Hi Rob, Thanks for the info and is appreciated.
I am using the image quay.io/coreos/clair:v2.0.9 which I assumed is the official images, but perhaps not? Will await the newest image in any case. Regards and thanks again, Brent On Friday, October 18, 2019 at 3:10:24 PM UTC-3, Brent Borovan wrote: > > Hello, > > I recently installed the latest version of Clair (v2.0.9) as a new Docker > image and ran a Clair scan on this image using klar with a "High" > threshold. Klar return an outstanding security issue which ironically is > not patched. > > Here is the reported issue: > Analysing 9 layers > Got results from Clair API v1 > Found 1 vulnerabilities > High: 1 > > CVE-2019-14697: [High] > Found in: musl [1.1.20-r3] > Fixed By: 1.1.20-r5 > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14697 > > > Are there plans to patch this soon and if not does anyone know the > recommended way to resolve this? > > Thanks in advance, > Brent > -- You received this message because you are subscribed to the Google Groups "CoreOS Dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/coreos-dev/7f085602-47e6-487f-93f9-8e13cefaf8d5%40googlegroups.com.
