null404org / discord_google_calendar_bot

Discord bot that pushes scheduled events to Google Calendar
GNU General Public License v3.0
2 stars 1 forks source link

[Snyk] Security upgrade python from 3.12-slim to 3.13.0b1-slim #8

Closed snyk-io[bot] closed 2 months ago

snyk-io[bot] commented 2 months ago

This PR was automatically created by Snyk using the credentials of a real user.


![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123) ### Snyk has created this PR to fix 4 vulnerabilities in the dockerfile dependencies of this project. Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image. #### Snyk changed the following file(s): - `Dockerfile` We recommend upgrading to `python:3.13.0b1-slim`, as this image has only **50** known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected. #### Vulnerabilities that will be fixed with an upgrade: | | Issue | Score | :-------------------------:|:-------------------------|:------------------------- ![critical severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/c.png 'critical severity') | Integer Overflow or Wraparound
[SNYK-DEBIAN12-ZLIB-6008963](https://snyk.io/vuln/SNYK-DEBIAN12-ZLIB-6008963) |   **500**   ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Allocation of Resources Without Limits or Throttling
[SNYK-DEBIAN12-SYSTEMD-6277507](https://snyk.io/vuln/SNYK-DEBIAN12-SYSTEMD-6277507) |   **400**   ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Allocation of Resources Without Limits or Throttling
[SNYK-DEBIAN12-SYSTEMD-6277507](https://snyk.io/vuln/SNYK-DEBIAN12-SYSTEMD-6277507) |   **400**   ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png 'low severity') | CVE-2024-26461
[SNYK-DEBIAN12-KRB5-6277411](https://snyk.io/vuln/SNYK-DEBIAN12-KRB5-6277411) |   **150**   ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png 'low severity') | CVE-2024-26458
[SNYK-DEBIAN12-KRB5-6277412](https://snyk.io/vuln/SNYK-DEBIAN12-KRB5-6277412) |   **150**   --- > [!IMPORTANT] > > - Check the changes in this PR to ensure they won't cause issues with your project. > - Max score is 1000. Note that the real score may have changed since the PR was raised. > - This PR was automatically created by Snyk using the credentials of a real user. --- **Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._ For more information: 🧐 [View latest project report](https://app.snyk.io/org/s1nack-dev/project/fa689316-0678-48c6-96c0-ff8e48505bc1?utm_source=github-cloud-app&utm_medium=referral&page=fix-pr) 📜 [Customise PR templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates) 🛠 [Adjust project settings](https://app.snyk.io/org/s1nack-dev/project/fa689316-0678-48c6-96c0-ff8e48505bc1?utm_source=github-cloud-app&utm_medium=referral&page=fix-pr/settings) 📚 [Read about Snyk's upgrade logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) --- **Learn how to fix vulnerabilities with free interactive lessons:** 🦉 [Allocation of Resources Without Limits or Throttling](https://learn.snyk.io/lesson/no-rate-limiting/?loc=fix-pr) [//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"python","from":"3.12-slim","to":"3.13.0b1-slim"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-ZLIB-6008963","priority_score":500,"priority_score_factors":[{"type":"severity","label":"critical","score":500},{"type":"scoreVersion","label":"v1","score":1}],"severity":"critical","title":"Integer Overflow or Wraparound"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-SYSTEMD-6277507","priority_score":400,"priority_score_factors":[{"type":"severity","label":"high","score":400},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-SYSTEMD-6277507","priority_score":400,"priority_score_factors":[{"type":"severity","label":"high","score":400},{"type":"scoreVersion","label":"v1","score":1}],"severity":"high","title":"Allocation of Resources Without Limits or Throttling"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-KRB5-6277411","priority_score":150,"priority_score_factors":[{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-26461"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-KRB5-6277412","priority_score":150,"priority_score_factors":[{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-26458"}],"prId":"0975ba01-e7c3-4726-b9b6-608240532116","prPublicId":"0975ba01-e7c3-4726-b9b6-608240532116","packageManager":"dockerfile","priorityScoreList":[500,400,150,150],"projectPublicId":"fa689316-0678-48c6-96c0-ff8e48505bc1","projectUrl":"https://app.snyk.io/org/s1nack-dev/project/fa689316-0678-48c6-96c0-ff8e48505bc1?utm_source=github-cloud-app&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"user-initiated","upgrade":["SNYK-DEBIAN12-KRB5-6277411","SNYK-DEBIAN12-KRB5-6277412","SNYK-DEBIAN12-SYSTEMD-6277507","SNYK-DEBIAN12-SYSTEMD-6277507","SNYK-DEBIAN12-ZLIB-6008963"],"vulns":["SNYK-DEBIAN12-ZLIB-6008963","SNYK-DEBIAN12-SYSTEMD-6277507","SNYK-DEBIAN12-KRB5-6277411","SNYK-DEBIAN12-KRB5-6277412"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'