Hi Rob,

Thanks for the info and is appreciated.

I am using the image quay.io/coreos/clair:v2.0.9 which I assumed is the 
official images, but perhaps not?

Will await the newest image in any case.

Regards and thanks again,
Brent


On Friday, October 18, 2019 at 3:10:24 PM UTC-3, Brent Borovan wrote:
>
> Hello,
>
> I recently installed the latest version of Clair (v2.0.9) as a new Docker 
> image and ran a Clair scan on this image using klar with a "High" 
> threshold. Klar return an outstanding security issue which ironically is 
> not patched.
>
> Here is the reported issue:
> Analysing 9 layers
> Got results from Clair API v1
> Found 1 vulnerabilities
> High: 1
>
> CVE-2019-14697: [High] 
> Found in: musl [1.1.20-r3]
> Fixed By: 1.1.20-r5
>
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14697
>
>
> Are there plans to patch this soon and if not does anyone know the 
> recommended way to resolve this?
>
> Thanks in advance,
> Brent 
>

-- 
You received this message because you are subscribed to the Google Groups 
"CoreOS Dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/coreos-dev/7f085602-47e6-487f-93f9-8e13cefaf8d5%40googlegroups.com.

Reply via email to