Skip to content

Commit e96d12e

Browse files
authored
Merge pull request #5303 from microsoft/anphel/1.0-april-2023-update
Merge for Mariner 1.0 April 2023 update
2 parents 073df86 + fd47ae3 commit e96d12e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+934
-3333
lines changed

SPECS/c-ares/c-ares.signatures.json

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"Signatures": {
3-
"c-ares-1.18.1.tar.gz": "1a7d52a8a84a9fbffb1be9133c0f6e17217d91ea5a6fa61f6b4729cda78ebbcf"
4-
}
2+
"Signatures": {
3+
"c-ares-1.19.0.tar.gz": "bfceba37e23fd531293829002cac0401ef49a6dc55923f7f92236585b7ad1dd3"
4+
}
55
}

SPECS/c-ares/c-ares.spec

+4-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Summary: A library that performs asynchronous DNS operations
22
Name: c-ares
3-
Version: 1.18.1
3+
Version: 1.19.0
44
Release: 1%{?dist}
55
License: MIT
66
Vendor: Microsoft Corporation
@@ -70,6 +70,9 @@ rm -rf %{buildroot}
7070
%{_mandir}/man3/ares_*
7171

7272
%changelog
73+
* Tue Apr 04 2023 CBL-Mariner Servicing Account <[email protected]> - 1.19.0-1
74+
- Auto-upgrade to 1.19.0 - To Address CVE-2022-4904
75+
7376
* Sun Nov 28 2021 Muhammad Falak <[email protected]> - 1.18.1-1
7477
- Bump version to fix CVE-2021-3672
7578

SPECS/ca-certificates/ca-certificates.signatures.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
"README.usr": "0d2e90b6cf575678cd9d4f409d92258ef0d676995d4d733acdb2425309a38ff8",
1212
"bundle2pem.sh": "a61e0d9f34e21456cfe175e9a682f56959240e66dfeb75bd2457226226aa413a",
1313
"certdata.base.txt": "76c4cd1860b9a6f6ee9c2a0dcddcef46f65950b7ec12d2a7eeabeedca4e379f9",
14-
"certdata.microsoft.txt": "7c9a314f528f5f353b478caaea8be051ad6b2ff99dca2754206afb632093fe47",
14+
"certdata.microsoft.txt": "53fa416b306459da67127b12c17fb33d9598f0c085148578689066e84b00018e",
1515
"certdata2pem.py": "4f5848c14210758f19ab9fdc9ffd83733303a48642a3d47c4d682f904fdc0f33",
1616
"pem2bundle.sh": "f96a2f0071fb80e30332c0bd95853183f2f49a3c98d5e9fc4716aeeb001e3426",
1717
"trust-fixes": "01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b",

SPECS/ca-certificates/ca-certificates.spec

+4-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Name: ca-certificates
4444

4545
# When updating, "Version" AND "Release" tags must be updated in the "prebuilt-ca-certificates" package as well.
4646
Version: 20200720
47-
Release: 29%{?dist}
47+
Release: 30%{?dist}
4848
License: MPLv2.0
4949
Vendor: Microsoft Corporation
5050
Distribution: Mariner
@@ -319,6 +319,9 @@ rm -f %{pkidir}/tls/certs/*.{0,pem}
319319
%{_bindir}/bundle2pem.sh
320320

321321
%changelog
322+
* Thu Mar 30 2023 CBL-Mariner Service Account <[email protected]> - 20200720-30
323+
- Updating Microsoft trusted root CAs.
324+
322325
* Mon Dec 12 2022 Pawel Winogrodzki <[email protected]> - 20200720-29
323326
- Adding 'Obsoletes' for the old 'ca-certificates-microsoft' packages before release 19.
324327

