-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] Security upgrade node from 12.19.0-buster-slim to 12.22.12-buster-slim #255
base: master
Are you sure you want to change the base?
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-DEBIAN10-APT-1049974 - https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-1085097 - https://snyk.io/vuln/SNYK-DEBIAN10-LIBGCRYPT20-1582894 - https://snyk.io/vuln/SNYK-DEBIAN10-LZ4-1277601 - https://snyk.io/vuln/SNYK-DEBIAN10-ZLIB-2433934
This PR has Quantification details
Why proper sizing of changes matters
Optimal pull request sizes drive a better predictable PR flow as they strike a
What can I do to optimize my changes
How to interpret the change counts in git diff output
Was this comment helpful? 👍 :ok_hand: :thumbsdown: (Email) |
Micro-Learning Topic: Integer overflow (Detected by phrase)Matched on "Integer Overflow"Integer overflow occurs when the result of arithmetic operation is greater than the maximum value the integer data type can store. Try this challenge in Secure Code WarriorMicro-Learning Topic: Use-after-free (Detected by phrase)Matched on "Use After Free"Dereferencing pointers to objects that have already been freed opens the door to execution of arbitrary code. Attackers may be able to insert instructions at the freed memory location in order to trigger the exploit when the pointer is used after the memory has been freed. Try this challenge in Secure Code Warrior |
This PR was automatically created by Snyk using the credentials of a real user.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Changes included in this PR
We recommend upgrading to
node:12.22.12-buster-slim
, as this image has only 73 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Some of the most important vulnerabilities in your base image include:
SNYK-DEBIAN10-APT-1049974
SNYK-DEBIAN10-GNUTLS28-1085097
SNYK-DEBIAN10-LIBGCRYPT20-1582894
SNYK-DEBIAN10-LZ4-1277601
SNYK-DEBIAN10-ZLIB-2433934
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.