[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 5, "warnings": [ { "msg": "Found packages with high vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", "metadata": { "details": { "description": "Vulnerabilities found: sqlite-libs-3.34.1-8.el9_6 (CVE-2025-6965)", "name": "clair_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with medium vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", "metadata": { "details": { "description": "Vulnerabilities found: openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2025-9230)", "name": "clair_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: coreutils-single-8.32-39.el9 (CVE-2025-5278), sqlite-libs-3.34.1-8.el9_6 (CVE-2025-52099), libxml2-2.9.13-12.el9_6 (CVE-2025-9714), curl-minimal-7.76.1-31.el9_6.1 (CVE-2025-10966, CVE-2025-9086), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753), systemd-libs-252-51.el9_6.2 (CVE-2025-4598), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2025-10966, CVE-2025-9086), lz4-libs-1.9.3-5.el9 (CVE-2025-62813)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 11 } }, { "msg": "Found packages with low/negligible vulnerabilities associated with RHSA fixes. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", "metadata": { "details": { "description": "Vulnerabilities found: shadow-utils-2:4.9-12.el9 (CVE-2024-56433)", "name": "clair_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: sqlite-libs-3.34.1-8.el9_6 (CVE-2024-0232), libxml2-2.9.13-12.el9_6 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170), ncurses-base-6.2-10.20210508.el9_6.2 (CVE-2023-50495), curl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), libgcc-11.5.0-5.el9_5 (CVE-2022-27943), ncurses-libs-6.2-10.20210508.el9_6.2 (CVE-2023-50495), pcre2-10.40-6.el9 (CVE-2022-41409), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), glib2-2.68.4-16.el9_6.2 (CVE-2023-32636, CVE-2025-3360), libcurl-minimal-7.76.1-31.el9_6.1 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), libstdc++-11.5.0-5.el9_5 (CVE-2022-27943), gnupg2-2.3.3-4.el9 (CVE-2022-3219, CVE-2025-30258), openssl-libs-1:3.2.2-6.el9_5.1 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232), gawk-5.1.0-6.el9 (CVE-2023-4156)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 30 } } ] } ] {"vulnerabilities":{"critical":0,"high":1,"medium":1,"low":1,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":11,"low":30,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-urwd/gl-multi-component-parent-kpzw:on-pr-dab821116751253a7d2172b4437d136dae6e8cca", "digests": ["sha256:58f79cb59fb8abf6ebefdcf9d866c2a4bb7de527502e2aad6f29f0339593fe07"]}} {"result":"SUCCESS","timestamp":"2026-02-16T14:17:35+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}