[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 5, "warnings": [ { "msg": "Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", "metadata": { "details": { "description": "Vulnerabilities found: libcap-2.48-10.el9 (CVE-2026-4878)", "name": "clair_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with unpatched high vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: krb5-libs-1.21.1-9.el9_7 (CVE-2026-40356), gnutls-3.8.3-10.el9_7 (CVE-2026-33845)", "name": "clair_unpatched_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 2 } }, { "msg": "Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", "metadata": { "details": { "description": "Vulnerabilities found: systemd-libs-252-55.el9_7.8 (CVE-2026-29111)", "name": "clair_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: python3.12-3.12.12-4.el9_7.3 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2026-0672, CVE-2026-0865, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713, CVE-2026-6019), libxml2-2.9.13-14.el9_7 (CVE-2026-0990, CVE-2026-1757, CVE-2026-6732), python3.12-libs-3.12.12-4.el9_7.3 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2026-0672, CVE-2026-0865, CVE-2026-1502, CVE-2026-3644, CVE-2026-4224, CVE-2026-5713, CVE-2026-6019), systemd-libs-252-55.el9_7.8 (CVE-2026-4105), libsmartcols-2.37.4-21.el9_7 (CVE-2026-27456), xz-libs-5.2.5-8.el9_0 (CVE-2026-34743), libuuid-2.37.4-21.el9_7 (CVE-2026-27456), coreutils-single-8.32-39.el9 (CVE-2025-5278), krb5-libs-1.21.1-9.el9_7 (CVE-2026-40355), libcurl-minimal-7.76.1-35.el9_7.3 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), gnutls-3.8.3-10.el9_7 (CVE-2026-3833), glib2-2.68.4-18.el9_7.1 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489), openssl-libs-1:3.5.1-7.el9_7 (CVE-2026-28390, CVE-2026-31790), libblkid-2.37.4-21.el9_7 (CVE-2026-27456), openldap-2.6.8-4.el9 (CVE-2026-22185), libarchive-3.5.3-9.el9_7 (CVE-2023-30571, CVE-2025-60753, CVE-2026-4426, CVE-2026-5745), openssl-fips-provider-3.0.7-8.el9 (CVE-2026-31790), libgcrypt-1.10.0-11.el9 (CVE-2026-41989), glibc-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-common-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), libmount-2.37.4-21.el9_7 (CVE-2026-27456), glibc-minimal-langpack-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), glibc-langpack-en-2.34-231.el9_7.10 (CVE-2026-4046, CVE-2026-4437, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928), gnupg2-2.3.3-5.el9_7 (CVE-2025-68972), python3.12-pip-wheel-23.2.1-5.el9 (CVE-2025-50181, CVE-2025-50182, CVE-2026-25645, CVE-2026-32284), curl-minimal-7.76.1-35.el9_7.3 (CVE-2025-13034, CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805, CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253, CVE-2026-6429), openssl-fips-provider-so-3.0.7-8.el9 (CVE-2026-31790), expat-2.5.0-5.el9_7.1 (CVE-2026-32776, CVE-2026-32777, CVE-2026-32778)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 102 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: python3.12-3.12.12-4.el9_7.3 (CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), ncurses-libs-6.2-12.20210508.el9 (CVE-2023-50495), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), libxml2-2.9.13-14.el9_7 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), ncurses-base-6.2-12.20210508.el9 (CVE-2023-50495), libtasn1-4.16.0-9.el9 (CVE-2025-13151), python3.12-libs-3.12.12-4.el9_7.3 (CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), libgcc-11.5.0-11.el9 (CVE-2022-27943), zlib-1.2.11-40.el9 (CVE-2026-27171), libcurl-minimal-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), gnutls-3.8.3-10.el9_7 (CVE-2026-3832), libstdc++-11.5.0-11.el9 (CVE-2022-27943), glib2-2.68.4-18.el9_7.1 (CVE-2023-32636, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485), openssl-libs-1:3.5.1-7.el9_7 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232, CVE-2026-2673, CVE-2026-28388, CVE-2026-28389, CVE-2026-31789), libarchive-3.5.3-9.el9_7 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), openssl-fips-provider-3.0.7-8.el9 (CVE-2026-2673), libgcrypt-1.10.0-11.el9 (CVE-2026-41990), gawk-5.1.0-6.el9 (CVE-2023-4156), pcre2-10.40-6.el9 (CVE-2022-41409), glibc-2.34-231.el9_7.10 (CVE-2026-4438), glibc-common-2.34-231.el9_7.10 (CVE-2026-4438), sqlite-libs-3.34.1-9.el9_7 (CVE-2024-0232, CVE-2025-70873), glibc-minimal-langpack-2.34-231.el9_7.10 (CVE-2026-4438), glibc-langpack-en-2.34-231.el9_7.10 (CVE-2026-4438), gnupg2-2.3.3-5.el9_7 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), curl-minimal-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681, CVE-2025-14524, CVE-2025-15079, CVE-2025-15224, CVE-2026-6276), openssl-fips-provider-so-3.0.7-8.el9 (CVE-2026-2673), expat-2.5.0-5.el9_7.1 (CVE-2025-66382, CVE-2026-24515, CVE-2026-41080)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 68 } } ] } ] {"vulnerabilities":{"critical":0,"high":1,"medium":1,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":2,"medium":102,"low":68,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-xefr/python-component-ckckdi:on-pr-3ed55e68ed83b420358addd4d72b2bf3c37b5c6d", "digests": ["sha256:288d56b576c5c629a22f473f5c933fce6315968bd9971c96778bfd2117ee29ee"]}} {"result":"SUCCESS","timestamp":"2026-05-07T14:53:26+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}