SPECS/ca-certificates/certdata.microsoft.txt

+219-3,204
Large diffs are not rendered by default.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
diff -Naur a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs
2+
--- a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs 2021-04-25 17:00:00.000000000 -0700
3+
+++ b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs 2023-04-05 15:33:56.893718099 -0700
4+
@@ -367,6 +367,16 @@
5+
let entries: Vec<<T as FamStruct>::Entry> =
6+
Vec::deserialize(reader, version_map, app_version)
7+
.map_err(|ref err| VersionizeError::Deserialize(format!("{:?}", err)))?;
8+
+ if header.len() != entries.len() {
9+
+ let msg = format!(
10+
+ "Mismatch between length of FAM specified in FamStruct header ({}) \
11+
+ and actual size of FAM ({})",
12+
+ header.len(),
13+
+ entries.len()
14+
+ );
15+
+
16+
+ return Err(VersionizeError::Deserialize(msg));
17+
+ }
18+
// Construct the object from the array items.
19+
// Header(T) fields will be initialized by Default trait impl.
20+
let mut object = FamStructWrapper::from_entries(&entries)
21+
diff -Naur a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs
22+
--- a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs 2021-04-25 17:00:00.000000000 -0700
23+
+++ b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs 2023-04-05 15:34:57.145737780 -0700
24+
@@ -1321,6 +1321,32 @@
25+
type Message2FamStructWrapper = FamStructWrapper<Message2>;
26+
27+
#[test]
28+
+fn test_deserialize_famstructwrapper_invalid_len() {
29+
+ let mut vm = VersionMap::new();
30+
+ vm.new_version()
31+
+ .set_type_version(Message::type_id(), 2)
32+
+ .new_version()
33+
+ .set_type_version(Message::type_id(), 3)
34+
+ .new_version()
35+
+ .set_type_version(Message::type_id(), 4);
36+
+
37+
+ // Create FamStructWrapper with len 2
38+
+ let state = MessageFamStructWrapper::new(0).unwrap();
39+
+ let mut buffer = [0; 256];
40+
+
41+
+ state.serialize(&mut buffer.as_mut_slice(), &vm, 2).unwrap();
42+
+
43+
+ // the `len` field of the header is the first serialized field.
44+
+ // Let's corrupt it by making it bigger than the actual number of serialized elements
45+
+ buffer[0] = 255;
46+
+
47+
+ assert_eq!(
48+
+ MessageFamStructWrapper::deserialize(&mut buffer.as_slice(), &vm, 2).unwrap_err(),
49+
+ VersionizeError::Deserialize("Mismatch between length of FAM specified in FamStruct header (255) and actual size of FAM (0)".to_string())
50+
+ );
51+
+}
52+
+
53+
+#[test]
54+
fn test_versionize_famstructwrapper() {
55+
let mut vm = VersionMap::new();
56+
vm.new_version()

SPECS/cloud-hypervisor/cloud-hypervisor.spec

+6-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Summary: A Rust-VMM based cloud hypervisor from Intel
22
Name: cloud-hypervisor
33
Version: 22.0
4-
Release: 1%{?dist}
4+
Release: 2%{?dist}
55
License: ASL 2.0 or BSD
66
URL: https://github.com/cloud-hypervisor/cloud-hypervisor
77
Group: Development/Tools
@@ -12,6 +12,7 @@ Source0: %{url}/archive/v%{version}.tar.gz#/%{name}-%{version}.tar.gz
1212
# To update the cache run:
1313
# [repo_root]/toolkit/scripts/build_cargo_cache.sh %%{name}-%%{version}.tar.gz
1414
Source1: %{name}-%{version}-cargo.tar.gz
15+
Patch0: CVE-2023-28448.patch
1516
ExclusiveArch: x86_64
1617

1718
BuildRequires: gcc
@@ -28,6 +29,7 @@ A Rust-VMM based cloud hypervisor from Intel.
2829
mkdir -p $HOME
2930
pushd $HOME
3031
tar xf %{SOURCE1} --no-same-owner
32+
%patch0 -p1
3133
popd
3234
%setup -q
3335

@@ -49,6 +51,9 @@ install -d %{buildroot}%{_libdir}/cloud-hypervisor
4951
%exclude %{_libdir}/debug
5052

5153
%changelog
54+
* Wed Apr 05 2023 Henry Beberman <[email protected]> - 22.0-2
55+
- Patch CVE-2023-28448 in vendored versionize crate
56+
5257
* Wed Mar 09 2022 Pawel Winogrodzki <[email protected]> - 22.0-1
5358
- Updating to version 22.0 to build with 'rust' 1.59.0.
5459

SPECS/kernel/CVE-2023-1079.nopatch

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1079 - patched in 5.10.173 - (generated by autopatch tool)
2+
upstream 4ab3a086d10eeec1424f2e8a968827a6336203df - stable 21a2eec4a440060a6eb294dc890eaf553101ba09
3+

SPECS/kernel/CVE-2023-1281.nopatch

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1281 - patched in 5.10.169 - (generated by autopatch tool)
2+
upstream ee059170b1f7e94e55fa6cadee544e176a6e59c2 - stable eb8e9d8572d1d9df17272783ad8a84843ce559d4
3+

SPECS/kernel/CVE-2023-1390.nopatch

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1390 - patched in 5.10.10 - (generated by autopatch tool)
2+
upstream b77413446408fdd256599daf00d5be72b5f3e7c6 - stable 60b8b4e6310b7dfc551ba68e8639eeaf70a0b2dd
3+

SPECS/kernel/CVE-2023-1513.nopatch

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1513 - patched in 5.10.169 - (generated by autopatch tool)
2+
upstream 2c10b61421a28e95a46ab489fd56c0f442ff6952 - stable 6416c2108ba54d569e4c98d3b62ac78cb12e7107
3+

SPECS/kernel/CVE-2023-28772.nopatch

+3
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-28772 - patched in 5.10.51 - (generated by autopatch tool)
2+
upstream d3b16034a24a112bb83aeb669ac5b9b01f744bb7 - stable f9fb4986f4d81182f938d16beb4f983fe71212aa
3+

SPECS/mariner-release/mariner-release.spec

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Summary: CBL-Mariner release files
22
Name: mariner-release
33
Version: 1.0
4-
Release: 59%{?dist}
4+
Release: 60%{?dist}
55
License: MIT
66
Group: System Environment/Base
77
URL: https://aka.ms/cbl-mariner
@@ -67,6 +67,8 @@ rm -rf $RPM_BUILD_ROOT
6767
%config(noreplace) /etc/issue.net
6868

6969
%changelog
70+
* Thu Apr 13 2023 Andrew Phelps <[email protected]> - 1.0-60
71+
- Updating version for April update.
7072
* Wed Mar 29 2023 Jon Slobodzian <[email protected]> - 1.0-59
7173
- Updating version for March update2.
7274
* Mon Mar 06 2023 Jon Slobodzian <[email protected]> - 1.0-58

SPECS/moby-runc/generate-sources.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
# Git clone is a standard practice of producing source files for moby-* packages.
66

77
RUNC_REPO=https://github.com/opencontainers/runc.git
8-
RUNC_COMMIT=a916309fff0f838eb94e928713dbc3c0d0ac7aa4
9-
VERSION=v1.1.2
8+
RUNC_COMMIT=f19387a6bec4944c770f7668ab51c4348d9c2f38
9+
VERSION=v1.1.5
1010

1111
mkdir -p /build/runc-src
1212
cd /build/runc-src

SPECS/moby-runc/moby-runc.signatures.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
"golang-crypto-c07d793c2f9aacf728fe68cbd7acd73adbd04159.tar.gz": "b7e8935189ea46c67eedafe6a97aefbdc2bf71dd9097fb7ee8a2a8ebc7556e7e",
66
"golang-sys-b0526f3d87448f0401ea3f7f3a81aa9e6ab4804d.tar.gz": "23703a84893a1cb53d3efbb46143451431b95b78d29ef1e02132cd580bb3a445",
77
"logrus-v1.8.1.tar.gz": "e9492c08ac8f202b438ccfb992bf81b7860739cf8f2266958e0c574c7abfdd74",
8-
"runc-v1.1.2.tar.gz": "1a14bb492b562a6f7a27248e65a699790a6964923de64612e9bafc06124a30a2",
8+
"runc-v1.1.5.tar.gz": "4bbc7703f4a5273e4b3d2c0ef233c784d116e92722e05fa11aa93ccf51aed4b9",
99
"runtime-spec-v1.0.2.tar.gz": "0933a1ba6e418fe020993e80426107da8de3572f3f20b4cd1ef296de6e62bb61",
1010
"urfave-cli-v2.3.0.tar.gz": "b17376246f1477157daab86d4a1562d6b004f5be0d15dfc61ebd8bb129384e6b"
1111
}
12-
}
12+
}

SPECS/moby-runc/moby-runc.spec

+7-4
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
Summary: CLI tool for spawning and running containers per OCI spec.
22
Name: moby-runc
3-
Version: 1.1.2+azure
4-
Release: 4%{?dist}
3+
Version: 1.1.5+azure
4+
Release: 1%{?dist}
55
License: ASL 2.0
66
Vendor: Microsoft Corporation
77
Distribution: Mariner
88
Group: Virtualization/Libraries
99
URL: https://runc.io/
1010
# See generate-sources.sh for creating runc source tarball
11-
#Source0: https://github.com/opencontainers/runc/archive/refs/tags/v1.1.2.tar.gz
12-
Source0: runc-v1.1.2.tar.gz
11+
#Source0: https://github.com/opencontainers/runc/archive/refs/tags/v1.1.5.tar.gz
12+
Source0: runc-v1.1.5.tar.gz
1313
#Source1: https://github.com/sirupsen/logrus/archive/v1.8.1.tar.gz
1414
Source1: logrus-v1.8.1.tar.gz
1515
#Source2: https://github.com/opencontainers/runtime-spec/archive/v1.0.2.tar.gz
@@ -108,6 +108,9 @@ cp %{SOURCE7} %{buildroot}%{_docdir}/%{name}-%{version}/LICENSE
108108
%{_mandir}/*/*
109109

110110
%changelog
111+
* Thu Apr 13 2023 Rohit Rawat <[email protected]> - 1.1.5+azure-1
112+
- Bump release to fix CVE-2023-28642, CVE-2023-27561, CVE-2023-25809
113+
111114
* Tue Dec 13 2022 Suresh Babu Chalamalasetty <[email protected]> - 1.1.2+azure-4
112115
- Bump release to rebuild with go 1.18.8-2
113116

0 commit comments

Comments
 (0)