Skip to content

Conversation

@riddopic
Copy link
Owner

snyk-top-banner

Snyk has created this PR to fix 5 vulnerabilities in the dockerfile dependencies of this project.

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Snyk changed the following file(s):

  • images/basic/ruby/Dockerfile

We recommend upgrading to ruby:3.4.3, as this image has only 190 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
critical severity Interpretation Conflict
SNYK-DEBIAN12-WGET-7266538
  714  
high severity CVE-2023-49462
SNYK-DEBIAN12-LIBHEIF-6105360
  614  
high severity Out-of-bounds Read
SNYK-DEBIAN12-LIBHEIF-8224949
  614  
high severity Inefficient Regular Expression Complexity
SNYK-DEBIAN12-PYTHON311-7707942
  614  
high severity Arbitrary Command Injection
SNYK-DEBIAN12-PYTHON311-8305721
  614  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Arbitrary Command Injection
🦉 Inefficient Regular Expression Complexity

@github-actions
Copy link

A friendly reminder that this PR had no activity for 120 days.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants