Skip to content

Commit 9bb55a6

Browse files
committed
Merge branch 'main' into 2.0
2 parents 50d764d + 919a02b commit 9bb55a6

File tree

8 files changed

+912
-7
lines changed

8 files changed

+912
-7
lines changed

SPECS-EXTENDED/pipewire/pipewire.spec

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
Summary: Media Sharing Server
1919
Name: pipewire
2020
Version: %{majorversion}.%{minorversion}.%{microversion}
21-
Release: 2%{?dist}
21+
Release: 3%{?dist}
2222
License: MIT
2323
Vendor: Microsoft Corporation
2424
Distribution: Mariner
@@ -42,7 +42,6 @@ BuildRequires: pkgconfig(gstreamer-base-1.0) >= 1.10.0
4242
BuildRequires: pkgconfig(gstreamer-plugins-base-1.0) >= 1.10.0
4343
BuildRequires: pkgconfig(gstreamer-net-1.0) >= 1.10.0
4444
BuildRequires: pkgconfig(gstreamer-allocators-1.0) >= 1.10.0
45-
BuildRequires: pkgconfig(fdk-aac)
4645
%if %{with vulkan}
4746
BuildRequires: pkgconfig(vulkan)
4847
%endif
@@ -214,6 +213,7 @@ cp %{SOURCE1} subprojects/packagefiles/
214213
-D bluez5-codec-lc3plus=disabled \
215214
-D bluez5-codec-ldac=disabled \
216215
-D bluez5-codec-opus=disabled \
216+
-D bluez5-codec-aac=disabled \
217217
-D x11-xfixes=disabled \
218218
%if %{with media_session}
219219
-D session-managers="media-session" \
@@ -428,6 +428,9 @@ systemctl --no-reload preset --global pipewire.socket >/dev/null 2>&1 || :
428428
%endif
429429

430430
%changelog
431+
* Thu Feb 6 2025 Jon Slobodzian <[email protected]> - 0.3.60-3
432+
- Remove bluez5-codec-aac
433+
431434
* Thu Nov 24 2022 Sumedh Sharma <[email protected]> - 0.3.60-2
432435
- Initial CBL-Mariner import from Fedora 37 (license: MIT)
433436
- Build with features disabled: jack, jackserver-plugin and libcamera-plugin

SPECS/golang/CVE-2024-45336.patch

Lines changed: 375 additions & 0 deletions
Large diffs are not rendered by default.

SPECS/golang/CVE-2024-45341.patch

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
From 6d97029a7eff74a7ed5e695f192d106d1346130c Mon Sep 17 00:00:00 2001
2+
From: Kanishk Bansal <[email protected]>
3+
Date: Tue, 4 Feb 2025 15:30:59 +0000
4+
Subject: [PATCH] Address CVE-2024-45341
5+
6+
---
7+
src/crypto/x509/name_constraints_test.go | 18 ++++++++++++++++++
8+
src/crypto/x509/verify.go | 7 +++++--
9+
2 files changed, 23 insertions(+), 2 deletions(-)
10+
11+
diff --git a/src/crypto/x509/name_constraints_test.go b/src/crypto/x509/name_constraints_test.go
12+
index 4c22c4c..78263fc 100644
13+
--- a/src/crypto/x509/name_constraints_test.go
14+
+++ b/src/crypto/x509/name_constraints_test.go
15+
@@ -1599,6 +1599,24 @@ var nameConstraintsTests = []nameConstraintsTest{
16+
cn: "foo.bar",
17+
},
18+
},
19+
+
20+
+ // #86: URIs with IPv6 addresses with zones and ports are rejected
21+
+ {
22+
+ roots: []constraintsSpec{
23+
+ {
24+
+ ok: []string{"uri:example.com"},
25+
+ },
26+
+ },
27+
+ intermediates: [][]constraintsSpec{
28+
+ {
29+
+ {},
30+
+ },
31+
+ },
32+
+ leaf: leafSpec{
33+
+ sans: []string{"uri:http://[2006:abcd::1%25.example.com]:16/"},
34+
+ },
35+
+ expectedError: "URI with IP",
36+
+ },
37+
}
38+
39+
func makeConstraintsCACert(constraints constraintsSpec, name string, key *ecdsa.PrivateKey, parent *Certificate, parentKey *ecdsa.PrivateKey) (*Certificate, error) {
40+
diff --git a/src/crypto/x509/verify.go b/src/crypto/x509/verify.go
41+
index 6efbff2..2d2a271 100644
42+
--- a/src/crypto/x509/verify.go
43+
+++ b/src/crypto/x509/verify.go
44+
@@ -11,6 +11,7 @@ import (
45+
"errors"
46+
"fmt"
47+
"net"
48+
+ "net/netip"
49+
"net/url"
50+
"reflect"
51+
"runtime"
52+
@@ -429,8 +430,10 @@ func matchURIConstraint(uri *url.URL, constraint string) (bool, error) {
53+
}
54+
}
55+
56+
- if strings.HasPrefix(host, "[") && strings.HasSuffix(host, "]") ||
57+
- net.ParseIP(host) != nil {
58+
+ // netip.ParseAddr will reject the URI IPv6 literal form "[...]", so we
59+
+ // check if _either_ the string parses as an IP, or if it is enclosed in
60+
+ // square brackets.
61+
+ if _, err := netip.ParseAddr(host); err == nil || (strings.HasPrefix(host, "[") && strings.HasSuffix(host, "]")) {
62+
return false, fmt.Errorf("URI with IP (%q) cannot be matched against constraints", uri.String())
63+
}
64+
65+
--
66+
2.43.0
67+

