@fabasoad/sarif-to-slack 0.2.0 → 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.github/workflows/release.yml +3 -1
- package/.github/workflows/send-sarif-to-slack.yml +214 -0
- package/.pre-commit-config.yaml +3 -3
- package/.tool-versions +1 -1
- package/Makefile +9 -2
- package/README.md +1 -1
- package/dist/Logger.js +15 -6
- package/dist/Processors.js +2 -32
- package/dist/SarifToSlackService.d.ts.map +1 -1
- package/dist/SarifToSlackService.js +13 -6
- package/dist/SlackMessageBuilder.js +46 -52
- package/dist/index.d.ts +7 -2
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +7 -3
- package/dist/model/SarifModelPerRun.d.ts +2 -0
- package/dist/model/SarifModelPerRun.d.ts.map +1 -0
- package/dist/model/SarifModelPerRun.js +90 -0
- package/dist/model/SarifModelPerSarif.d.ts +2 -0
- package/dist/model/SarifModelPerSarif.d.ts.map +1 -0
- package/dist/model/SarifModelPerSarif.js +102 -0
- package/dist/model/types.d.ts +2 -0
- package/dist/model/types.d.ts.map +1 -0
- package/dist/model/types.js +49 -0
- package/dist/sarif-to-slack.d.ts +96 -12
- package/dist/tsdoc-metadata.json +1 -1
- package/dist/types.d.ts +87 -11
- package/dist/types.d.ts.map +1 -1
- package/dist/types.js +66 -9
- package/dist/utils/SarifUtils.d.ts +2 -0
- package/dist/utils/SarifUtils.d.ts.map +1 -0
- package/dist/utils/SarifUtils.js +46 -0
- package/dist/utils/SortUtils.d.ts +2 -0
- package/dist/utils/SortUtils.d.ts.map +1 -0
- package/dist/utils/SortUtils.js +20 -0
- package/dist/version.d.ts +1 -1
- package/dist/version.d.ts.map +1 -1
- package/dist/version.js +11 -4
- package/etc/sarif-to-slack.api.md +32 -7
- package/jest.config.json +4 -4
- package/package.json +9 -7
- package/scripts/save-version.sh +9 -2
- package/src/Logger.ts +20 -17
- package/src/Processors.ts +1 -33
- package/src/SarifToSlackService.ts +13 -6
- package/src/SlackMessageBuilder.ts +78 -63
- package/src/index.ts +16 -6
- package/src/model/SarifModelPerRun.ts +120 -0
- package/src/model/SarifModelPerSarif.ts +126 -0
- package/src/model/types.ts +50 -0
- package/src/types.ts +91 -11
- package/src/utils/SarifUtils.ts +62 -0
- package/src/utils/SortUtils.ts +33 -0
- package/src/version.ts +10 -3
- package/test-data/sarif/codeql-csharp.sarif +1 -0
- package/test-data/sarif/codeql-go.sarif +1 -0
- package/test-data/sarif/codeql-python.sarif +1 -0
- package/test-data/sarif/codeql-ruby.sarif +1 -0
- package/test-data/sarif/codeql-typescript.sarif +1 -0
- package/test-data/sarif/grype-container.sarif +1774 -0
- package/test-data/sarif/runs-1-tools-1-results-0.sarif +18 -0
- package/test-data/sarif/runs-2-tools-1-results-0.sarif +30 -0
- package/test-data/sarif/runs-2-tools-1.sarif +656 -0
- package/test-data/sarif/runs-2-tools-2-results-0.sarif +44 -0
- package/test-data/sarif/runs-2-tools-2.sarif +686 -0
- package/test-data/sarif/runs-3-tools-2-results-0.sarif +48 -0
- package/test-data/sarif/runs-3-tools-2.sarif +278 -0
- package/test-data/sarif/snyk-composer.sarif +934 -0
- package/test-data/sarif/snyk-container.sarif +313 -0
- package/test-data/sarif/snyk-gomodules.sarif +388 -0
- package/test-data/sarif/snyk-gradle.sarif +274 -0
- package/test-data/sarif/snyk-hex.sarif +66 -0
- package/test-data/sarif/snyk-maven.sarif +274 -0
- package/test-data/sarif/snyk-npm.sarif +896 -0
- package/test-data/sarif/snyk-nuget.sarif +90 -0
- package/test-data/sarif/snyk-pip.sarif +66 -0
