-
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] Security upgrade tensorflow/tensorflow from latest to 2.18.0rc1 #395
base: master
Are you sure you want to change the base?
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-UBUNTU2204-PYTHON310-7577352 - https://snyk.io/vuln/SNYK-UBUNTU2204-PYTHON310-7830061 - https://snyk.io/vuln/SNYK-UBUNTU2204-PYTHON310-7922967 - https://snyk.io/vuln/SNYK-UBUNTU2204-SETUPTOOLS-7459751 - https://snyk.io/vuln/SNYK-UBUNTU2204-SETUPTOOLS-7459751
Current Aviator status
This pull request is currently open (not queued). How to mergeTo merge this PR, comment
See the real-time status of this PR on the
Aviator webapp.
Use the Aviator Chrome Extension
to see the status of your PR within GitHub.
|
Micro-Learning Topic: Code injection (Detected by phrase)Matched on "Code Injection"Code injection happens when an application insecurely accepts input that is subsequently used in a dynamic code evaluation call. If insufficient validation or sanitisation is performed on the input, specially crafted inputs may be able to alter the syntax of the evaluated code and thus alter execution. In a worst case scenario, an attacker could run arbitrary code in the server context and thus perform almost any action on the application server. Try a challenge in Secure Code WarriorHelpful references
Micro-Learning Topic: Inefficient regular expression (Detected by phrase)Matched on "Inefficient Regular Expression"A regular expression that requires exponential time to match certain inputs can be a performance bottleneck, and may be vulnerable to denial-of-service attacks. Try a challenge in Secure Code Warrior |
Unable to verify url with installation ID |
🧙 Sourcery has finished reviewing your pull request! Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
Hi there! 👋 Thanks for opening a PR. 🎉 To get the most out of Senior Dev, please sign up in our Web App, connect your GitHub account, and add/join your organization AdamOswald. After that, you will receive code reviews beginning on your next opened PR. 🚀 |
View changes in DiffLens |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. It seems to have been created by a bot ('[Snyk]' found in title). We assume it knows what it's doing!
|
Snyk has created this PR to fix 4 vulnerabilities in the dockerfile dependencies of this project.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Snyk changed the following file(s):
Dockerfile.cpu
We recommend upgrading to
tensorflow/tensorflow:2.18.0rc1
, as this image has only 44 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Vulnerabilities that will be fixed with an upgrade:
SNYK-UBUNTU2204-PYTHON310-7577352
SNYK-UBUNTU2204-PYTHON310-7830061
SNYK-UBUNTU2204-PYTHON310-7922967
SNYK-UBUNTU2204-SETUPTOOLS-7459751
SNYK-UBUNTU2204-SETUPTOOLS-7459751
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:![](https://camo.githubusercontent.com/effff8df02cb4041bf384ed17adec62414430625cf903aad90321c5d4770f5bb/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f694a6c4e3245794e47526d4f53316d596a6b344c545135596a6b744f574d344e5330314f574a6a596d55345957566c596a6b694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496d5533595449305a4759354c575a694f5467744e446c694f533035597a67314c545535596d4e695a5468685a5756694f534a3966513d3d)
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Inefficient Regular Expression Complexity
🦉 Arbitrary Code Injection