Skip to content

Commit e96d12e

Browse files
authored
Merge pull request #5303 from microsoft/anphel/1.0-april-2023-update
Merge for Mariner 1.0 April 2023 update
2 parents 073df86 + fd47ae3 commit e96d12e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+934
-3333
lines changed
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"Signatures": {
3-
"c-ares-1.18.1.tar.gz": "1a7d52a8a84a9fbffb1be9133c0f6e17217d91ea5a6fa61f6b4729cda78ebbcf"
4-
}
2+
"Signatures": {
3+
"c-ares-1.19.0.tar.gz": "bfceba37e23fd531293829002cac0401ef49a6dc55923f7f92236585b7ad1dd3"
4+
}
55
}

SPECS/c-ares/c-ares.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Summary: A library that performs asynchronous DNS operations
22
Name: c-ares
3-
Version: 1.18.1
3+
Version: 1.19.0
44
Release: 1%{?dist}
55
License: MIT
66
Vendor: Microsoft Corporation
@@ -70,6 +70,9 @@ rm -rf %{buildroot}
7070
%{_mandir}/man3/ares_*
7171

7272
%changelog
73+
* Tue Apr 04 2023 CBL-Mariner Servicing Account <[email protected]> - 1.19.0-1
74+
- Auto-upgrade to 1.19.0 - To Address CVE-2022-4904
75+
7376
* Sun Nov 28 2021 Muhammad Falak <[email protected]> - 1.18.1-1
7477
- Bump version to fix CVE-2021-3672
7578

SPECS/ca-certificates/ca-certificates.signatures.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
"README.usr": "0d2e90b6cf575678cd9d4f409d92258ef0d676995d4d733acdb2425309a38ff8",
1212
"bundle2pem.sh": "a61e0d9f34e21456cfe175e9a682f56959240e66dfeb75bd2457226226aa413a",
1313
"certdata.base.txt": "76c4cd1860b9a6f6ee9c2a0dcddcef46f65950b7ec12d2a7eeabeedca4e379f9",
14-
"certdata.microsoft.txt": "7c9a314f528f5f353b478caaea8be051ad6b2ff99dca2754206afb632093fe47",
14+
"certdata.microsoft.txt": "53fa416b306459da67127b12c17fb33d9598f0c085148578689066e84b00018e",
1515
"certdata2pem.py": "4f5848c14210758f19ab9fdc9ffd83733303a48642a3d47c4d682f904fdc0f33",
1616
"pem2bundle.sh": "f96a2f0071fb80e30332c0bd95853183f2f49a3c98d5e9fc4716aeeb001e3426",
1717
"trust-fixes": "01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b",

SPECS/ca-certificates/ca-certificates.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Name: ca-certificates
4444

4545
# When updating, "Version" AND "Release" tags must be updated in the "prebuilt-ca-certificates" package as well.
4646
Version: 20200720
47-
Release: 29%{?dist}
47+
Release: 30%{?dist}
4848
License: MPLv2.0
4949
Vendor: Microsoft Corporation
5050
Distribution: Mariner
@@ -319,6 +319,9 @@ rm -f %{pkidir}/tls/certs/*.{0,pem}
319319
%{_bindir}/bundle2pem.sh
320320

321321
%changelog
322+
* Thu Mar 30 2023 CBL-Mariner Service Account <[email protected]> - 20200720-30
323+
- Updating Microsoft trusted root CAs.
324+
322325
* Mon Dec 12 2022 Pawel Winogrodzki <[email protected]> - 20200720-29
323326
- Adding 'Obsoletes' for the old 'ca-certificates-microsoft' packages before release 19.
324327