- package/test-data/sarif/snyk-pnpm.sarif +90 -0
- package/test-data/sarif/snyk-poetry.sarif +1952 -0
- package/test-data/sarif/snyk-rubygems.sarif +440 -0
- package/test-data/sarif/snyk-sbt.sarif +178 -0
- package/test-data/sarif/snyk-swift.sarif +112 -0
- package/test-data/sarif/snyk-yarn.sarif +2900 -0
- package/test-data/sarif/trivy-iac.sarif +134 -0
- package/test-data/sarif/wiz-container.sarif +30916 -0
- package/test-data/sarif/wiz-iac.sarif +558 -0
- package/tests/Processors.spec.ts +3 -42
- package/tests/integration/SendSarifToSlack.spec.ts +80 -0
|
@@ -0,0 +1,313 @@
|
|
|
1
|
+
{
|
|
2
|
+
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/master/Schemata/sarif-schema-2.1.0.json",
|
|
3
|
+
"version": "2.1.0",
|
|
4
|
+
"runs": [
|
|
5
|
+
{
|
|
6
|
+
"tool": {
|
|
7
|
+
"driver": {
|
|
8
|
+
"name": "Snyk Container",
|
|
9
|
+
"properties": {
|
|
10
|
+
"artifactsScanned": 37
|
|
11
|
+
},
|
|
12
|
+
"rules": [
|
|
13
|
+
{
|
|
14
|
+
"id": "SNYK-ALPINE319-MUSL-8720640",
|
|
15
|
+
"shortDescription": {
|
|
16
|
+
"text": "Low severity - CVE-2025-26519 vulnerability in musl"
|
|
17
|
+
},
|
|
18
|
+
"fullDescription": {
|
|
19
|
+
"text": "(CVE-2025-26519) musl/musl-utils@1.2.4_git20230717-r4"
|
|
20
|
+
},
|
|
21
|
+
"help": {
|
|
22
|
+
"text": "",
|
|
23
|
+
"markdown": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `musl` package and not the `musl` package as distributed by `Alpine`._\n_See `How to fix?` for `Alpine:3.19` relevant fixed versions and status._\n\nmusl libc 0.9.13 through 1.2.5 before 1.2.6 has an out-of-bounds write vulnerability when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8.\n## Remediation\nUpgrade `Alpine:3.19` `musl` to version 1.2.4_git20230717-r5 or higher.\n## References\n- [https://git.musl-libc.org/cgit/musl/commit/?id=c47ad25ea3b484e10326f933e927c0bc8cded3da](https://git.musl-libc.org/cgit/musl/commit/?id=c47ad25ea3b484e10326f933e927c0bc8cded3da)\n- [https://git.musl-libc.org/cgit/musl/commit/?id=e5adcd97b5196e29991b524237381a0202a60659](https://git.musl-libc.org/cgit/musl/commit/?id=e5adcd97b5196e29991b524237381a0202a60659)\n- [https://www.openwall.com/lists/oss-security/2025/02/13/2](https://www.openwall.com/lists/oss-security/2025/02/13/2)\n- [http://www.openwall.com/lists/oss-security/2025/02/13/2](http://www.openwall.com/lists/oss-security/2025/02/13/2)\n- [http://www.openwall.com/lists/oss-security/2025/02/13/3](http://www.openwall.com/lists/oss-security/2025/02/13/3)\n- [http://www.openwall.com/lists/oss-security/2025/02/13/4](http://www.openwall.com/lists/oss-security/2025/02/13/4)\n- [http://www.openwall.com/lists/oss-security/2025/02/13/5](http://www.openwall.com/lists/oss-security/2025/02/13/5)\n- [http://www.openwall.com/lists/oss-security/2025/02/14/5](http://www.openwall.com/lists/oss-security/2025/02/14/5)\n- [http://www.openwall.com/lists/oss-security/2025/02/14/6](http://www.openwall.com/lists/oss-security/2025/02/14/6)\n"
|
|
24
|
+
},
|
|
25
|
+
"defaultConfiguration": {
|
|
26
|
+
"level": "warning"
|
|
27
|
+
},
|
|
28
|
+
"properties": {
|
|
29
|
+
"tags": [
|
|
30
|
+
"security",
|
|
31
|
+
"apk"
|
|
32
|
+
],
|
|
33
|
+
"cvssv3_baseScore": null,
|
|
34
|
+
"security-severity": "null"
|
|
35
|
+
}
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
"id": "SNYK-ALPINE319-OPENSSL-8710360",
|
|
39
|
+
"shortDescription": {
|
|
40
