This repository has been archived by the owner on Jun 22, 2023. It is now read-only.
[Snyk] Security upgrade node from 14.18.0-alpine3.12 to 14.18.1-alpine3.12 #253
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Changes included in this PR
We recommend upgrading to
node:14.18.1-alpine3.12
, as this image has only 4 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Some of the most important vulnerabilities in your base image include:
SNYK-ALPINE312-BUSYBOX-2440610
SNYK-ALPINE312-BUSYBOX-2440610
SNYK-ALPINE312-OPENSSL-2426332
SNYK-ALPINE312-OPENSSL-2426332
SNYK-ALPINE312-ZLIB-2434421
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:![](https://camo.githubusercontent.com/7dcc16b1b5c293a61e21b4afb7b06bc7c38783fb9adf398094dde34af1d46053/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f6949344d5463345a444e6a4d6931695932517a4c54517a5a6d457459544d774e4330304e7a677859575135597a4a694f4459694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496a67784e7a686b4d324d794c574a6a5a444d744e444e6d595331684d7a41304c5451334f4446685a446c6a4d6d49344e694a3966513d3d)
🧐 View latest project report
🛠 Adjust project settings
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.