[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 7, "warnings": [ { "msg": "Found packages with unpatched high vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: expat-2.5.0-5.el9_7.1 (CVE-2025-59375), expat-devel-2.5.0-5.el9_7.1 (CVE-2025-59375)", "name": "clair_unpatched_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 2 } }, { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: sqlite-3.34.1-9.el9_7 (CVE-2025-52099), libxslt-devel-1.1.34-13.el9_6 (CVE-2023-40403, CVE-2025-10911), python3-3.9.25-3.el9_7 (CVE-2025-4516, CVE-2025-6069, CVE-2025-8291), gdb-headless-16.3-2.el9 (CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245), httpd-core-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), git-core-doc-2.47.3-1.el9_6 (CVE-2025-48386), binutils-gold-2.35.2-67.el9_7.1 (CVE-2021-20197, CVE-2021-45078, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245, CVE-2025-7545, CVE-2025-7546), libX11-common-1.7.0-11.el9 (CVE-2021-31535, CVE-2022-3554), tpm2-tss-3.2.3-1.el9 (CVE-2024-29040), httpd-tools-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), systemd-libs-252-55.el9_7.7 (CVE-2025-4598), mod_ssl-1:2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), qt5-srpm-macros-5.15.9-1.el9 (CVE-2021-38593, CVE-2023-24607, CVE-2025-5683), gdb-gdbserver-16.3-2.el9 (CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245), coreutils-single-8.32-39.el9 (CVE-2025-5278), python3-devel-3.9.25-3.el9_7 (CVE-2025-4516, CVE-2025-6069, CVE-2025-8291), rsync-3.2.5-3.el9 (CVE-2024-12086, CVE-2025-10158), libarchive-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753), tar-2:1.34-9.el9_7 (CVE-2025-45582), bsdtar-3.5.3-6.el9_6 (CVE-2023-30571, CVE-2025-60753), libpq-devel-13.23-1.el9_7 (CVE-2025-4207), python3-pip-wheel-21.3.1-1.el9 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182), libX11-devel-1.7.0-11.el9 (CVE-2021-31535, CVE-2022-3554), git-2.47.3-1.el9_6 (CVE-2025-48386), curl-minimal-7.76.1-35.el9_7.3 (CVE-2025-10966, CVE-2025-9086), libtiff-devel-4.4.0-15.el9_7.2 (CVE-2017-17973, CVE-2023-25433, CVE-2023-25434, CVE-2023-25435, CVE-2023-3164, CVE-2023-6277, CVE-2025-8851), httpd-filesystem-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), python3-libs-3.9.25-3.el9_7 (CVE-2025-4516, CVE-2025-6069, CVE-2025-8291), systemd-pam-252-55.el9_7.7 (CVE-2025-4598), libX11-1.7.0-11.el9 (CVE-2021-31535, CVE-2022-3554), mod_session-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), binutils-2.35.2-67.el9_7.1 (CVE-2021-20197, CVE-2021-45078, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245, CVE-2025-7545, CVE-2025-7546), libcurl-minimal-7.76.1-35.el9_7.3 (CVE-2025-10966, CVE-2025-9086), go-srpm-macros-3.6.0-12.el9_7 (CVE-2024-8244), vim-filesystem-2:8.2.2637-23.el9_7 (CVE-2025-29768, CVE-2025-9390), libxml2-2.9.13-14.el9_7 (CVE-2025-9714), libcurl-devel-7.76.1-35.el9_7.3 (CVE-2025-10966, CVE-2025-9086), gdb-16.3-2.el9 (CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-5245), sqlite-libs-3.34.1-9.el9_7 (CVE-2025-52099), sqlite-devel-3.34.1-9.el9_7 (CVE-2025-52099), libxslt-1.1.34-13.el9_6 (CVE-2023-40403, CVE-2025-10911), mod_lua-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), lz4-libs-1.9.3-5.el9 (CVE-2025-62813), wget-1.21.1-8.el9_4 (CVE-2021-31879, CVE-2024-10524), mod_ldap-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), httpd-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020), libxml2-devel-2.9.13-14.el9_7 (CVE-2025-9714), vim-minimal-2:8.2.2637-23.el9_7 (CVE-2025-29768, CVE-2025-9390), perl-Git-2.47.3-1.el9_6 (CVE-2025-48386), git-core-2.47.3-1.el9_6 (CVE-2025-48386), openssh-clients-8.7p1-47.el9_7 (CVE-2023-51767, CVE-2025-32728, CVE-2025-61984, CVE-2025-61985), libtiff-4.4.0-15.el9_7.2 (CVE-2017-17973, CVE-2023-25433, CVE-2023-25434, CVE-2023-25435, CVE-2023-3164, CVE-2023-6277, CVE-2025-8851), libpq-13.23-1.el9_7 (CVE-2025-4207), systemd-252-55.el9_7.7 (CVE-2025-4598), python3-pip-21.3.1-1.el9 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182), systemd-rpm-macros-252-55.el9_7.7 (CVE-2025-4598), libX11-xcb-1.7.0-11.el9 (CVE-2021-31535, CVE-2022-3554), openssh-8.7p1-47.el9_7 (CVE-2023-51767, CVE-2025-32728, CVE-2025-61984, CVE-2025-61985), httpd-devel-2.4.62-7.el9_7.3 (CVE-2024-42516, CVE-2024-43204, CVE-2025-53020)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 145 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: pkgconf-pkg-config-1.7.3-10.el9 (CVE-2023-24056), sqlite-3.34.1-9.el9_7 (CVE-2024-0232), libxslt-devel-1.1.34-13.el9_6 (CVE-2025-11731), emacs-filesystem-1:27.2-18.el9 (CVE-2017-1000383), gcc-gfortran-11.5.0-11.el9 (CVE-2022-27943), python3-3.9.25-3.el9_7 (CVE-2025-1795, CVE-2025-6075), gdb-headless-16.3-2.el9 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198), binutils-gold-2.35.2-67.el9_7.1 (CVE-2021-3826, CVE-2022-38533, CVE-2022-44840, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2023-1972, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198), elfutils-default-yama-scope-0.193-1.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), libX11-common-1.7.0-11.el9 (CVE-2022-3555), libstdc++-devel-11.5.0-11.el9 (CVE-2022-27943), pcre2-utf32-10.40-6.el9 (CVE-2022-41409), pcre2-devel-10.40-6.el9 (CVE-2022-41409), cpp-11.5.0-11.el9 (CVE-2022-27943), gcc-plugin-annobin-11.5.0-11.el9 (CVE-2022-27943), ncurses-6.2-12.20210508.el9 (CVE-2023-50495), qt5-srpm-macros-5.15.9-1.el9 (CVE-2025-23050), openssl-devel-1:3.5.1-7.el9_7 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232), elfutils-libelf-0.193-1.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), gdb-gdbserver-16.3-2.el9 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198), gnupg2-2.3.3-5.el9_7 (CVE-2022-3219, CVE-2025-30258), ncurses-libs-6.2-12.20210508.el9 (CVE-2023-50495), elfutils-libs-0.193-1.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), python3-devel-3.9.25-3.el9_7 (CVE-2025-1795, CVE-2025-6075), libarchive-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), tar-2:1.34-9.el9_7 (CVE-2023-39804), bsdtar-3.5.3-6.el9_6 (CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), libgfortran-11.5.0-11.el9 (CVE-2022-27943), python3-pip-wheel-21.3.1-1.el9 (CVE-2021-3572), libX11-devel-1.7.0-11.el9 (CVE-2022-3555), patch-2.7.6-16.el9 (CVE-2021-45261), libpng-2:1.6.37-12.el9_7.1 (CVE-2022-3857), curl-minimal-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), libpng-devel-2:1.6.37-12.el9_7.1 (CVE-2022-3857), libtiff-devel-4.4.0-15.el9_7.2 (CVE-2017-16232, CVE-2022-1056, CVE-2023-1916, CVE-2024-13978, CVE-2025-8961, CVE-2025-9165), python3-libs-3.9.25-3.el9_7 (CVE-2025-1795, CVE-2025-6075), cmake-filesystem-3.26.5-3.el9_7 (CVE-2025-9301), libX11-1.7.0-11.el9 (CVE-2022-3555), glib2-2.68.4-18.el9_7.1 (CVE-2023-32636, CVE-2025-3360), libgomp-11.5.0-11.el9 (CVE-2022-27943), binutils-2.35.2-67.el9_7.1 (CVE-2021-3826, CVE-2022-38533, CVE-2022-44840, CVE-2022-47007, CVE-2022-47008, CVE-2022-47010, CVE-2022-47011, CVE-2023-1972, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198), libstdc++-11.5.0-11.el9 (CVE-2022-27943), gcc-c++-11.5.0-11.el9 (CVE-2022-27943), libcurl-minimal-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), pkgconf-1.7.3-10.el9 (CVE-2023-24056), gcc-11.5.0-11.el9 (CVE-2022-27943), gawk-5.1.0-6.el9 (CVE-2023-4156), libquadmath-11.5.0-11.el9 (CVE-2022-27943), libpkgconf-1.7.3-10.el9 (CVE-2023-24056), openssl-libs-1:3.5.1-7.el9_7 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232), vim-filesystem-2:8.2.2637-23.el9_7 (CVE-2021-3927, CVE-2021-3928, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2022-0213, CVE-2022-0351, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-2042, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3352, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-2610, CVE-2023-46246, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4751, CVE-2023-4781, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2024-22667, CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, CVE-2025-26603), libxml2-2.9.13-14.el9_7 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170), libquadmath-devel-11.5.0-11.el9 (CVE-2022-27943), libcurl-devel-7.76.1-35.el9_7.3 (CVE-2024-11053, CVE-2024-7264, CVE-2024-9681), elfutils-debuginfod-client-0.193-1.el9 (CVE-2024-25260, CVE-2025-1371, CVE-2025-1376, CVE-2025-1377), gdb-16.3-2.el9 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198), sqlite-libs-3.34.1-9.el9_7 (CVE-2024-0232), sqlite-devel-3.34.1-9.el9_7 (CVE-2024-0232), libxslt-1.1.34-13.el9_6 (CVE-2025-11731), pcre2-utf16-10.40-6.el9 (CVE-2022-41409), libxml2-devel-2.9.13-14.el9_7 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170), vim-minimal-2:8.2.2637-23.el9_7 (CVE-2021-3927, CVE-2021-3928, CVE-2021-3968, CVE-2021-3973, CVE-2021-3974, CVE-2021-4136, CVE-2021-4166, CVE-2021-4173, CVE-2021-4187, CVE-2022-0213, CVE-2022-0351, CVE-2022-1616, CVE-2022-1619, CVE-2022-1620, CVE-2022-1674, CVE-2022-1720, CVE-2022-1725, CVE-2022-2042, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2304, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2817, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2862, CVE-2022-2874, CVE-2022-2889, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-2982, CVE-2022-3016, CVE-2022-3037, CVE-2022-3099, CVE-2022-3134, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3278, CVE-2022-3296, CVE-2022-3297, CVE-2022-3324, CVE-2022-3352, CVE-2022-3705, CVE-2022-4141, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0051, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-2610, CVE-2023-46246, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4751, CVE-2023-4781, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2024-22667, CVE-2024-41957, CVE-2024-41965, CVE-2024-43374, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, CVE-2025-26603), pcre2-syntax-10.40-6.el9 (CVE-2022-41409), libtiff-4.4.0-15.el9_7.2 (CVE-2017-16232, CVE-2022-1056, CVE-2023-1916, CVE-2024-13978, CVE-2025-8961, CVE-2025-9165), ncurses-base-6.2-12.20210508.el9 (CVE-2023-50495), python3-pip-21.3.1-1.el9 (CVE-2021-3572), libX11-xcb-1.7.0-11.el9 (CVE-2022-3555), pkgconf-m4-1.7.3-10.el9 (CVE-2023-24056), libgcc-11.5.0-11.el9 (CVE-2022-27943), glib2-devel-2.68.4-18.el9_7.1 (CVE-2023-32636, CVE-2025-3360), unzip-6.0-59.el9 (CVE-2021-4217, CVE-2022-0529, CVE-2022-0530), pcre2-10.40-6.el9 (CVE-2022-41409), openssl-1:3.5.1-7.el9_7 (CVE-2024-13176, CVE-2024-41996, CVE-2025-9232)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 426 } } ] } ] {"vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":2,"medium":145,"low":426,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/group-fixh/python-component-jyvzxa:on-pr-a046a5060cbec42958d35eaed9d2eac0e41b9c4e", "digests": ["sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb"]}} {"result":"SUCCESS","timestamp":"2026-02-16T12:07:29+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}