Skip to content
This repository was archived by the owner on May 17, 2024. It is now read-only.

Conversation

@yogaganesha
Copy link

This PR was automatically created by Snyk using the credentials of a real user.


Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Changes included in this PR

  • Dockerfile.riscv

We recommend upgrading to golang:1.20.10, as this image has only 70 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Some of the most important vulnerabilities in your base image include:

Severity Priority Score / 1000 Issue Exploit Maturity
critical severity 714 Integer Overflow or Wraparound
SNYK-DEBIAN11-APR-3261105
No Known Exploit
critical severity 714 Double Free
SNYK-DEBIAN11-CURL-1585150
No Known Exploit
high severity 483 Heap-based Buffer Overflow
SNYK-DEBIAN11-CURL-5955037
Proof of Concept
high severity 483 Heap-based Buffer Overflow
SNYK-DEBIAN11-CURL-5955037
Proof of Concept
high severity 483 Heap-based Buffer Overflow
SNYK-DEBIAN11-CURL-5955037
Proof of Concept

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants