[ { "filename": "/tekton/home/clair-result-amd64.json", "namespace": "required_checks", "successes": 6, "warnings": [ { "msg": "Found packages with unpatched high vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: python3-libs-3.6.8-74.el8_10 (CVE-2026-4519), python3-idna-2.5-7.el8_10 (CVE-2026-4519), python3-pysocks-1.6.8-3.el8 (CVE-2026-4519), python3-requests-2.20.0-6.el8_10 (CVE-2026-4519), python3-urllib3-1.24.2-9.el8_10 (CVE-2026-4519), libnghttp2-1.33.0-6.el8_10.1 (CVE-2026-27135), libarchive-3.3.3-6.el8_10 (CVE-2026-4111, CVE-2026-4424), platform-python-3.6.8-74.el8_10 (CVE-2026-4519), vim-minimal-2:8.0.1763-22.el8_10 (CVE-2026-33412), python3-chardet-3.0.4-7.el8 (CVE-2026-4519)", "name": "clair_unpatched_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 11 } }, { "msg": "Found packages with unpatched medium vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: python3-libs-3.6.8-74.el8_10 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291, CVE-2026-0672, CVE-2026-3644, CVE-2026-4224), glibc-common-2.28-251.el8_10.31 (CVE-2026-4437), python3-idna-2.5-7.el8_10 (CVE-2021-28861, CVE-2022-0391, CVE-2024-3651, CVE-2025-11468, CVE-2025-12084, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2026-0672, CVE-2026-0865, CVE-2026-3644, CVE-2026-4224), libzstd-1.4.4-1.el8 (CVE-2022-4899), python3-pysocks-1.6.8-3.el8 (CVE-2021-28861, CVE-2022-0391, CVE-2025-11468, CVE-2025-12084, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2026-0672, CVE-2026-0865, CVE-2026-3644, CVE-2026-4224), python3-syspurpose-1.28.44-1.el8_10 (CVE-2022-0235), libcurl-7.61.1-34.el8_10.11 (CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), python3-requests-2.20.0-6.el8_10 (CVE-2021-28861, CVE-2022-0391, CVE-2024-35195, CVE-2024-47081, CVE-2025-11468, CVE-2025-12084, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2026-0672, CVE-2026-0865, CVE-2026-3644, CVE-2026-4224), systemd-239-82.el8_10.15 (CVE-2018-20839, CVE-2025-4598, CVE-2026-29111, CVE-2026-4105), expat-2.5.0-1.el8_10 (CVE-2026-32776, CVE-2026-32777, CVE-2026-32778), gnupg2-2.2.20-4.el8_10 (CVE-2025-68972), python3-cloud-what-1.28.44-1.el8_10 (CVE-2022-0235), subscription-manager-1.28.44-1.el8_10 (CVE-2022-0235), python3-urllib3-1.24.2-9.el8_10 (CVE-2021-28861, CVE-2022-0391, CVE-2025-11468, CVE-2025-12084, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2026-0672, CVE-2026-0865, CVE-2026-3644, CVE-2026-4224), tar-2:1.30-11.el8_10 (CVE-2025-45582, CVE-2025-64118, CVE-2026-33056), libssh-config-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-8114, CVE-2026-0964, CVE-2026-0966, CVE-2026-3731), python3-six-1.11.0-8.el8 (CVE-2021-28861), coreutils-single-8.30-17.el8_10 (CVE-2025-5278), openssl-libs-1:1.1.1k-15.el8_6 (CVE-2023-0466), libarchive-3.3.3-6.el8_10 (CVE-2024-57970, CVE-2025-25724, CVE-2025-60753, CVE-2026-4426), platform-python-3.6.8-74.el8_10 (CVE-2025-11468, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2025-4516, CVE-2025-6069, CVE-2025-8291, CVE-2026-0672, CVE-2026-3644, CVE-2026-4224), libxml2-2.9.7-21.el8_10.3 (CVE-2025-9714, CVE-2026-0990, CVE-2026-1757), gdb-gdbserver-8.2-20.el8 (CVE-2025-5245, CVE-2026-3441, CVE-2026-3442, CVE-2026-4647), vim-minimal-2:8.0.1763-22.el8_10 (CVE-2025-29768, CVE-2026-28417, CVE-2026-28418, CVE-2026-28419, CVE-2026-28420, CVE-2026-28421), subscription-manager-rhsm-certificates-20220623-1.el8 (CVE-2022-0235), libssh-0.9.6-16.el8_10 (CVE-2025-5351, CVE-2025-8114, CVE-2026-0964, CVE-2026-0966, CVE-2026-3731), systemd-pam-239-82.el8_10.15 (CVE-2018-20839, CVE-2025-4598, CVE-2026-29111, CVE-2026-4105), systemd-libs-239-82.el8_10.15 (CVE-2018-20839, CVE-2025-4598, CVE-2026-29111, CVE-2026-4105), file-libs-5.33-27.el8_10 (CVE-2019-8905), glibc-2.28-251.el8_10.31 (CVE-2026-4437), glibc-minimal-langpack-2.28-251.el8_10.31 (CVE-2026-4437), python3-pip-wheel-9.0.3-24.el8 (CVE-2023-45803, CVE-2025-50181, CVE-2025-50182), dnf-plugin-subscription-manager-1.28.44-1.el8_10 (CVE-2022-0235), libgcrypt-1.8.5-7.el8_6 (CVE-2019-12904, CVE-2024-2236), openldap-2.4.46-21.el8_10 (CVE-2026-22185), python3-chardet-3.0.4-7.el8 (CVE-2021-28861, CVE-2022-0391, CVE-2025-11468, CVE-2025-12084, CVE-2025-12781, CVE-2025-13837, CVE-2025-15282, CVE-2026-0672, CVE-2026-0865, CVE-2026-3644, CVE-2026-4224), python3-subscription-manager-rhsm-1.28.44-1.el8_10 (CVE-2022-0235), curl-7.61.1-34.el8_10.11 (CVE-2025-14017, CVE-2026-1965, CVE-2026-3783, CVE-2026-3784, CVE-2026-3805), glib2-2.56.4-168.el8_10 (CVE-2025-14087, CVE-2025-14512, CVE-2026-1484, CVE-2026-1489)", "name": "clair_unpatched_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 158 } }, { "msg": "Found packages with unpatched low/negligible vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: python3-libs-3.6.8-74.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), glibc-common-2.28-251.el8_10.31 (CVE-2026-4438), python3-idna-2.5-7.el8_10 (CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), dbus-daemon-1:1.12.8-27.el8_10 (CVE-2020-35512), libzstd-1.4.4-1.el8 (CVE-2021-24032), python3-pysocks-1.6.8-3.el8 (CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), libcurl-7.61.1-34.el8_10.11 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264), python3-requests-2.20.0-6.el8_10 (CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), sqlite-libs-3.26.0-20.el8_10 (CVE-2019-19244, CVE-2019-9936, CVE-2019-9937, CVE-2024-0232, CVE-2025-70873), gawk-4.2.1-4.el8 (CVE-2023-4156), systemd-239-82.el8_10.15 (CVE-2021-3997), expat-2.5.0-1.el8_10 (CVE-2025-66382, CVE-2026-24515), elfutils-default-yama-scope-0.190-2.el8 (CVE-2024-25260), gnupg2-2.2.20-4.el8_10 (CVE-2022-3219, CVE-2025-30258, CVE-2026-24883), pcre2-10.32-3.el8_6 (CVE-2022-41409), libtasn1-4.13-5.el8_10 (CVE-2018-1000654), python3-urllib3-1.24.2-9.el8_10 (CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), tar-2:1.30-11.el8_10 (CVE-2019-9923, CVE-2021-20193, CVE-2023-39804), elfutils-libs-0.190-2.el8 (CVE-2024-25260), libssh-config-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277, CVE-2026-0965, CVE-2026-0967, CVE-2026-0968), dbus-common-1:1.12.8-27.el8_10 (CVE-2020-35512), gnutls-3.6.16-8.el8_10.5 (CVE-2021-4209), openssl-libs-1:1.1.1k-15.el8_6 (CVE-2023-0464, CVE-2023-0465, CVE-2023-2650, CVE-2024-0727, CVE-2024-13176, CVE-2024-2511, CVE-2024-41996, CVE-2024-4741, CVE-2025-15468, CVE-2025-15469, CVE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796, CVE-2026-2673), libarchive-3.3.3-6.el8_10 (CVE-2018-1000879, CVE-2018-1000880, CVE-2025-1632, CVE-2025-5915, CVE-2025-5916, CVE-2025-5917, CVE-2025-5918), dbus-tools-1:1.12.8-27.el8_10 (CVE-2020-35512), ncurses-libs-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), platform-python-3.6.8-74.el8_10 (CVE-2019-9674, CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2025-6075, CVE-2026-2297, CVE-2026-3479), libxml2-2.9.7-21.el8_10.3 (CVE-2023-45322, CVE-2024-34459, CVE-2025-27113, CVE-2025-6170, CVE-2026-0989, CVE-2026-0992), shadow-utils-2:4.6-23.el8_10 (CVE-2024-56433), gdb-gdbserver-8.2-20.el8 (CVE-2022-47007, CVE-2022-47010, CVE-2022-47011, CVE-2024-57360, CVE-2025-11412, CVE-2025-11413, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-1150, CVE-2025-1151, CVE-2025-1152, CVE-2025-1153, CVE-2025-11839, CVE-2025-11840, CVE-2025-3198, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69644, CVE-2025-69645, CVE-2025-69646, CVE-2025-69647, CVE-2025-69648, CVE-2025-69649, CVE-2025-69650, CVE-2025-69651, CVE-2025-69652), vim-minimal-2:8.0.1763-22.el8_10 (CVE-2018-20786, CVE-2020-20703, CVE-2021-3236, CVE-2021-3927, CVE-2021-3974, CVE-2021-4166, CVE-2022-0351, CVE-2022-1619, CVE-2022-1720, CVE-2022-2124, CVE-2022-2125, CVE-2022-2126, CVE-2022-2129, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2206, CVE-2022-2207, CVE-2022-2208, CVE-2022-2210, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2343, CVE-2022-2344, CVE-2022-2345, CVE-2022-2522, CVE-2022-2819, CVE-2022-2845, CVE-2022-2849, CVE-2022-2923, CVE-2022-2946, CVE-2022-2980, CVE-2022-3037, CVE-2022-3153, CVE-2022-3234, CVE-2022-3235, CVE-2022-3256, CVE-2022-3296, CVE-2022-3352, CVE-2022-3705, CVE-2022-4292, CVE-2022-4293, CVE-2023-0049, CVE-2023-0054, CVE-2023-0288, CVE-2023-0433, CVE-2023-0512, CVE-2023-1127, CVE-2023-1170, CVE-2023-1175, CVE-2023-1264, CVE-2023-2609, CVE-2023-2610, CVE-2023-46246, CVE-2023-4733, CVE-2023-4734, CVE-2023-4735, CVE-2023-4738, CVE-2023-4750, CVE-2023-4751, CVE-2023-4752, CVE-2023-4781, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2023-5344, CVE-2023-5441, CVE-2023-5535, CVE-2024-22667, CVE-2024-41965, CVE-2024-43374, CVE-2024-43802, CVE-2024-45306, CVE-2024-47814, CVE-2025-1215, CVE-2025-22134, CVE-2025-24014, CVE-2025-26603, CVE-2026-26269, CVE-2026-28422), ncurses-base-6.1-10.20180224.el8 (CVE-2018-19211, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2021-39537, CVE-2023-50495), libssh-0.9.6-16.el8_10 (CVE-2025-4878, CVE-2025-8277, CVE-2026-0965, CVE-2026-0967, CVE-2026-0968), systemd-pam-239-82.el8_10.15 (CVE-2021-3997), systemd-libs-239-82.el8_10.15 (CVE-2021-3997), file-libs-5.33-27.el8_10 (CVE-2019-8906), glibc-2.28-251.el8_10.31 (CVE-2026-4438), libstdc++-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), glibc-minimal-langpack-2.28-251.el8_10.31 (CVE-2026-4438), python3-pip-wheel-9.0.3-24.el8 (CVE-2018-20225), dbus-1:1.12.8-27.el8_10 (CVE-2020-35512), dbus-libs-1:1.12.8-27.el8_10 (CVE-2020-35512), elfutils-libelf-0.190-2.el8 (CVE-2024-25260), zlib-1.2.11-25.el8 (CVE-2026-27171), libgcc-8.5.0-28.el8_10 (CVE-2018-20657, CVE-2019-14250, CVE-2022-27943), python3-chardet-3.0.4-7.el8 (CVE-2024-0397, CVE-2024-7592, CVE-2025-1795, CVE-2026-2297, CVE-2026-3479), curl-7.61.1-34.el8_10.11 (CVE-2023-27534, CVE-2024-11053, CVE-2024-7264), glib2-2.56.4-168.el8_10 (CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32665, CVE-2025-3360, CVE-2025-7039, CVE-2026-0988, CVE-2026-1485)", "name": "clair_unpatched_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 272 } }, { "msg": "Found packages with unpatched unknown vulnerabilities. These vulnerabilities don't have a known fix at this time.", "metadata": { "details": { "description": "Vulnerabilities found: lz4-libs-1.8.3-5.el8_10 (CVE-2025-62813)", "name": "clair_unpatched_unknown_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 1 } } ] } ] {"vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":11,"medium":158,"low":272,"unknown":1}} {"image": {"pullspec": "quay.io/rhtap_qe/default-tenant/tsf-comp-qthr:1daf92b53b66c6ff3968606bc6496cc8c979bec2", "digests": ["sha256:b0021eb794bde60d52bd6f3f38a7bd6e5de3449c291a1359fb8e32457a87e4ca"]}} {"result":"SUCCESS","timestamp":"2026-03-27T00:05:44+00:00","note":"Task clair-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by Clair.","namespace":"default","successes":0,"failures":0,"warnings":0}