[Snyk] Security upgrade node from 14.1.0 to 14.18.2#41
[Snyk] Security upgrade node from 14.1.0 to 14.18.2#41
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-DEBIAN9-MERCURIAL-311063 - https://snyk.io/vuln/SNYK-DEBIAN9-MERCURIAL-311070 - https://snyk.io/vuln/SNYK-DEBIAN9-MERCURIAL-311113 - https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON27-340070 - https://snyk.io/vuln/SNYK-DEBIAN9-PYTHON27-341379
Micro-Learning Topic: OS command injection (Detected by phrase)Matched on "OS Command Injection"In many situations, applications will rely on OS provided functions, scripts, macros and utilities instead of reimplementing them in code. While functions would typically be accessed through a native interface library, the remaining three OS provided features will normally be invoked via the command line or launched as a process. If unsafe inputs are used to construct commands or arguments, it may allow arbitrary OS operations to be performed that can compromise the server. Try this challenge in Secure Code WarriorMicro-Learning Topic: Directory traversal (Detected by phrase)Matched on "Directory Traversal"Path traversal vulnerabilities occur when inputs that have not been sufficiently validated or sanitised are used to build directory or file paths. If an attacker can influence the path being accessed by the server, they may be able to gain unauthorised access to files or even execute arbitrary code on the server (when coupled with file upload functionality). Try this challenge in Secure Code WarriorMicro-Learning Topic: Integer overflow (Detected by phrase)Matched on "Integer Overflow"Integer overflow occurs when the result of arithmetic operation is greater than the maximum value the integer data type can store. Try this challenge in Secure Code Warrior |
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Changes included in this PR
We recommend upgrading to
node:14.18.2, as this image has only 545 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Some of the most important vulnerabilities in your base image include:
SNYK-DEBIAN9-MERCURIAL-311063
SNYK-DEBIAN9-MERCURIAL-311070
SNYK-DEBIAN9-MERCURIAL-311113
SNYK-DEBIAN9-PYTHON27-340070
SNYK-DEBIAN9-PYTHON27-341379
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
🛠 Adjust project settings