[Snyk] Security upgrade ubuntu from 22.10 to lunar-20230615 #11927
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR was automatically created by Snyk using the credentials of a real user.
Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.
Changes included in this PR
We recommend upgrading to
ubuntu:lunar-20230615
, as this image has only 7 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.Some of the most important vulnerabilities in your base image include:
SNYK-UBUNTU2210-SYSTEMD-5721329
SNYK-UBUNTU2210-SYSTEMD-5721343
SNYK-UBUNTU2210-SYSTEMD-5721343
SNYK-UBUNTU2210-SYSTEMD-5721350
SNYK-UBUNTU2210-SYSTEMD-5721350
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:![](https://github.com/camo/dd1301c53d3aeb4d79ea766711f3e023f0328f6aa5ca57bd0406013af831c795/68747470733a2f2f6170692e7365676d656e742e696f2f76312f706978656c2f747261636b3f646174613d65794a33636d6c305a55746c65534936496e4a79576d785a634564485932527954485a7362306c596430645563566734576b4652546e4e434f5545774969776959573576626e6c746233567a535751694f694a695a6a41794f4467354d79316d4e3249334c5451334d6d4574595759324d6930335a6a51355a4441775a4467784d7a51694c434a6c646d567564434936496c425349485a705a58646c5a434973496e42796233426c636e52705a584d694f6e736963484a4a5a434936496d4a6d4d4449344f446b7a4c575933596a63744e446379595331685a6a59794c54646d4e446c6b4d44426b4f44457a4e434a3966513d3d)
🧐 View latest project report
🛠 Adjust project settings
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.
🛠️ PR Summary
Made with ❤️ by Ultralytics Actions
🌟 Summary
Updated Dockerfile for improved compatibility and package management in YOLOv5 CPU Docker image.
📊 Key Changes
22.10
to a specificlunar-20230615
snapshot.g++
andlibusb-1.0-0
to the list of packages installed viaapt
to support building certain Python packages./usr/lib/python3.11/EXTERNALLY-MANAGED
to prevent issues with Ubuntu's nightly build process when usingpip install
.RUN
instructions.🎯 Purpose & Impact
tflite_support
andlap
) that require additional C++ libraries and USB support.Potential impact to users:
These changes are likely to improve the stability and functionality of the YOLOv5 CPU Docker image, leading to a smoother experience for developers deploying YOLOv5 on CPU-only environments.