|
+
"text": "Low severity - CVE-2024-13176 vulnerability in openssl"
|
|
41
|
+
},
|
|
42
|
+
"fullDescription": {
|
|
43
|
+
"text": "(CVE-2024-13176) openssl/libcrypto3@3.1.7-r1"
|
|
44
|
+
},
|
|
45
|
+
"help": {
|
|
46
|
+
"text": "",
|
|
47
|
+
"markdown": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `openssl` package and not the `openssl` package as distributed by `Alpine`._\n_See `How to fix?` for `Alpine:3.19` relevant fixed versions and status._\n\nIssue summary: A timing side-channel which could potentially allow recovering\nthe private key exists in the ECDSA signature computation.\n\nImpact summary: A timing side-channel in ECDSA signature computations\ncould allow recovering the private key by an attacker. However, measuring\nthe timing would require either local access to the signing application or\na very fast network connection with low latency.\n\nThere is a timing signal of around 300 nanoseconds when the top word of\nthe inverted ECDSA nonce value is zero. This can happen with significant\nprobability only for some of the supported elliptic curves. In particular\nthe NIST P-521 curve is affected. To be able to measure this leak, the attacker\nprocess must either be located in the same physical computer or must\nhave a very fast network connection with low latency. For that reason\nthe severity of this vulnerability is Low.\n\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.\n## Remediation\nUpgrade `Alpine:3.19` `openssl` to version 3.1.8-r0 or higher.\n## References\n- [https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844](https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844)\n- [https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467](https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467)\n- [https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902](https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902)\n- [https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65](https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65)\n- [https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f](https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f)\n- [https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded](https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded)\n- [https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86](https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86)\n- [https://openssl-library.org/news/secadv/20250120.txt](https://openssl-library.org/news/secadv/20250120.txt)\n- [http://www.openwall.com/lists/oss-security/2025/01/20/2](http://www.openwall.com/lists/oss-security/2025/01/20/2)\n- [https://security.netapp.com/advisory/ntap-20250124-0005/](https://security.netapp.com/advisory/ntap-20250124-0005/)\n- [https://security.netapp.com/advisory/ntap-20250418-0010/](https://security.netapp.com/advisory/ntap-20250418-0010/)\n"
|
|
48
|
+
},
|
|
49
|
+
"defaultConfiguration": {
|
|
50
|
+
"level": "warning"
|
|
51
|
+
},
|
|
52
|
+
"properties": {
|
|
53
|
+
"tags": [
|
|
54
|
+
"security",
|
|
55
|
+
"apk"
|
|
56
|
+
],
|
|
57
|
+
"cvssv3_baseScore": null,
|
|
58
|
+
"security-severity": "null"
|
|
59
|
+
}
|
|
60
|
+
},
|
|
61
|
+
{
|
|
62
|
+
"id": "SNYK-ALPINE319-SQLITE-9712341",
|
|
63
|
+
"shortDescription": {
|
|
64
|
+
"text": "High severity - Integer Overflow or Wraparound vulnerability in sqlite"
