Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade python from 3.12.3-alpine to 3.13.0rc1-alpine #224

Closed

Conversation

anselmbradford
Copy link
Member

snyk-top-banner

Snyk has created this PR to fix 5 vulnerabilities in the dockerfile dependencies of this project.

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Snyk changed the following file(s):

  • Dockerfile.mac_chip

We recommend upgrading to python:3.13.0rc1-alpine, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
critical severity Integer Overflow or Wraparound
SNYK-ALPINE320-EXPAT-7908298
  786  
critical severity Integer Overflow or Wraparound
SNYK-ALPINE320-EXPAT-7908299
  786  
critical severity XML External Entity (XXE) Injection
SNYK-ALPINE320-EXPAT-7908300
  786  
medium severity Use After Free
SNYK-ALPINE320-BUSYBOX-7233533
  514  
medium severity Use After Free
SNYK-ALPINE320-BUSYBOX-7233586
  514  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection
🦉 Use After Free

Copy link

github-actions bot commented Sep 8, 2024

Coverage report

This PR does not seem to contain any modification to coverable code.

@jcadam14
Copy link
Contributor

See #205

@jcadam14 jcadam14 closed this Sep 17, 2024
@jcadam14
Copy link
Contributor

@anselmbradford Not sure why this was reopened. We won't be moving to python 3.13 until its official release on Oct 1, and after making sure everything works right (which I can't imagine a minor release wouldn't be still will be testing our baselines with it). And Orc2 is the current release candidate, not Orc1 as this PR requests. So this PR should be rejected as it references a non-official baseline of python to move to and that's something we're just not going to do.

@anselmbradford
Copy link
Member Author

@jcadam14 I have no idea why this is coming from my account, it's an automated Snyk message that is somehow masquerading as me. I'll do some investigating…

@jcadam14 jcadam14 self-assigned this Dec 11, 2024
@jcadam14
Copy link
Contributor

Got rid of Dockerfile.mac_chip to remove snyk errors

@lchen-2101
Copy link
Collaborator

think we can just close this (and other) snyk PRs that relate to the mac chip dockerfile? since the dockerfile removal resolved the issue, and there are no changes

@jcadam14
Copy link
Contributor

think we can just close this (and other) snyk PRs that relate to the mac chip dockerfile? since the dockerfile removal resolved the issue, and there are no changes

When I previously tried closing it,

@jcadam14 jcadam14 closed this Dec 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants