binbashar / le-docker-leverage-toolbox

Docker image for https://github.com/binbashar/leverage
3 stars 0 forks source link

[Snyk] Security upgrade debian from bullseye-20240211-slim to bullseye-20240701-slim #63

Open binbashdevops opened 2 months ago

binbashdevops commented 2 months ago

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123) ### Snyk has created this PR to fix 3 vulnerabilities in the dockerfile dependencies of this project. Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image. #### Snyk changed the following file(s): - `Dockerfile` We recommend upgrading to `debian:bullseye-20240701-slim`, as this image has only **69** known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected. #### Vulnerabilities that will be fixed with an upgrade: | | Issue | Score | :-------------------------:|:-------------------------|:------------------------- ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png 'critical severity') | Integer Overflow or Wraparound
[SNYK-DEBIAN11-ZLIB-6008961](https://snyk.io/vuln/SNYK-DEBIAN11-ZLIB-6008961) |   **500**   ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Allocation of Resources Without Limits or Throttling
[SNYK-DEBIAN11-SYSTEMD-6277510](https://snyk.io/vuln/SNYK-DEBIAN11-SYSTEMD-6277510) |   **400**   ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Allocation of Resources Without Limits or Throttling
[SNYK-DEBIAN11-SYSTEMD-6277510](https://snyk.io/vuln/SNYK-DEBIAN11-SYSTEMD-6277510) |   **400**   ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png 'low severity') | CVE-2024-28085
[SNYK-DEBIAN11-UTILLINUX-6508632](https://snyk.io/vuln/SNYK-DEBIAN11-UTILLINUX-6508632) |   **364**   ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png 'low severity') | CVE-2024-28085
[SNYK-DEBIAN11-UTILLINUX-6508632](https://snyk.io/vuln/SNYK-DEBIAN11-UTILLINUX-6508632) |   **364**   --- > [!IMPORTANT] > > - Check the changes in this PR to ensure they won't cause issues with your project. > - Max score is 1000. Note that the real score may have changed since the PR was raised. > - This PR was automatically created by Snyk using the credentials of a real user. --- **Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._ For more information: 🧐 [View latest project report](https://app.snyk.io/org/binbashar/project/e76856fa-ef89-4aaf-83c5-cd65f2a56230?utm_source=github&utm_medium=referral&page=fix-pr) 📜 [Customise PR templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates) 🛠 [Adjust project settings](https://app.snyk.io/org/binbashar/project/e76856fa-ef89-4aaf-83c5-cd65f2a56230?utm_source=github&utm_medium=referral&page=fix-pr/settings) 📚 [Read about Snyk's upgrade logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Allocation of Resources Without Limits or Throttling](https://learn.snyk.io/lesson/no-rate-limiting/?loc=fix-pr) [//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"debian","from":"bullseye-20240211-slim","to":"bullseye-20240701-slim"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN11-ZLIB-6008961","priority_score":500,"priority_score_factors":[{"type":"severity","label":"critical","score":500},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Integer Overflow or Wraparound"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN11-SYSTEMD-6277510","priority_score":400,"priority_score_factors":[{"type":"severity","label":"high","score":400},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN11-SYSTEMD-6277510","priority_score":400,"priority_score_factors":[{"type":"severity","label":"high","score":400},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN11-UTILLINUX-6508632","priority_score":364,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-28085"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN11-UTILLINUX-6508632","priority_score":364,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-28085"}],"prId":"c6669bfe-8786-4a75-87e9-8adaebd0af15","prPublicId":"c6669bfe-8786-4a75-87e9-8adaebd0af15","packageManager":"dockerfile","priorityScoreList":[500,400,364],"projectPublicId":"e76856fa-ef89-4aaf-83c5-cd65f2a56230","projectUrl":"https://app.snyk.io/org/binbashar/project/e76856fa-ef89-4aaf-83c5-cd65f2a56230?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-DEBIAN11-SYSTEMD-6277510","SNYK-DEBIAN11-SYSTEMD-6277510","SNYK-DEBIAN11-UTILLINUX-6508632","SNYK-DEBIAN11-UTILLINUX-6508632","SNYK-DEBIAN11-ZLIB-6008961"],"vulns":["SNYK-DEBIAN11-ZLIB-6008961","SNYK-DEBIAN11-SYSTEMD-6277510","SNYK-DEBIAN11-UTILLINUX-6508632"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'