|
|
65
|
+
},
|
|
66
|
+
"fullDescription": {
|
|
67
|
+
"text": "(CVE-2025-29087) sqlite/sqlite-libs@3.44.2-r0"
|
|
68
|
+
},
|
|
69
|
+
"help": {
|
|
70
|
+
"text": "",
|
|
71
|
+
"markdown": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `sqlite` package and not the `sqlite` package as distributed by `Alpine`._\n_See `How to fix?` for `Alpine:3.19` relevant fixed versions and status._\n\nIn SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory.\n## Remediation\nUpgrade `Alpine:3.19` `sqlite` to version 3.44.2-r1 or higher.\n## References\n- [https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a](https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a)\n- [https://sqlite.org/releaselog/3_49_1.html](https://sqlite.org/releaselog/3_49_1.html)\n- [https://www.sqlite.org/cves.html](https://www.sqlite.org/cves.html)\n"
|
|
72
|
+
},
|
|
73
|
+
"defaultConfiguration": {
|
|
74
|
+
"level": "error"
|
|
75
|
+
},
|
|
76
|
+
"properties": {
|
|
77
|
+
"tags": [
|
|
78
|
+
"security",
|
|
79
|
+
"CWE-190",
|
|
80
|
+
"apk"
|
|
81
|
+
],
|
|
82
|
+
"cvssv3_baseScore": 7.5,
|
|
83
|
+
"security-severity": "7.5"
|
|
84
|
+
}
|
|
85
|
+
},
|
|
86
|
+
{
|
|
87
|
+
"id": "SNYK-ALPINE319-XZ-9669206",
|
|
88
|
+
"shortDescription": {
|
|
89
|
+
"text": "Low severity - Race Condition vulnerability in xz"
|
|
90
|
+
},
|
|
91
|
+
"fullDescription": {
|
|
92
|
+
"text": "(CVE-2025-31115) xz/xz-libs@5.4.5-r0"
|
|
93
|
+
},
|
|
94
|
+
"help": {
|
|
95
|
+
"text": "",
|
|
96
|
+
"markdown": "## NVD Description\n**_Note:_** _Versions mentioned in the description apply only to the upstream `xz` package and not the `xz` package as distributed by `Alpine`._\n_See `How to fix?` for `Alpine:3.19` relevant fixed versions and status._\n\nXZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.\n## Remediation\nUpgrade `Alpine:3.19` `xz` to version 5.4.5-r1 or higher.\n## References\n- [https://github.com/tukaani-project/xz/commit/d5a2ffe41bb77b918a8c96084885d4dbe4bf6480](https://github.com/tukaani-project/xz/commit/d5a2ffe41bb77b918a8c96084885d4dbe4bf6480)\n- [https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2](https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2)\n- [https://tukaani.org/xz/xz-cve-2025-31115.patch](https://tukaani.org/xz/xz-cve-2025-31115.patch)\n- [http://www.openwall.com/lists/oss-security/2025/04/03/1](http://www.openwall.com/lists/oss-security/2025/04/03/1)\n- [http://www.openwall.com/lists/oss-security/2025/04/03/2](http://www.openwall.com/lists/oss-security/2025/04/03/2)\n- [http://www.openwall.com/lists/oss-security/2025/04/03/3](http://www.openwall.com/lists/oss-security/2025/04/03/3)\n"
|
|
97
|
+
},
|
|
98
|
+
"defaultConfiguration": {
|
|
99
|
+
"level": "warning"
|
|
100
|
+
},
|
|
101
|
+
"properties": {
|
|
102
|
+
"tags": [
|
|
103
|
+
"security",
|
|
104
|
+
"CWE-366",
|
|
105
|
+
"CWE-416",
|
|
106
|
+
"CWE-476",
|
|
107
|
+
"CWE-826",
|
|
108
|
+
"apk"
|
|
109
|
+
],
|
|
110
|
+
"cvssv3_baseScore": null,
|
|
111
|
+
"security-severity": "null"
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
]
|
|
115
|
+
}
|
|
116
|
+
},
|
|
117
|
+
"results": [
|
|
118
|
+
{
|
|
119
|
+
"ruleId": "SNYK-ALPINE319-MUSL-8720640",
|
|
120
|
+
"level": "note",
|
|
121
|
+
"message": {
|
|
122
|
+
"text": "This file introduces a vulnerable musl package with a low severity vulnerability."
|
|
123
|
+
},
|
|
124
|
+
"locations": [
|
|
125
|
+
{
|
|
126
|
+
"physicalLocation": {
|
|
127
|
+
"artifactLocation": {
|
|
128
|
+
"uri": "Dockerfile"
|
|
129
|
+
},
|
|
130
|
+
"region": {
|
|
131
|
+
"startLine": 1
|
|
132
|
+
}
|
|
133
|
+
},
|
|
134
|
+
"logicalLocations": [
|
|
135
|
+
{
|
|
136
|
+
"fullyQualifiedName": "musl@1.2.4_git20230717-r4"
|
|
137
|
+
}
|
|
138
|
+
]
|
|
139
|
+
}
|
|
140
|
+
],
|
|
141
|
+
"fixes": [
|
|
142
|
+
{
|
|
143
|
+
"description": {
|
|
144
|
+
"text": "Upgrade to musl/musl-utils@1.2.4_git20230717-r5"
|
|
145
|
+
},
|
|
146
|
+
"artifactChanges": [
|
|
147
|
+
{
|
|
148
|
+
"artifactLocation": {
|
|
149
|
+
"uri": "Dockerfile"
|
|
150
|
+
},
|
|
151
|
+
"replacements": [
|
|
152
|
+
{
|
|
153
|
+
"deletedRegion": {
|
|
154
|
+
"startLine": 1
|
|
155
|
+
},
|
|
156
|
+
"insertedContent": {
|
|
157
|
+
"text": "musl/musl-utils@1.2.4_git20230717-r5"
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
]
|
|
161
|
+
}
|
|
162
|
+
]
|
|
163
|
+
}
|
|
164
|
+
]
|
|
165
|
+
},
|
|
166
|
+
{
|
|
167
|
+
"ruleId": "SNYK-ALPINE319-OPENSSL-8710360",
|
|
168
|
+
"level": "note",
|
|
169
|
+
"message": {
|
|
170
|
+
"text": "This file introduces a vulnerable openssl package with a low severity vulnerability."
|
|
171
|
+
},
|
|
172
|
+
"locations": [
|
|
173
|
+
{
|
|
174
|
+
"physicalLocation": {
|
|
175
|
+
"artifactLocation": {
|
|
176
|
+
"uri": "Dockerfile"
|
|
177
|
+
},
|
|
178
|
+
"region": {
|
|
179
|
+
"startLine": 1
|
|
180
|
+
}
|
|
181
|
+
},
|
|
182
|
+
"logicalLocations": [
|
|
183
|
+
{
|
|
184
|
+
"fullyQualifiedName": "openssl@3.1.7-r1"
|
|
185
|
+
}
|
|
186
|
+
]
|
|
187
|
+
}
|
|
188
|
+
],
|
|
189
|
+
"fixes": [
|
|
190
|
+
{
|
|
191
|
+
"description": {
|
|
192
|
+
"text": "Upgrade to openssl/libcrypto3@3.1.8-r0"
|
|
193
|
+
},
|
|
194
|
+
"artifactChanges": [
|
|
195
|
+
{
|
|
196
|
+
"artifactLocation": {
|
|
197
|
+
"uri": "Dockerfile"
|
|
198
|
+
},
|
|
199
|
+
"replacements": [
|
|
200
|
+
{
|
|
201
|
+
"deletedRegion": {
|
|
202
|
+
"startLine": 1
|
|
203
|
+
},
|
|
204
|
+
"insertedContent": {
|
|
205
|
+
"text": "openssl/libcrypto3@3.1.8-r0"
|
|
206
|
+
}
|
|
207
|
+
}
|
|
208
|
+
]
|
|
209
|
+
}
|
|
210
|
+
]
|
|
211
|
+
}
|
|
212
|
+
]
|
|
213
|
+
},
|
|
214
|
+
{
|
|
215
|
+
"ruleId": "SNYK-ALPINE319-SQLITE-9712341",
|
|
216
|
+
"level": "error",
|
|
217
|
+
"message": {
|
|
218
|
+
"text": "This file introduces a vulnerable sqlite package with a high severity vulnerability."
