-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20 #2593
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-UPSTREAM-NODE-7430900 - https://snyk.io/vuln/SNYK-UPSTREAM-NODE-7430905 - https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-7895537 - https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-7895537 - https://snyk.io/vuln/SNYK-ALPINE320-OPENSSL-7413532
I will reformat the title to use the proper commit message syntax. |
parse-github-assistant
bot
changed the title
[Snyk] Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Sep 8, 2024
Thanks for opening this pull request!
|
Uffizzi Ephemeral Environment
|
mtrezza
changed the title
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
fix: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Sep 26, 2024
mtrezza
changed the title
fix: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20
Oct 7, 2024
🎉 This change has been released in version 6.0.0-alpha.16 |
🎉 This change has been released in version 6.0.0-beta.2 |
🎉 This change has been released in version 6.0.0 |
beiguancyc
pushed a commit
to beiguancyc/parse-dashboard
that referenced
this pull request
Oct 8, 2024
* source: (70 commits) chore(release): 6.0.0 [skip ci] empty chore(release): 6.0.0-beta.2 [skip ci] empty chore(release): 6.0.0-alpha.16 [skip ci] fix: Dashboard not building for Docker platform arm64/v8 (parse-community#2534) refactor: Security upgrade node from 20.14.0-alpine3.20 to 20.17.0-alpine3.20 (parse-community#2593) chore(release): 6.0.0-alpha.15 [skip ci] feat: Add support for Node 22 (parse-community#2603) docs: Add info panel docs to README (parse-community#2601) chore(release): 6.0.0-alpha.14 [skip ci] feat: Add data panel to display object related data fetched via Cloud Function (parse-community#2584) chore(release): 6.0.0-alpha.13 [skip ci] fix: Internal classes `_User`, `_Role`, `_Installation` referenced with pointer don't appear in data browser filter dialog (parse-community#2599) refactor: Bump qs from 6.5.2 to 6.13.0 (parse-community#2595) refactor: Fix for 4 vulnerabilities (parse-community#2594) refactor: Bump webpack from 5.75.0 to 5.94.0 (parse-community#2588) chore(release): 6.0.0-alpha.12 [skip ci] fix: Filter string is erased when changing filter condition (parse-community#2586) refactor: Bump requirejs from 2.3.6 to 2.3.7 (parse-community#2582) ... # Conflicts: # package-lock.json
vardhan0604
pushed a commit
to vardhan0604/parse-dashboard
that referenced
this pull request
Oct 22, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
state:released
Released as stable version
state:released-alpha
Released as alpha version
state:released-beta
Released as beta version
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix 4 vulnerabilities in the dockerfile dependencies of this project.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Snyk changed the following file(s):
Dockerfile
We recommend upgrading to
node:20.17.0-alpine3.20
, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Vulnerabilities that will be fixed with an upgrade:
SNYK-UPSTREAM-NODE-7430900
SNYK-UPSTREAM-NODE-7430905
SNYK-ALPINE320-OPENSSL-7895537
SNYK-ALPINE320-OPENSSL-7895537
SNYK-ALPINE320-OPENSSL-7413532
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Improper Control of Generation of Code ('Code Injection')
🦉 Access Restriction Bypass
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"node","from":"20.14.0-alpine3.20","to":"20.17.0-alpine3.20"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-UPSTREAM-NODE-7430900","priority_score":514,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"medium","score":300},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Improper Control of Generation of Code ('Code Injection')"},{"exploit_maturity":"No Known Exploit","id":"SNYK-UPSTREAM-NODE-7430905","priority_score":514,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"medium","score":300},{"type":"scoreVersion","label":"v1","score":1}],"severity":"medium","title":"Access Restriction Bypass"},{"exploit_maturity":"No Known Exploit","id":"SNYK-ALPINE320-OPENSSL-7895537","priority_score":436,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-6119"},{"exploit_maturity":"No Known Exploit","id":"SNYK-ALPINE320-OPENSSL-7895537","priority_score":436,"priority_score_factors":[{"type":"freshness","label":true,"score":71},{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-6119"},{"exploit_maturity":"No Known Exploit","id":"SNYK-ALPINE320-OPENSSL-7413532","priority_score":364,"priority_score_factors":[{"type":"fixability","label":true,"score":214},{"type":"severity","label":"low","score":150},{"type":"scoreVersion","label":"v1","score":1}],"severity":"low","title":"CVE-2024-5535"}],"prId":"8e7df101-91e5-4aff-8c93-a27caaf7f8b0","prPublicId":"8e7df101-91e5-4aff-8c93-a27caaf7f8b0","packageManager":"dockerfile","priorityScoreList":[514,514,436,364],"projectPublicId":"76260050-4914-442a-8d38-ea36902980ba","projectUrl":"https://app.snyk.io/org/acinader/project/76260050-4914-442a-8d38-ea36902980ba?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-ALPINE320-OPENSSL-7413532","SNYK-ALPINE320-OPENSSL-7895537","SNYK-ALPINE320-OPENSSL-7895537","SNYK-UPSTREAM-NODE-7430900","SNYK-UPSTREAM-NODE-7430905"],"vulns":["SNYK-UPSTREAM-NODE-7430900","SNYK-UPSTREAM-NODE-7430905","SNYK-ALPINE320-OPENSSL-7895537","SNYK-ALPINE320-OPENSSL-7413532"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'