Skip to content

[Medium] Patch netplan for CVE-2022-4968#12470

Merged
jslobodzian merged 2 commits intomicrosoft:fasttrack/2.0from
kevin-b-lockwood:kevin-b-lockwood/netplan-CVE-2022-4968
Feb 21, 2025
Merged

[Medium] Patch netplan for CVE-2022-4968#12470
jslobodzian merged 2 commits intomicrosoft:fasttrack/2.0from
kevin-b-lockwood:kevin-b-lockwood/netplan-CVE-2022-4968

Conversation

@kevin-b-lockwood
Copy link
Copy Markdown
Contributor

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./SPECS/LICENSES-AND-NOTICES/data/licenses.json, ./SPECS/LICENSES-AND-NOTICES/LICENSES-MAP.md, ./SPECS/LICENSES-AND-NOTICES/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • If you are adding/removing a .spec file that has multiple-versions supported, please add @microsoft/cbl-mariner-multi-package-reviewers team as reviewer (Eg. golang has 2 versions 1.18, 1.21+)
  • Ready to merge

Summary

Patch netplan for CVE-2022-4968

Change Log
Does this affect the toolchain?

NO

Links to CVEs
Test Methodology
  • Local build

@kevin-b-lockwood kevin-b-lockwood requested a review from a team as a code owner February 17, 2025 21:43
@microsoft-github-policy-service microsoft-github-policy-service Bot added Packaging fasttrack/2.0 PRs Destined for Azure Linux 2.0 labels Feb 17, 2025
@kevin-b-lockwood kevin-b-lockwood marked this pull request as draft February 17, 2025 21:45
@kevin-b-lockwood kevin-b-lockwood force-pushed the kevin-b-lockwood/netplan-CVE-2022-4968 branch from 5c9d865 to 2da66d1 Compare February 18, 2025 00:36
@kevin-b-lockwood kevin-b-lockwood marked this pull request as ready for review February 18, 2025 00:37
@kevin-b-lockwood kevin-b-lockwood force-pushed the kevin-b-lockwood/netplan-CVE-2022-4968 branch from 2da66d1 to e72d653 Compare February 18, 2025 00:37
@rikenm1
Copy link
Copy Markdown
Contributor

rikenm1 commented Feb 19, 2025

/AzurePipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@jslobodzian jslobodzian merged commit 5eb4dc8 into microsoft:fasttrack/2.0 Feb 21, 2025
CBL-Mariner-Bot pushed a commit that referenced this pull request Feb 21, 2025
Co-authored-by: jslobodzian <joslobo@microsoft.com>
(cherry picked from commit 5eb4dc8)
@CBL-Mariner-Bot
Copy link
Copy Markdown
Collaborator

Auto cherry-pick results:

  • main ❌
    -> Failed. Please the logs for more information

Auto cherry-pick pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=742227&view=results

@kevin-b-lockwood kevin-b-lockwood deleted the kevin-b-lockwood/netplan-CVE-2022-4968 branch February 21, 2025 21:43
jslobodzian added a commit that referenced this pull request Feb 27, 2025
Co-authored-by: jslobodzian <joslobo@microsoft.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

fasttrack/2.0 PRs Destined for Azure Linux 2.0 Packaging

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants