Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade python from 3.9-slim to 3.12.0b1-slim #88

Closed

Conversation

mikolajroszak
Copy link
Owner

This PR was automatically created by Snyk using the credentials of a real user.


Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • docker/Dockerfile.python-3.9

We recommend upgrading to python:3.12.0b1-slim, as this image has only 69 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
low severity 150 Access Restriction Bypass
SNYK-DEBIAN12-SHADOW-1559391
No Known Exploit
low severity 150 NULL Pointer Dereference
SNYK-DEBIAN12-SHADOW-3310897
No Known Exploit
low severity 150 Arbitrary Code Injection
SNYK-DEBIAN12-SHADOW-5423923
No Known Exploit
low severity 150 CVE-2023-4641
SNYK-DEBIAN12-SHADOW-5879156
No Known Exploit
low severity 571 CVE-2023-45853
SNYK-DEBIAN12-ZLIB-6008963
No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings


Learn how to fix vulnerabilities with free interactive lessons:

🦉 NULL Pointer Dereference

@secure-code-warrior-for-github

Micro-Learning Topic: Code injection (Detected by phrase)

Matched on "Code Injection"

What is this? (2min video)

Code injection happens when an application insecurely accepts input that is subsequently used in a dynamic code evaluation call. If insufficient validation or sanitisation is performed on the input, specially crafted inputs may be able to alter the syntax of the evaluated code and thus alter execution. In a worst case scenario, an attacker could run arbitrary code in the server context and thus perform almost any action on the application server.

Try a challenge in Secure Code Warrior

Helpful references

@cloudflare-workers-and-pages
Copy link

Deploying with  Cloudflare Pages  Cloudflare Pages

Latest commit: 3846fdd
Status:🚫  Build failed.

View logs

@mikolajroszak
Copy link
Owner Author

version 1.0 Author Mikołaj Roszak
([email protected])
All rights reserved. Protected by Harry Fox Agency
Siedem Małych Truskawek
Mikołaj Roszak
Przedwiośnie 79/12
73-110 Stargard
REGON 383183972
Tel. +48 500 487 977
http://mikolaj.company.site
Konto Lokacyjne Siedem Małych Truskawek w BNP Paribas: 64 1600 1462 1855 3951 1000 0001
KOD BIC/SWIFT Banku: PPABPLPKXXX
Kapitał założycielski 5 000 000.00 zł. Wpłaciłem w całości.

Me - founder of Cyfrowe ID' startup.

Investor of EquityZen and AngelList.
Member of Nike' .SWOOSH.
I'm the owner of Krabowe Skorupki' platform.
Registered Investment Advisor (RIA), Cash Investments, Developed International Markets.
Dane konta Revolut
IBAN: LT41 3250 0894 7676 6825
BIC: REVOLT21
Konto (tylko przelewy krajowe): 2029 1000 0600 0000 0003 1339 92
Odbiorca: Mikołaj Roszak
Adres odbiorcy: Przedwiośnie, 79/12, 73-110, Stargard, PL

@mikolajroszak mikolajroszak added the enhancement New feature or request label Oct 22, 2023
@mikolajroszak mikolajroszak added this to the MIKOŁAJ ROSZAK milestone Oct 22, 2023
@mikolajroszak mikolajroszak self-assigned this Oct 22, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Development

Successfully merging this pull request may close these issues.

2 participants