docker-odoo-project
docker-odoo-project copied to clipboard
[Snyk] Security upgrade python from 3.12.4-slim-bookworm to 3.12.5-slim-bookworm
Snyk has created this PR to fix 5 vulnerabilities in the dockerfile dependencies of this project.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Snyk changed the following file(s):
-
16.0/Dockerfile
We recommend upgrading to python:3.12.5-slim-bookworm
, as this image has only 47 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
Vulnerabilities that will be fixed with an upgrade:
Issue | Score | |
---|---|---|
![]() |
Integer Overflow or Wraparound SNYK-DEBIAN12-ZLIB-6008963 |
264 |
![]() |
Integer Overflow or Wraparound SNYK-DEBIAN12-EXPAT-7855502 |
263 |
![]() |
Integer Overflow or Wraparound SNYK-DEBIAN12-EXPAT-7855503 |
263 |
![]() |
XML External Entity (XXE) Injection SNYK-DEBIAN12-EXPAT-7855507 |
263 |
![]() |
Out-of-Bounds SNYK-DEBIAN12-GLIBC-1547196 |
182 |
[!IMPORTANT]
- Check the changes in this PR to ensure they won't cause issues with your project.
- Max score is 1000. Note that the real score may have changed since the PR was raised.
- This PR was automatically created by Snyk using the credentials of a real user.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 XML External Entity (XXE) Injection
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"python","from":"3.12.4-slim-bookworm","to":"3.12.5-slim-bookworm"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-ZLIB-6008963","priority_score":264,"priority_score_factors":[{"name":"confidentiality","value":"high"},{"name":"integrity","value":"high"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00121},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Thu Oct 19 2023 04:21:02 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":false},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"critical"},{"name":"relativePopularityRank","value":0},{"name":"impact","value":9.79},{"name":"likelihood","value":2.69},{"name":"scoreVersion","value":"V5"}],"severity":"critical","title":"Integer Overflow or Wraparound"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-EXPAT-7855502","priority_score":263,"priority_score_factors":[{"name":"confidentiality","value":"high"},{"name":"integrity","value":"high"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00043},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sat Aug 31 2024 00:39:33 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":false},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"critical"},{"name":"relativePopularityRank","value":0},{"name":"impact","value":9.79},{"name":"likelihood","value":2.68},{"name":"scoreVersion","value":"V5"}],"severity":"critical","title":"Integer Overflow or Wraparound"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-EXPAT-7855503","priority_score":263,"priority_score_factors":[{"name":"confidentiality","value":"high"},{"name":"integrity","value":"high"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00043},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sat Aug 31 2024 00:39:35 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":false},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"critical"},{"name":"relativePopularityRank","value":0},{"name":"impact","value":9.79},{"name":"likelihood","value":2.68},{"name":"scoreVersion","value":"V5"}],"severity":"critical","title":"Integer Overflow or Wraparound"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-EXPAT-7855507","priority_score":263,"priority_score_factors":[{"name":"confidentiality","value":"high"},{"name":"integrity","value":"high"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00043},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sat Aug 31 2024 00:39:47 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":false},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"critical"},{"name":"relativePopularityRank","value":0},{"name":"impact","value":9.79},{"name":"likelihood","value":2.68},{"name":"scoreVersion","value":"V5"}],"severity":"critical","title":"XML External Entity (XXE) Injection"},{"exploit_maturity":"No Known Exploit","id":"SNYK-DEBIAN12-GLIBC-1547196","priority_score":182,"priority_score_factors":[{"name":"confidentiality","value":"high"},{"name":"integrity","value":"high"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00414},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Wed Jul 24 2019 09:33:32 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":false},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"low"},{"name":"relativePopularityRank","value":0},{"name":"impact","value":6.06},{"name":"likelihood","value":2.99},{"name":"scoreVersion","value":"V5"}],"severity":"low","title":"Out-of-Bounds"}],"prId":"ae05cb44-97aa-4fd7-ada9-c8f33b4c475f","prPublicId":"ae05cb44-97aa-4fd7-ada9-c8f33b4c475f","packageManager":"dockerfile","priorityScoreList":[264,263,263,263,182],"projectPublicId":"fe664d06-c2f4-4908-a97d-307fcdfa75c0","projectUrl":"https://app.snyk.io/org/camptocamp/project/fe664d06-c2f4-4908-a97d-307fcdfa75c0?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-DEBIAN12-EXPAT-7855502","SNYK-DEBIAN12-EXPAT-7855503","SNYK-DEBIAN12-EXPAT-7855507","SNYK-DEBIAN12-GLIBC-1547196","SNYK-DEBIAN12-ZLIB-6008963"],"vulns":["SNYK-DEBIAN12-ZLIB-6008963","SNYK-DEBIAN12-EXPAT-7855502","SNYK-DEBIAN12-EXPAT-7855503","SNYK-DEBIAN12-EXPAT-7855507","SNYK-DEBIAN12-GLIBC-1547196"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'