[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 7, "warnings": [ { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: coreutils-8.32-4+b1 (CVE-2016-2781)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: gcc-9-base-9.3.0-22 (CVE-2023-4039), openssl-1.1.1n-0+deb11u3 (CVE-2025-27587), gpgv-2.2.27-2+deb11u2 (CVE-2022-3219), login-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), libc-bin-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), apt-2.2.4 (CVE-2011-3374), tar-1.34+dfsg-1 (CVE-2005-2541, TEMP-0290435-0B57B5), util-linux-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libexpat1-2.2.10-2+deb11u5 (CVE-2013-0340, CVE-2023-52426, CVE-2024-28757), libgnutls30-3.7.1-5+deb11u2 (CVE-2011-3389), libsystemd0-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), libk5crypto3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), coreutils-8.32-4+b1 (CVE-2017-18018, CVE-2025-5278), libgcc-s1-10.2.1-6 (CVE-2023-4039), libudev1-247.3-7+deb11u1 (CVE-2013-4392, CVE-2020-13529, CVE-2023-31437, CVE-2023-31438, CVE-2023-31439), libmount1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), sysvinit-utils-2.96-7+deb11u1 (TEMP-0517018-A83CE6), libsqlite3-0-3.34.1-3 (CVE-2021-45346, CVE-2022-35737, CVE-2025-29088, CVE-2025-70873), libblkid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libssl1.1-1.1.1n-0+deb11u3 (CVE-2025-27587), bsdutils-1:2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), bash-5.1-2+deb11u1 (TEMP-0841856-B18BAF), libstdc++6-10.2.1-6 (CVE-2023-4039), libuuid1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), perl-base-5.32.1-4+deb11u2 (CVE-2011-4116, CVE-2023-31486), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libpcre2-8-0-10.36-2+deb11u1 (CVE-2022-41409), libkrb5-3-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libapt-pkg6.0-2.2.4 (CVE-2011-3374), mount-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104), libpcre3-2:8.39-13 (CVE-2017-11164, CVE-2017-16231, CVE-2017-7245, CVE-2017-7246, CVE-2019-20838), libkrb5support0-1.18.3-6+deb11u3 (CVE-2018-5709, CVE-2024-26458, CVE-2024-26461), libc6-2.31-13+deb11u5 (CVE-2010-4756, CVE-2018-20796, CVE-2019-1010022, CVE-2019-1010023, CVE-2019-1010024, CVE-2019-1010025, CVE-2019-9192), passwd-1:4.8.1-1 (CVE-2007-5686, CVE-2013-4235, TEMP-0628843-DBAD28), gcc-10-base-10.2.1-6 (CVE-2023-4039), libgcrypt20-1.8.7-6 (CVE-2018-6829, CVE-2024-2236), libsmartcols1-2.36.1-8+deb11u1 (CVE-2022-0563, CVE-2025-14104)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 89 } }, { "msg": "Found packages with unpatched unknown vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: openssl-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390), gpgv-2.2.27-2+deb11u2 (CVE-2025-30258, CVE-2025-68972), libpam-runtime-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), login-1:4.8.1-1 (CVE-2024-56433), dpkg-1.20.12 (CVE-2025-6297), libc-bin-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928, CVE-2026-6238), libtasn1-6-4.16.0-2 (CVE-2025-13151), tar-1.34+dfsg-1 (CVE-2026-5704), util-linux-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libexpat1-2.2.10-2+deb11u5 (CVE-2024-8176, CVE-2025-59375, CVE-2025-66382, CVE-2026-24515, CVE-2026-25210, CVE-2026-32776, CVE-2026-32777, CVE-2026-32778, CVE-2026-41080, CVE-2026-45186), libgnutls30-3.7.1-5+deb11u2 (CVE-2026-33845, CVE-2026-33846, CVE-2026-3832, CVE-2026-3833, CVE-2026-42009, CVE-2026-42010, CVE-2026-42011, CVE-2026-42012, CVE-2026-42013, CVE-2026-42014, CVE-2026-42015, CVE-2026-5260, CVE-2026-5419), libsystemd0-247.3-7+deb11u1 (CVE-2026-40228), sed-4.7-1 (CVE-2026-5958), ncurses-base-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libk5crypto3-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), libudev1-247.3-7+deb11u1 (CVE-2026-40228), libmount1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libtinfo6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libsqlite3-0-3.34.1-3 (CVE-2025-6965), libpam0g-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libblkid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libssl1.1-1.1.1n-0+deb11u3 (CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390), bsdutils-1:2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libncursesw6-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), bash-5.1-2+deb11u1 (CVE-2022-3715), libuuid1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libgssapi-krb5-2-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), libkrb5-3-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), mount-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), libpam-modules-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), libkrb5support0-1.18.3-6+deb11u3 (CVE-2026-40355, CVE-2026-40356), libdb5.3-5.3.28+dfsg1-0.8 (CVE-2019-8457), libc6-2.31-13+deb11u5 (CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-8058, CVE-2026-0861, CVE-2026-0915, CVE-2026-4046, CVE-2026-4437, CVE-2026-4438, CVE-2026-5435, CVE-2026-5450, CVE-2026-5928, CVE-2026-6238), zlib1g-1:1.2.11.dfsg-2+deb11u2 (CVE-2023-45853, CVE-2026-27171), passwd-1:4.8.1-1 (CVE-2024-56433), libzstd1-1.4.8+dfsg-2.1 (CVE-2022-4899), libpam-modules-bin-1.4.0-9+deb11u1 (CVE-2024-10041, CVE-2025-8941), ncurses-bin-6.2+20201114-2 (CVE-2023-50495, CVE-2025-6141, CVE-2025-69720), libgcrypt20-1.8.7-6 (CVE-2021-33560, CVE-2026-41989), libsmartcols1-2.36.1-8+deb11u1 (CVE-2026-27456, CVE-2026-3184), liblzma5-5.2.5-2.1~deb11u1 (CVE-2026-34743)", "name": "clair_unpatched_unknown_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 118 } } ] } ] {"vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":1,"low":89,"unknown":118}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-ltrq/test-comp-lgat:on-pr-bfcf0d7b4680fe4e89a434bec84328d3a0c7b45f", "digests": ["sha256:be4f03639b2aa1c7dc6134dbd255f977f40062b1d673cd5778e7fbd95cc2f350"]}} {"result":"SUCCESS","timestamp":"2026-05-13T21:11:42+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}