|
|
219
|
+
},
|
|
220
|
+
"locations": [
|
|
221
|
+
{
|
|
222
|
+
"physicalLocation": {
|
|
223
|
+
"artifactLocation": {
|
|
224
|
+
"uri": "Dockerfile"
|
|
225
|
+
},
|
|
226
|
+
"region": {
|
|
227
|
+
"startLine": 1
|
|
228
|
+
}
|
|
229
|
+
},
|
|
230
|
+
"logicalLocations": [
|
|
231
|
+
{
|
|
232
|
+
"fullyQualifiedName": "sqlite@3.44.2-r0"
|
|
233
|
+
}
|
|
234
|
+
]
|
|
235
|
+
}
|
|
236
|
+
],
|
|
237
|
+
"fixes": [
|
|
238
|
+
{
|
|
239
|
+
"description": {
|
|
240
|
+
"text": "Upgrade to sqlite/sqlite-libs@3.44.2-r1"
|
|
241
|
+
},
|
|
242
|
+
"artifactChanges": [
|
|
243
|
+
{
|
|
244
|
+
"artifactLocation": {
|
|
245
|
+
"uri": "Dockerfile"
|
|
246
|
+
},
|
|
247
|
+
"replacements": [
|
|
248
|
+
{
|
|
249
|
+
"deletedRegion": {
|
|
250
|
+
"startLine": 1
|
|
251
|
+
},
|
|
252
|
+
"insertedContent": {
|
|
253
|
+
"text": "sqlite/sqlite-libs@3.44.2-r1"
|
|
254
|
+
}
|
|
255
|
+
}
|
|
256
|
+
]
|
|
257
|
+
}
|
|
258
|
+
]
|
|
259
|
+
}
|
|
260
|
+
]
|
|
261
|
+
},
|
|
262
|
+
{
|
|
263
|
+
"ruleId": "SNYK-ALPINE319-XZ-9669206",
|
|
264
|
+
"level": "note",
|
|
265
|
+
"message": {
|
|
266
|
+
"text": "This file introduces a vulnerable xz package with a low severity vulnerability."
|
|
267
|
+
},
|
|
268
|
+
"locations": [
|
|
269
|
+
{
|
|
270
|
+
"physicalLocation": {
|
|
271
|
+
"artifactLocation": {
|
|
272
|
+
"uri": "Dockerfile"
|
|
273
|
+
},
|
|
274
|
+
"region": {
|
|
275
|
+
"startLine": 1
|
|
276
|
+
}
|
|
277
|
+
},
|
|
278
|
+
"logicalLocations": [
|
|
279
|
+
{
|
|
280
|
+
"fullyQualifiedName": "xz@5.4.5-r0"
|
|
281
|
+
}
|
|
282
|
+
]
|
|
283
|
+
}
|
|
284
|
+
],
|
|
285
|
+
"fixes": [
|
|
286
|
+
{
|
|
287
|
+
"description": {
|
|
288
|
+
"text": "Upgrade to xz/xz-libs@5.4.5-r1"
|
|
289
|
+
},
|
|
290
|
+
"artifactChanges": [
|
|
291
|
+
{
|
|
292
|
+
"artifactLocation": {
|
|
293
|
+
"uri": "Dockerfile"
|
|
294
|
+
},
|
|
295
|
+
"replacements": [
|
|
296
|
+
{
|
|
297
|
+
"deletedRegion": {
|
|
298
|
+
"startLine": 1
|
|
299
|
+
},
|
|
300
|
+
"insertedContent": {
|
|
301
|
+
"text": "xz/xz-libs@5.4.5-r1"
|
|
302
|
+
}
|
|
303
|
+
}
|
|
304
|
+
]
|
|
305
|
+
}
|
|
306
|
+
]
|
|
307
|
+
}
|
|
308
|
+
]
|
|
309
|
+
}
|
|
310
|
+
]
|
|
311
|
+
}
|
|
312
|
+
]
|
|
313
|
+
}
|