Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Security upgrade ubuntu from 22.04 to 22.10 #3140

Closed
wants to merge 1 commit into from

Conversation

ljharb
Copy link
Member

@ljharb ljharb commented Jul 4, 2023

This PR was automatically created by Snyk using the credentials of a real user.


Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • Dockerfile

We recommend upgrading to ubuntu:22.10, as this image has only 10 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Issue Exploit Maturity
low severity Memory Leak
SNYK-UBUNTU2204-LIBCAP2-5538282
No Known Exploit
medium severity Integer Overflow or Wraparound
SNYK-UBUNTU2204-LIBCAP2-5538296
No Known Exploit
low severity Uncontrolled Recursion
SNYK-UBUNTU2204-PCRE3-2799820
No Known Exploit
low severity Arbitrary Code Injection
SNYK-UBUNTU2204-SHADOW-5425688
No Known Exploit
low severity Arbitrary Code Injection
SNYK-UBUNTU2204-SHADOW-5425688
No Known Exploit

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Memory Leak

Copy link
Collaborator

@PeterDaveHello PeterDaveHello left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't think this is needed.

@ljharb
Copy link
Member Author

ljharb commented Jul 5, 2023

Is there a reason not to do it?

@PeterDaveHello
Copy link
Collaborator

Same reason as #2537, unless we'd like to update this every 6 months, LTS version receives security updates longer enough.

@ljharb
Copy link
Member Author

ljharb commented Jul 5, 2023

#2537 was updating to a dated release; this is updating to a specific version. I think it's valuable to upgrade frequently to actual versions, as long as doing so doesn't decrease which node versions are able to be installed.

@PeterDaveHello
Copy link
Collaborator

I think Ubuntu LTS versions with five years of support is saving us from frequent updates every six months required by non-LTS versions. This reduces the overhead of maintaining the environment. Given our development focus, the efficiency gained from less frequent updates outweighs the benefits of having the latest features, that we don't even needed. Therefore, sticking with LTS for our Docker base image is more beneficial in the long run.

@ljharb
Copy link
Member Author

ljharb commented Jul 6, 2023

ah, 22.04 is LTS but 22.10 isn't? in that case, closing this makes sense.

@ljharb ljharb closed this Jul 6, 2023
@ljharb ljharb deleted the snyk-fix-41bc1dede56178c99c980c649f0036b5 branch July 6, 2023 14:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants