-
Notifications
You must be signed in to change notification settings - Fork 34
Commit 5f56da2
authored
chore: security upgrade nginx from 1.21-alpine to 1.29.0-alpine (#1938)

### Snyk has created this PR to fix 5 vulnerabilities in the dockerfile
dependencies of this project.
Keeping your Docker base image up-to-date means you’ll benefit from
security fixes in the latest version of your chosen image.
#### Snyk changed the following file(s):
- `CI/to_be_deleted/ESS/Dockerfile`
We recommend upgrading to `nginx:1.29.0-alpine`, as this image has only
**1** known vulnerabilities. To do this, merge this pull request, then
verify your application still works as expected.
#### Vulnerabilities that will be fixed with an upgrade:
| | Issue | Score |
:-------------------------:|:-------------------------|:-------------------------
 | Out-of-bounds Write
<br/>[SNYK-ALPINE315-LIBWEBP-5902238](https://snyk.io/vuln/SNYK-ALPINE315-LIBWEBP-5902238)
| **829**
 | CVE-2023-44487
<br/>[SNYK-ALPINE315-NGHTTP2-5964211](https://snyk.io/vuln/SNYK-ALPINE315-NGHTTP2-5964211)
| **829**
 | Out-of-bounds Write
<br/>[SNYK-ALPINE315-CURL-5958915](https://snyk.io/vuln/SNYK-ALPINE315-CURL-5958915)
| **714**
 | Out-of-bounds Read
<br/>[SNYK-ALPINE315-PCRE2-2869383](https://snyk.io/vuln/SNYK-ALPINE315-PCRE2-2869383)
| **714**
 | Out-of-bounds Read
<br/>[SNYK-ALPINE315-PCRE2-2869384](https://snyk.io/vuln/SNYK-ALPINE315-PCRE2-2869384)
| **714**
---
> [!IMPORTANT]
>
> - Check the changes in this PR to ensure they won't cause issues with
your project.
> - Max score is 1000. Note that the real score may have changed since
the PR was raised.
> - This PR was automatically created by Snyk using the credentials of a
real user.
---
**Note:** _You are seeing this because you or someone else with access
to this repository has authorized Snyk to open fix PRs._
For more information: <img
src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiJjNWNlOWI1OC01Y2Y4LTRkNzgtYTRlZS0wOTNhNTA4OGI0NmUiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6ImM1Y2U5YjU4LTVjZjgtNGQ3OC1hNGVlLTA5M2E1MDg4YjQ2ZSJ9fQ=="
width="0" height="0"/>
🧐 [View latest project
report](https://app.snyk.io/org/junjiequan/project/9cbf8588-73cf-4f35-95a2-c5938e479297?utm_source=github&utm_medium=referral&page=fix-pr)
📜 [Customise PR
templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates?utm_source=github&utm_content=fix-pr-template)
🛠 [Adjust project
settings](https://app.snyk.io/org/junjiequan/project/9cbf8588-73cf-4f35-95a2-c5938e479297?utm_source=github&utm_medium=referral&page=fix-pr/settings)
📚 [Read about Snyk's upgrade
logic](https://docs.snyk.io/scan-with-snyk/snyk-open-source/manage-vulnerabilities/upgrade-package-versions-to-fix-vulnerabilities?utm_source=github&utm_content=fix-pr-template)
---
**Learn how to fix vulnerabilities with free interactive lessons:**
🦉 [Learn about vulnerability in an interactive lesson of Snyk
Learn.](https://learn.snyk.io/?loc=fix-pr)
[//]: #
'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"nginx","from":"1.21-alpine","to":"1.29.0-alpine"}],"env":"prod","issuesToFix":["SNYK-ALPINE315-LIBWEBP-5902238","SNYK-ALPINE315-NGHTTP2-5964211","SNYK-ALPINE315-CURL-5958915","SNYK-ALPINE315-PCRE2-2869383","SNYK-ALPINE315-PCRE2-2869384"],"prId":"c5ce9b58-5cf8-4d78-a4ee-093a5088b46e","prPublicId":"c5ce9b58-5cf8-4d78-a4ee-093a5088b46e","packageManager":"dockerfile","priorityScoreList":[829,829,714,714,714],"projectPublicId":"9cbf8588-73cf-4f35-95a2-c5938e479297","projectUrl":"https://app.snyk.io/org/junjiequan/project/9cbf8588-73cf-4f35-95a2-c5938e479297?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-ALPINE315-CURL-5958915","SNYK-ALPINE315-LIBWEBP-5902238","SNYK-ALPINE315-NGHTTP2-5964211","SNYK-ALPINE315-PCRE2-2869383","SNYK-ALPINE315-PCRE2-2869384"],"vulns":["SNYK-ALPINE315-LIBWEBP-5902238","SNYK-ALPINE315-NGHTTP2-5964211","SNYK-ALPINE315-CURL-5958915","SNYK-ALPINE315-PCRE2-2869383","SNYK-ALPINE315-PCRE2-2869384"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'
## Summary by Sourcery
Upgrade the Nginx base image in the ESS Dockerfile from 1.21-alpine to
1.29.0-alpine to resolve multiple security vulnerabilities.
Bug Fixes:
- Address five high and critical severity CVE and out-of-bounds
vulnerabilities by updating the Nginx base image.
Enhancements:
- Bump Nginx version in CI/to_be_deleted/ESS/Dockerfile for better
security posture.1 parent c2575bc commit 5f56da2Copy full SHA for 5f56da2
File tree
Expand file treeCollapse file tree
1 file changed
+1
-1
lines changedFilter options
- CI/to_be_deleted/ESS
Expand file treeCollapse file tree
1 file changed
+1
-1
lines changedCI/to_be_deleted/ESS/Dockerfile
Copy file name to clipboardExpand all lines: CI/to_be_deleted/ESS/Dockerfile+1-1Lines changed: 1 addition & 1 deletion
Original file line number | Diff line number | Diff line change | |
---|---|---|---|
| |||
9 | 9 |
| |
10 | 10 |
| |
11 | 11 |
| |
12 |
| - | |
| 12 | + | |
13 | 13 |
| |
14 | 14 |
| |
15 | 15 |
| |
|
0 commit comments