[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 6, "warnings": [ { "msg": "Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", "metadata": { "details": { "description": "Vulnerabilities found: libcap-2.48-10.el9 (CVE-2026-4878)", "name": "clair_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with unpatched high vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: krb5-libs-1.21.1-9.el9_7 (CVE-2026-40356), gnutls-3.8.3-10.el9_7 (CVE-2026-33845, CVE-2026-33846)", "name": "clair_unpatched_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 3 } }, { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: openldap-2.6.8-4.el9 (CVE-2026-22185), python3.12-pip-wheel-23.2.1-5.el9 (CVE-2025-50181, CVE-2025-50182, CVE-2026-25645, CVE-2026-32284), glib2-2.68.4-18.el9_7.1 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), openssl-libs-1:3.5.1-7.el9_7 (CVE-2026-28390, CVE-2026-31790), coreutils-single-8.32-39.el9 (CVE-2025-5278), glibc-common-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libcurl-minimal-7.76.1-35.el9_7.3 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), libuuid-2.37.4-21.el9_7 (CVE-2026-27456), krb5-libs-1.21.1-9.el9_7 (CVE-2026-40355), glibc-langpack-en-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9_7 (CVE-2026-27456), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), gnupg2-2.3.3-5.el9_7 (CVE-2025-68972), libgcrypt-1.10.0-11.el9 (CVE-2026-41989), python3.12-libs-3.12.12-4.el9_7.3 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2026-0672, CVE-2026-0865, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713, CVE-2026-6019), glibc-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libxml2-2.9.13-14.el9_7 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), libsmartcols-2.37.4-21.el9_7 (CVE-2026-27456), gnutls-3.8.3-10.el9_7 (CVE-2026-3833), libblkid-2.37.4-21.el9_7 (CVE-2026-27456), curl-minimal-7.76.1-35.el9_7.3 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), systemd-libs-252-55.el9_7.8 (CVE-2026-29111, CVE-2026-4105), python3.12-3.12.12-4.el9_7.3 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2026-0672, CVE-2026-0865, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713, CVE-2026-6019), libarchive-3.5.3-9.el9_7 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), expat-2.5.0-5.el9_7.1 (CVE-2026-32776, CVE-2026-32777, CVE-2026-32778), glibc-minimal-langpack-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 101 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: glib2-2.68.4-18.el9_7.1 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), openssl-libs-1:3.5.1-7.el9_7 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), ncurses-libs-6.2-12.20210508.el9 (CVE-2023-50495), sqlite-libs-3.34.1-9.el9_7 (CVE-2024-0232, CVE-2025-70873), glibc-common-2.34-231.el9_7.10 (CVE-2026-4438), zlib-1.2.11-40.el9 (CVE-2026-27171), libcurl-minimal-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), ncurses-base-6.2-12.20210508.el9 (CVE-2023-50495), pcre2-10.40-6.el9 (CVE-2022-41409), glibc-langpack-en-2.34-231.el9_7.10 (CVE-2026-4438), libgcc-11.5.0-11.el9 (CVE-2022-27943), openssl-fips-provider-so-3.0.7-8.el9 (CVE-2026-2673), libtasn1-4.16.0-9.el9 (CVE-2025-13151), gnupg2-2.3.3-5.el9_7 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), python3.12-libs-3.12.12-4.el9_7.3 (CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), libstdc++-11.5.0-11.el9 (CVE-2022-27943), glibc-2.34-231.el9_7.10 (CVE-2026-4438), libxml2-2.9.13-14.el9_7 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), gnutls-3.8.3-10.el9_7 (CVE-2026-3832), curl-minimal-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), openssl-fips-provider-3.0.7-8.el9 (CVE-2026-2673), python3.12-3.12.12-4.el9_7.3 (CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), gawk-5.1.0-6.el9 (CVE-2023-4156), libarchive-3.5.3-9.el9_7 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), expat-2.5.0-5.el9_7.1 (CVE-2025-66382, CVE-2026-24515, CVE-2026-41080), glibc-minimal-langpack-2.34-231.el9_7.10 (CVE-2026-4438)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 68 } } ] } ] {"vulnerabilities":{"critical":0,"high":1,"medium":0,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":3,"medium":101,"low":68,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-zpso/python-component-eqheeb:on-pr-71d8b3ffb8d81fa0aaaf7341765148079efd9588", "digests": ["sha256:adcd033030bcad535e65b239a048e5728acb7590d57bc02ba60aa9f4f75829bf"]}} {"result":"SUCCESS","timestamp":"2026-05-05T09:25:15+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}