-
-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20 #9300
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-UPSTREAM-NODE-7430900 - https://snyk.io/vuln/SNYK-UPSTREAM-NODE-7430905 - https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-7895537 - https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-7895537 - https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-7413532
I will reformat the title to use the proper commit message syntax. |
parse-github-assistant
bot
changed the title
[Snyk] Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Sep 8, 2024
Thanks for opening this pull request!
|
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## alpha #9300 +/- ##
=======================================
Coverage 93.48% 93.48%
=======================================
Files 186 186
Lines 14811 14812 +1
=======================================
+ Hits 13846 13847 +1
Misses 965 965 ☔ View full report in Codecov by Sentry. |
mtrezza
changed the title
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
fix: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Sep 26, 2024
mtrezza
changed the title
fix: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Oct 15, 2024
mtrezza
changed the title
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
fix: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Oct 15, 2024
parseplatformorg
pushed a commit
that referenced
this pull request
Oct 22, 2024
# [7.4.0-alpha.5](7.4.0-alpha.4...7.4.0-alpha.5) (2024-10-22) ### Bug Fixes * Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20 ([#9300](#9300)) ([15bb17d](15bb17d))
🎉 This change has been released in version 7.4.0-alpha.5 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix 4 vulnerabilities in the dockerfile dependencies of this project.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Snyk changed the following file(s):
Dockerfile
We recommend upgrading to
node:20.17.0-alpine3.20
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Vulnerabilities that will be fixed with an upgrade:
SNYK-UPSTREAM-NODE-7430900
SNYK-UPSTREAM-NODE-7430905
SNYK-ALPINE320-OPENSSL-7895537
SNYK-ALPINE320-OPENSSL-7895537
SNYK-ALPINE320-OPENSSL-7413532
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Improper Control of Generation of Code ('Code Injection')
🦉 Access Restriction Bypass
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"node","from":"20.14.0-alpine3.20","to":"20.17.0-alpine3.20"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-UPSTREAM-NODE-7430900","priority_score":514,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"medium","score":300},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Control of Generation of Code ('Code Injection')"},{"exploit_maturity":"No Known Exploit","id":"SNYK-UPSTREAM-NODE-7430905","priority_score":514,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"medium","score":300},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-ALPINE320-OPENSSL-7895537","priority_score":436,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-6119"},{"exploit_maturity":"No Known Exploit","id":"SNYK-ALPINE320-OPENSSL-7895537","priority_score":436,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-6119"},{"exploit_maturity":"No Known Exploit","id":"SNYK-ALPINE320-OPENSSL-7413532","priority_score":364,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-5535"}],"prId":"0f8b3462-55a6-4df4-a416-3224f5836b57","prPublicId":"0f8b3462-55a6-4df4-a416-3224f5836b57","packageManager":"dockerfile","priorityScoreList":[514,514,436,364],"projectPublicId":"97d4a509-c0e9-4e42-b828-e68d99a21012","projectUrl":"https://app.snyk.io/org/acinader/project/97d4a509-c0e9-4e42-b828-e68d99a21012?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-ALPINE320-OPENSSL-7413532","SNYK-ALPINE320-OPENSSL-7895537","SNYK-ALPINE320-OPENSSL-7895537","SNYK-UPSTREAM-NODE-7430900","SNYK-UPSTREAM-NODE-7430905"],"vulns":["SNYK-UPSTREAM-NODE-7430900","SNYK-UPSTREAM-NODE-7430905","SNYK-ALPINE320-OPENSSL-7895537","SNYK-ALPINE320-OPENSSL-7413532"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'