.9.7', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 1
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - VULNDB-247072-elasticsearch-7.9.3
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1