cli
cli copied to clipboard
[Snyk] Security upgrade ubuntu from trusty to trusty-20190515
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Changes included in this PR
- vendor/golang.org/x/net/http2/Dockerfile
We recommend upgrading to ubuntu:trusty-20190515, as this image has only 135 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
Some of the most important vulnerabilities in your base image include:
| Severity | Priority Score / 1000 | Issue | Exploit Maturity |
|---|---|---|---|
| 714 | NULL Pointer Dereference SNYK-UBUNTU1404-OPENSSL-1049144 |
No Known Exploit | |
| 886 | Off-by-one Error SNYK-UBUNTU1404-SUDO-1065770 |
Mature | |
| 514 | Arbitrary Command Injection SNYK-UBUNTU1404-SUDO-406981 |
No Known Exploit | |
| 686 | Improper Handling of Exceptional Conditions SNYK-UBUNTU1404-SUDO-473059 |
Mature | |
| 536 | Out-of-bounds Write SNYK-UBUNTU1404-SUDO-546522 |
Mature |
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
- :x: - Snyk bot The commit (a0961c196bc94a19d3e7f5b14144ba7b3f229be1) is not authorized under a signed CLA. Please click here to be authorized. For further assistance with EasyCLA, please submit a support request ticket.
We have created an issue in Pivotal Tracker to manage this:
https://www.pivotaltracker.com/story/show/178169871
The labels on this github issue will be updated when the story is started.