UNCLASSIFIED

You need to sign in or sign up before continuing.

Update sonarqube:8.6-community Docker digest to e3c10d3

14 jobs for renovate/docker-sonarqube-8.6-community in 15 minutes and 53 seconds (queued for 20 seconds)
Status Job ID Name Coverage
  .Pre
passed #1745223
ironbank
load scripts

00:00:07

 
  Preflight
passed #1745224
ironbank
folder structure

00:00:05

passed #1745226
ironbank
hardening_manifest

00:00:09

passed #1745225
ironbank
hardening_manifest migration

00:00:05

 
  Lint
passed #1745227
ironbank
wl compare lint

00:00:10

 
  Import Artifacts
passed #1745228
ironbank
import artifacts

00:01:22

 
  Scan Artifacts
passed #1745229
ironbank
clamav scan

00:03:07

 
  Build
passed #1745230
ironbank-isolated
build

00:03:56

 
  Scanning
passed #1745234
ironbank
anchore scan

00:05:45

passed #1745231
ironbank
openscap compliance

00:01:14

passed #1745232
ironbank
openscap cve

00:04:25

passed #1745233
ironbank
twistlock scan

00:00:39

 
  Csv Output
passed #1745235
ironbank
csv output

00:01:00

 
  Check Cves
failed #1745236
ironbank allowed to fail
check cves

00:00:11

 
Name Stage Failure
failed
check cves Check Cves
INFO: {'anchorecve_CVE-2020-8231-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82985-3', 'anchorecve_CVE-2020-35512-dbus-1.12.8-11.el8', 'anchorecve_CVE-2020-26116-python3-libs-3.6.8-31.el8', 'anchorecve_CVE-2020-27618-glibc-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-common-1.12.8-11.el8', 'oscapcomp_CCE-82220-5', 'tl_CVE-2020-25649-com.fasterxml.jackson.core_jackson-databind-2.10.4', 'tl_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'tl_CVE-2019-25013-glibc-2.28-127.el8', 'anchorecve_CVE-2020-13776-systemd-libs-239-41.el8_3.1', 'anchorecve_GHSA-vwqq-5vrc-xw9h-log4j-core-2.11.1', 'tl_CVE-2020-8908-com.google.guava_guava-26.0-jre', 'anchorecve_CVE-2020-29361-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8908-com.google.guava_guava-29.0-jre', 'anchorecve_VULNDB-193302-jackson-core-2.9.7', 'anchorecve_VULNDB-247072-elasticsearch-7.9.3', 'tl_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8284-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-26116-platform-python-3.6.8-31.el8', 'oscapcomp_CCE-82474-8', 'tl_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'anchorecve_VULNDB-193303-jackson-core-2.9.7', 'tl_CVE-2020-13776-systemd-239-41.el8_3.1', 'oscapcomp_CCE-82473-0', 'anchorecve_CVE-2019-25013-glibc-2.28-127.el8', 'tl_CVE-2020-8908-com.google.guava_guava-10.0.1', 'anchorecve_CVE-2020-29363-p11-kit-trust-0.23.14-5.el8_0', 'anchorecve_VULNDB-204607-logback-1.2.3', 'tl_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2019-25013-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-tools-1.12.8-11.el8', 'oscapcomp_CCE-82267-6', 'anchorecve_CVE-2020-10663-json-1.1.1', 'anchorecve_CVE-2020-8908-guava-10.0.1', 'anchorecve_VULNDB-239195-commons-io-2.7', 'anchorecve_CVE-2020-8284-libcurl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-24977-python3-libxml2-2.9.7-8.el8', 'anchorecve_CVE-2020-8286-libcurl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-80935-0', 'oscapcomp_CCE-82360-9', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.8.2', 'anchorecve_CVE-2019-25013-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-35512-dbus-libs-1.12.8-11.el8', 'anchorecve_CVE-2018-8088-slf4j-1.7.30', 'anchorecve_CVE-2020-8022-tomcat-8.5.60', 'anchorecve_CVE-2020-27618-glibc-minimal-langpack-2.28-127.el8', 'anchorecve_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82979-6', 'oscapcomp_CCE-82168-6', 'tl_CVE-2020-8908-com.google.guava_guava-28.0-jre', 'tl_CVE-2020-8231-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-27618-glibc-common-2.28-127.el8', 'anchorecve_CVE-2020-28196-krb5-libs-1.18.2-5.el8', 'anchorecve_VULNDB-193304-jackson-core-2.9.7', 'oscapcomp_CCE-80938-4', 'oscapcomp_CCE-82395-5', 'anchorecve_CVE-2020-16135-libssh-config-0.9.4-2.el8', 'anchorecve_CVE-2020-27619-python3-libs-3.6.8-31.el8', 'oscapcomp_CCE-82368-2', 'anchorecve_CVE-2020-15358-sqlite-libs-3.26.0-11.el8', 'anchorecve_CVE-2020-16135-libssh-0.9.4-2.el8', 'anchorecve_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-8908-com.google.guava_guava-28.2-jre', 'anchorecve_CVE-2020-8927-brotli-1.0.6-2.el8', 'anchorecve_CVE-2020-13776-systemd-239-41.el8_3.1', 'anchorecve_CVE-2020-8285-libcurl-7.61.1-14.el8_3.1', 'tl_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'oscapcomp_CCE-82494-6', 'anchorecve_CVE-2020-13956-httpclient-4.5', 'anchorecve_CVE-2020-13434-sqlite-libs-3.26.0-11.el8', 'oscapcomp_CCE-82472-2', 'anchorecve_CVE-2018-8088-slf4j-1.7.5', 'anchorecve_CVE-2020-24370-lua-libs-5.3.4-11.el8', 'anchorecve_CVE-2020-24977-libxml2-2.9.7-8.el8', 'oscapcomp_CCE-82959-8', 'anchorecve_CVE-2020-27619-platform-python-3.6.8-31.el8', 'anchorecve_CVE-2020-35512-dbus-daemon-1.12.8-11.el8', 'oscapcomp_CCE-82949-9', 'anchorecve_CVE-2020-8285-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-0.23.14-5.el8_0', 'tl_CVE-2020-29361-p11-kit-0.23.14-5.el8_0', 'anchorecve_CVE-2020-24370-lua-5.3.4-11.el8', 'anchorecve_CVE-2020-29363-p11-kit-0.23.14-5.el8_0', 'oscapcomp_CCE-82214-8', 'tl_CVE-2020-9488-org.apache.logging.log4j_log4j-api-2.11.1', 'anchorecve_CVE-2020-8286-curl-7.61.1-14.el8_3.1', 'anchorecve_CVE-2020-25649-jackson-databind-2.10.4', 'anchorecve_CVE-2020-13776-systemd-pam-239-41.el8_3.1', 'anchorecve_CVE-2020-29362-p11-kit-trust-0.23.14-5.el8_0'}
ERROR: NON-WHITELISTED VULNERABILITIES FOUND
ERROR: Number of non-whitelisted vulnerabilities: 3
ERROR: The following vulnerabilities are not whitelisted:
ERROR: Anchore CVE - CVE-2018-8088-slf4j-1.7.30
ERROR: Anchore CVE - CVE-2018-8088-slf4j-1.7.5
ERROR: Anchore CVE - VULNDB-247072-elasticsearch-7.9.3
Cleaning up file based variables
ERROR: Job failed: command terminated with exit code 1