-
Notifications
You must be signed in to change notification settings - Fork 546
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cmake: Fixes for CVE-2022-43552, CVE-2023-27536, CVE-2023-27535, CVE-2023-27538, CVE-2023-23916 and CVE-2023-46218 #11043
base: fasttrack/2.0
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you please update the toolchain manifests with the new cmake revision?
It looks like we have another PR which upgrades cmake and supercedes these patches. |
Have updated the toolkits for arm64 and amd64
Have gone ahead and closed this PR which I created. @anphel31 Can you please take a look |
@sharath-srikanth-chellappa , the closed PR #11037 contains fixes for many other CVES. Do you plan to include those in this PR? |
@anphel31 |
Co-authored-by: Sharath Srikanth Chellappa <[email protected]>
44a05a9
to
c27c129
Compare
@anphel31 @jslobodzian - I have gone ahead and added multiple CVEs to the same PR. Can you please take a look and reapprove so that I can merge it. Thanks in advance. |
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-static
subpackages, etc.) have had theirRelease
tag incremented../cgmanifest.json
,./toolkit/scripts/toolchain/cgmanifest.json
,.github/workflows/cgmanifest.json
)./LICENSES-AND-NOTICES/SPECS/data/licenses.json
,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md
,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON
)*.signatures.json
filessudo make go-tidy-all
andsudo make go-test-coverage
passSummary
What does the PR accomplish, why was it needed?
Patches for CVE-2022-43552, CVE-2023-27536, CVE-2023-27535, CVE-2023-27538, CVE-2023-23916 and CVE-2023-46218
Based on upstream fixes:
Change Log
Does this affect the toolchain?
YES
Associated issues
Links to CVEs
Test Methodology