Fix HIGH severity kernel vulnerabilities in dev container base image #10
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The base Ubuntu 24.04 image contained 3 HIGH severity CVEs in linux-libc-dev (6.8.0-85.85):
Changes
Added
apt-get upgradeto Dockerfile to apply available security patches during image build:RUN apt-get update && export DEBIAN_FRONTEND=noninteractive \ && apt-get -y upgrade --no-install-recommends \ && apt-get -y install --no-install-recommends \ curl wget jq build-essential \ && apt-get clean -y \ && rm -rf /var/lib/apt/lists/*Impact
Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.