SPECS/ca-certificates/certdata.microsoft.txt

Lines changed: 219 additions & 3204 deletions
Large diffs are not rendered by default.
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
diff -Naur a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs
2+
--- a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs 2021-04-25 17:00:00.000000000 -0700
3+
+++ b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/src/primitives.rs 2023-04-05 15:33:56.893718099 -0700
4+
@@ -367,6 +367,16 @@
5+
let entries: Vec<<T as FamStruct>::Entry> =
6+
Vec::deserialize(reader, version_map, app_version)
7+
.map_err(|ref err| VersionizeError::Deserialize(format!("{:?}", err)))?;
8+
+ if header.len() != entries.len() {
9+
+ let msg = format!(
10+
+ "Mismatch between length of FAM specified in FamStruct header ({}) \
11+
+ and actual size of FAM ({})",
12+
+ header.len(),
13+
+ entries.len()
14+
+ );
15+
+
16+
+ return Err(VersionizeError::Deserialize(msg));
17+
+ }
18+
// Construct the object from the array items.
19+
// Header(T) fields will be initialized by Default trait impl.
20+
let mut object = FamStructWrapper::from_entries(&entries)
21+
diff -Naur a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs
22+
--- a/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs 2021-04-25 17:00:00.000000000 -0700
23+
+++ b/.cargo/registry/src/github.com-1ecc6299db9ec823/versionize-0.1.6/tests/test.rs 2023-04-05 15:34:57.145737780 -0700
24+
@@ -1321,6 +1321,32 @@
25+
type Message2FamStructWrapper = FamStructWrapper<Message2>;
26+
27+
#[test]
28+
+fn test_deserialize_famstructwrapper_invalid_len() {
29+
+ let mut vm = VersionMap::new();
30+
+ vm.new_version()
31+
+ .set_type_version(Message::type_id(), 2)
32+
+ .new_version()
33+
+ .set_type_version(Message::type_id(), 3)
34+
+ .new_version()
35+
+ .set_type_version(Message::type_id(), 4);
36+
+
37+
+ // Create FamStructWrapper with len 2
38+
+ let state = MessageFamStructWrapper::new(0).unwrap();
39+
+ let mut buffer = [0; 256];
40+
+
41+
+ state.serialize(&mut buffer.as_mut_slice(), &vm, 2).unwrap();
42+
+
43+
+ // the `len` field of the header is the first serialized field.
44+
+ // Let's corrupt it by making it bigger than the actual number of serialized elements
45+
+ buffer[0] = 255;
46+
+
47+
+ assert_eq!(
48+
+ MessageFamStructWrapper::deserialize(&mut buffer.as_slice(), &vm, 2).unwrap_err(),
49+
+ VersionizeError::Deserialize("Mismatch between length of FAM specified in FamStruct header (255) and actual size of FAM (0)".to_string())
50+
+ );
51+
+}
52+
+
53+
+#[test]
54+
fn test_versionize_famstructwrapper() {
55+
let mut vm = VersionMap::new();
56+
vm.new_version()

SPECS/cloud-hypervisor/cloud-hypervisor.spec

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Summary: A Rust-VMM based cloud hypervisor from Intel
22
Name: cloud-hypervisor
33
Version: 22.0
4-
Release: 1%{?dist}
4+
Release: 2%{?dist}
55
License: ASL 2.0 or BSD
66
URL: https://github.com/cloud-hypervisor/cloud-hypervisor
77
Group: Development/Tools
@@ -12,6 +12,7 @@ Source0: %{url}/archive/v%{version}.tar.gz#/%{name}-%{version}.tar.gz
1212
# To update the cache run:
1313
# [repo_root]/toolkit/scripts/build_cargo_cache.sh %%{name}-%%{version}.tar.gz
1414
Source1: %{name}-%{version}-cargo.tar.gz
15+
Patch0: CVE-2023-28448.patch
1516
ExclusiveArch: x86_64
1617

1718
BuildRequires: gcc
@@ -28,6 +29,7 @@ A Rust-VMM based cloud hypervisor from Intel.
2829
mkdir -p $HOME
2930
pushd $HOME
3031
tar xf %{SOURCE1} --no-same-owner
32+
%patch0 -p1
3133
popd
3234
%setup -q
3335

@@ -49,6 +51,9 @@ install -d %{buildroot}%{_libdir}/cloud-hypervisor
4951
%exclude %{_libdir}/debug
5052

5153
%changelog
54+
* Wed Apr 05 2023 Henry Beberman <[email protected]> - 22.0-2
55+
- Patch CVE-2023-28448 in vendored versionize crate
56+
5257
* Wed Mar 09 2022 Pawel Winogrodzki <[email protected]> - 22.0-1
5358
- Updating to version 22.0 to build with 'rust' 1.59.0.
5459

SPECS/kernel/CVE-2023-1079.nopatch

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1079 - patched in 5.10.173 - (generated by autopatch tool)
2+
upstream 4ab3a086d10eeec1424f2e8a968827a6336203df - stable 21a2eec4a440060a6eb294dc890eaf553101ba09
3+

SPECS/kernel/CVE-2023-1281.nopatch

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1281 - patched in 5.10.169 - (generated by autopatch tool)
2+
upstream ee059170b1f7e94e55fa6cadee544e176a6e59c2 - stable eb8e9d8572d1d9df17272783ad8a84843ce559d4
3+

SPECS/kernel/CVE-2023-1390.nopatch

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2023-1390 - patched in 5.10.10 - (generated by autopatch tool)
2+
upstream b77413446408fdd256599daf00d5be72b5f3e7c6 - stable 60b8b4e6310b7dfc551ba68e8639eeaf70a0b2dd
3+

0 commit comments

Comments
 (0)