SPECS/golang/golang-1.18.spec

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
Summary: Go
1414
Name: golang
1515
Version: 1.18.8
16-
Release: 4%{?dist}
16+
Release: 5%{?dist}
1717
License: BSD-3-Clause
1818
Vendor: Microsoft Corporation
1919
Distribution: Mariner
@@ -25,7 +25,8 @@ Patch0: go14_bootstrap_aarch64.patch
2525
# CVE-2022-41717 is fixed in 1.18.9
2626
Patch1: CVE-2022-41717.patch
2727
# CVE-2024-24790 is fixed in 1.18.8
28-
Patch2: CVE-2024-24790.patch
28+
Patch2: CVE-2024-24790.patch
29+
Patch3: CVE-2024-45341.patch
2930
Obsoletes: %{name} < %{version}
3031
Provides: %{name} = %{version}
3132
Provides: go = %{version}-%{release}
@@ -44,6 +45,7 @@ mv -v go go-bootstrap
4445
%setup -q -n go
4546
patch -Np1 --ignore-whitespace < %{PATCH1}
4647
patch -Np1 --ignore-whitespace < %{PATCH2}
48+
patch -Np1 --ignore-whitespace < %{PATCH3}
4749
%build
4850
# Build go 1.4 bootstrap
4951
pushd %{_topdir}/BUILD/go-bootstrap/src
@@ -123,7 +125,10 @@ fi
123125
%{_bindir}/*
124126

125127
%changelog
126-
* Mon July 29 2024 Bhagyashri Pathak [email protected] - 1.18.8.4
128+
* Tue Feb 04 2025 Kanishk bansal <[email protected]> - 1.18.8-5
129+
- Address CVE-2024-45341 using an upstream patch.
130+
131+
* Mon July 29 2024 Bhagyashri Pathak [email protected] - 1.18.8-4
127132
- Patch CVE-2024-24790
128133

129134
* Mon Jan 23 2022 Nicolas Guibourge <[email protected]> - 1.18.8-3

SPECS/golang/golang.spec

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
Summary: Go
1616
Name: golang
1717
Version: 1.22.7
18-
Release: 1%{?dist}
18+
Release: 2%{?dist}
1919
License: BSD-3-Clause
2020
Vendor: Microsoft Corporation
2121
Distribution: Mariner
@@ -26,6 +26,8 @@ Source1: https://dl.google.com/go/go1.4-bootstrap-20171003.tar.gz
2626
Source2: https://dl.google.com/go/go%{bootstrap_compiler_version_0}.src.tar.gz
2727
Source3: https://dl.google.com/go/go%{bootstrap_compiler_version_1}.src.tar.gz
2828
Patch0: go14_bootstrap_aarch64.patch
29+
Patch1: CVE-2024-45336.patch
30+
Patch2: CVE-2024-45341.patch
2931
Obsoletes: %{name} < %{version}
3032
Provides: %{name} = %{version}
3133
Provides: go = %{version}-%{release}
@@ -41,6 +43,8 @@ patch -Np1 --ignore-whitespace < %{PATCH0}
4143
mv -v go go-bootstrap
4244

4345
%setup -q -n go
46+
%patch 1 -p1
47+
%patch 2 -p1
4448

4549
%build
4650
# Go 1.22 requires the final point release of Go 1.20 or later for bootstrap.
@@ -156,6 +160,9 @@ fi
156160
%{_bindir}/*
157161

158162
%changelog
163+
* Tue Feb 04 2025 Kanishk bansal <[email protected]> - 1.22.7-2
164+
- Address CVE-2024-45336, CVE-2024-45341 using an upstream patch.
165+
159166
* Mon Sep 09 2024 CBL-Mariner Servicing Account <[email protected]> - 1.22.7-1
160167
- Auto-upgrade to 1.22.7 - Address CVE-2024-34158, CVE-2024-34156, CVE-2024-34155
161168

0 commit comments

Comments
 (0)