Skip to content

Patch gdb to fix CVE-2022-48064 and CVE-2022-48065 [Medium]#13261

Merged
jslobodzian merged 2 commits intofasttrack/2.0from
skarambelkar/gdb/CVE-2022-48064-fasttrack-2.0
Apr 8, 2025
Merged

Patch gdb to fix CVE-2022-48064 and CVE-2022-48065 [Medium]#13261
jslobodzian merged 2 commits intofasttrack/2.0from
skarambelkar/gdb/CVE-2022-48064-fasttrack-2.0

Conversation

@sandeepkarambelkar
Copy link
Contributor

@sandeepkarambelkar sandeepkarambelkar commented Apr 3, 2025

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

Patch gdb to fix CVE-2022-48064 and CVE-2022-48065 [Medium]

Change Log
Does this affect the toolchain?

NO

Links to CVEs
Test Methodology

@sandeepkarambelkar sandeepkarambelkar requested a review from a team as a code owner April 3, 2025 01:07
@microsoft-github-policy-service microsoft-github-policy-service bot added Packaging fasttrack/2.0 PRs Destined for Azure Linux 2.0 labels Apr 3, 2025
@sandeepkarambelkar
Copy link
Contributor Author

The test failures are there on the fasttrack/2.0 branch. Please check the buddy build on fasttrack/2.0 - https://dev.azure.com/mariner-org/mariner/_build/results?buildId=778440&view=results

PR 29922
* dwarf2.c (find_debug_info): Ignore sections without
SEC_HAS_CONTENTS.
---
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
---
Upstream Patch Reference : https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=8f2c64de86bc3d7556121fe296dd679000283931
---

Copy link
Contributor

@dmcilvaney dmcilvaney left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nvml and gbd are known failing tests

@jslobodzian jslobodzian merged commit e749bf4 into fasttrack/2.0 Apr 8, 2025
10 of 14 checks passed
@jslobodzian jslobodzian deleted the skarambelkar/gdb/CVE-2022-48064-fasttrack-2.0 branch April 8, 2025 22:22
@CBL-Mariner-Bot
Copy link
Collaborator

Auto cherry-pick results:

  • main ✅ -> Skipped

Auto cherry-pick pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=782640&view=results

jslobodzian added a commit that referenced this pull request Apr 9, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

fasttrack/2.0 PRs Destined for Azure Linux 2.0 Packaging security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants