-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Version Bump #277
base: main
Are you sure you want to change the base?
Version Bump #277
Changes from 7 commits
e0e7edd
dd72854
b8925c5
8ce064c
c45d7c5
ad6b636
645ca40
755d58d
cb10e19
defc6c4
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,5 @@ | ||
ARG BASE_IMAGE_BUILDER=node:20.11.1-alpine3.19 | ||
ARG BASE_IMAGE=nginx:1.25-alpine | ||
ARG BASE_IMAGE_BUILDER=node:20.18.0-alpine3.19 | ||
Check notice Code scanning / Trivy openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access Low
Package: libssl3
Installed Version: 3.1.7-r0 Vulnerability CVE-2024-9143 Severity: LOW Fixed Version: 3.1.7-r1 Link: CVE-2024-9143 Check warning Code scanning / Trivy curl: OCSP stapling bypass with GnuTLS Medium
Package: curl
Installed Version: 8.9.1-r1 Vulnerability CVE-2024-8096 Severity: MEDIUM Fixed Version: 8.10.0-r0 Link: CVE-2024-8096 Check warning Code scanning / Trivy curl: OCSP stapling bypass with GnuTLS Medium
Package: libcurl
Installed Version: 8.9.1-r1 Vulnerability CVE-2024-8096 Severity: MEDIUM Fixed Version: 8.10.0-r0 Link: CVE-2024-8096 |
||
ARG BASE_IMAGE=nginx:1.26-alpine | ||
|
||
# Build Stage | ||
FROM $BASE_IMAGE_BUILDER as build | ||
|
Large diffs are not rendered by default.
Check notice
Code scanning / Trivy
openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access Low