[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 8, "warnings": [ { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: python3-libs-3.6.8-73.el8_10 (CVE-2025-0938, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291), libzstd-1.4.4-1.el8 (CVE-2022-4899), libarchive-3.3.3-6.el8_10 (CVE-2024-57970, CVE-2025-25724, CVE-2025-60753), libgcrypt-1.8.5-7.el8_6 (CVE-2019-12904, CVE-2024-2236), openssl-libs-1:1.1.1k-14.el8_10 (CVE-2023-0466, CVE-2025-9230), curl-7.61.1-34.el8_10.9 (CVE-2025-10966, CVE-2025-9086), libxml2-2.9.7-21.el8_10.3 (CVE-2025-9714), elfutils-libelf-0.190-2.el8 (CVE-2021-33294), libcurl-7.61.1-34.el8_10.9 (CVE-2025-10966, CVE-2025-9086), avahi-libs-0.7-27.el8_10.1 (CVE-2024-52615, CVE-2024-52616), lz4-libs-1.8.3-5.el8_10 (CVE-2025-62813), systemd-libs-239-82.el8_10.13 (CVE-2018-20839, CVE-2025-4598), expat-2.5.0-1.el8_10 (CVE-2024-28757), tar-2:1.30-11.el8_10 (CVE-2025-45582), cups-libs-1:2.2.6-66.el8_10 (CVE-2023-4504), coreutils-single-8.30-16.el8_10 (CVE-2025-5278), file-libs-5.33-27.el8_10 (CVE-2019-8905), ncurses-base-6.1-10.20180224.el8 (CVE-2018-19217), python3-pip-wheel-9.0.3-24.el8 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182), ncurses-libs-6.1-10.20180224.el8 (CVE-2018-19217), sqlite-libs-3.26.0-20.el8_10 (CVE-2025-52099), platform-python-3.6.8-73.el8_10 (CVE-2025-0938, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291), libssh-config-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-5987, CVE-2025-8114), libssh-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-5987, CVE-2025-8114)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 44 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: gnutls-3.6.16-8.el8_10.4 (CVE-2021-4209), nss-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), nss-sysinit-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), python3-libs-3.6.8-73.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075), libzstd-1.4.4-1.el8 (CVE-2021-24032), shadow-utils-2:4.6-23.el8_10 (CVE-2024-56433), nss-util-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), libgcc-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), libarchive-3.3.3-6.el8_10 (CVE-2018-1000879, CVE-2018-1000880, CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), openssl-libs-1:1.1.1k-14.el8_10 (CVE-2023-0464, CVE-2023-0465, CVE-2023-2650, CVE-2024-0727, CVE-2024-13176, CVE-2024-2511, CVE-2024-41996, CVE-2024-4741), curl-7.61.1-34.el8_10.9 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264), glib2-2.56.4-168.el8_10 (CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32665, CVE-2025-3360), libxml2-2.9.7-21.el8_10.3 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170), elfutils-libelf-0.190-2.el8 (CVE-2024-25260), libcurl-7.61.1-34.el8_10.9 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264), avahi-libs-0.7-27.el8_10.1 (CVE-2017-6519), nss-softokn-freebl-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), libtasn1-4.13-5.el8_10 (CVE-2018-1000654), dbus-libs-1:1.12.8-27.el8_10 (CVE-2020-35512), systemd-libs-239-82.el8_10.13 (CVE-2021-3997), gnupg2-2.2.20-4.el8_10 (CVE-2022-3219, CVE-2025-30258), gawk-4.2.1-4.el8 (CVE-2023-4156), tar-2:1.30-11.el8_10 (CVE-2019-9923, CVE-2021-20193, CVE-2023-39804), cups-libs-1:2.2.6-66.el8_10 (CVE-2021-25317), pcre2-10.32-3.el8_6 (CVE-2022-41409), file-libs-5.33-27.el8_10 (CVE-2019-8906), ncurses-base-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), libstdc++-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), python3-pip-wheel-9.0.3-24.el8 (CVE-2018-20225), ncurses-libs-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), sqlite-libs-3.26.0-20.el8_10 (CVE-2019-19244, CVE-2019-9936, CVE-2019-9937, CVE-2024-0232), platform-python-3.6.8-73.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075), libssh-config-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277), nss-softokn-3.112.0-4.el8_10 (CVE-2020-12413, CVE-2024-7531), java-17-openjdk-headless-1:17.0.18.0.8-1.el8 (CVE-2022-3857), libssh-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 101 } } ] } ] {"vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":44,"low":101,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/stat-rep-gvbs/test-component-pac-xmpsqn:on-pr-2b0c8d7837bdf2af251fbb9f403286d48f5b72e1", "digests": ["sha256:0c4ec0869b9f56e1e481e65793b663278a412cb15a13eac037b7f1c3ce9b7e94"]}} {"result":"SUCCESS","timestamp":"2026-02-12T18:18:10+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}