ThreatPlaybook
ThreatPlaybook copied to clipboard
[Snyk] Security upgrade ubuntu from 16.04 to xenial-20201014
This PR was automatically created by Snyk using the credentials of a real user.

Snyk has created this PR to fix 2 vulnerabilities in the dockerfile dependencies of this project.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Snyk changed the following file(s):
-
nginx/Dockerfile
We recommend upgrading to ubuntu:xenial-20201014
, as this image has only 91 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.
Vulnerabilities that will be fixed with an upgrade:
Issue | Score | |
---|---|---|
![]() |
Allocation of Resources Without Limits or Throttling SNYK-UBUNTU1604-SYSTEMD-1320131 |
614 |
![]() |
Allocation of Resources Without Limits or Throttling SNYK-UBUNTU1604-SYSTEMD-1320131 |
614 |
![]() |
Allocation of Resources Without Limits or Throttling SNYK-UBUNTU1604-SYSTEMD-1320131 |
614 |
![]() |
Allocation of Resources Without Limits or Throttling SNYK-UBUNTU1604-SYSTEMD-1320131 |
614 |
![]() |
Improper Check for Dropped Privileges SNYK-UBUNTU1604-BASH-542609 |
536 |
[!IMPORTANT]
- Check the changes in this PR to ensure they won't cause issues with your project.
- Max score is 1000. Note that the real score may have changed since the PR was raised.
- This PR was automatically created by Snyk using the credentials of a real user.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons: