dgroup / docker-unittests

Testing of base docker images during CI/CD process
MIT License
35 stars 4 forks source link

[Snyk] Fix for 6 vulnerabilities #266

Open snyk-bot opened 4 years ago

snyk-bot commented 4 years ago

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Information Exposure
SNYK-JAVA-COMMONSCODEC-561518
com.github.docker-java:docker-java:
3.1.0 -> 3.2.0
No No Known Exploit
medium severity 550/1000
Why? Has a fix available, CVSS 6.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-469234
com.github.docker-java:docker-java:
3.1.0 -> 3.2.0
No No Known Exploit
high severity 600/1000
Why? Has a fix available, CVSS 7.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-543490
com.github.docker-java:docker-java:
3.1.0 -> 3.2.0
No No Known Exploit
high severity 600/1000
Why? Has a fix available, CVSS 7.5
HTTP Request Smuggling
SNYK-JAVA-IONETTY-543669
com.github.docker-java:docker-java:
3.1.0 -> 3.2.0
No No Known Exploit
high severity 624/1000
Why? Has a fix available, CVSS 8.2
Uncontrolled Memory Allocation
SNYK-JAVA-IONETTY-564897
com.github.docker-java:docker-java:
3.1.0 -> 3.2.0
No No Known Exploit
medium severity 440/1000
Why? Has a fix available, CVSS 4.3
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-537645
org.yaml:snakeyaml:
1.19 -> 1.26
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic