Граф коммитов

15 Коммитов

Автор SHA1 Сообщение Дата
CBL-Mariner-Bot bf54124512
[AUTO-CHERRYPICK] Patch Busybox for CVE-2021-42380, CVE-2023-42363, CVE-2023-42364 & CVE-2023-42365 - branch main (#10130)
Co-authored-by: suresh-thelkar <suresh.thelkar@yahoo.com>
2024-08-19 11:39:37 -07:00
Rachel Menge 332adb9675
glibc: Fix nscd breakage and patch CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 (#9051)
This commit does 3 things: address ipv6 breakage with nscd due to previous CVE fix, reformat previous CVE patches, and patch 4 new CVEs

The ipv6 w/ nscd breakage was due to CVE-2023-4806's patch and caused wrong results with IPv6 addresses when using nscd. The patch mixes up the variables i and count. Therefore backport the fix (227c903).

Additionally, the above fix highlighted that our original patches for CVE-2023-4806 and CVE-2023-5156 were malformed. Specifically, the CVE-2023-4806 patch which updates "/sysdeps/posix/getaddrinfo.c.” to latest from glibc-2.35 (commit 17092c0) did not include the changes to other files (mostly additional tests so impact was low) but did partially include CVE-2023-5156's changes. To fix, regenerate both patches based on commits from upstream stable 2.35.

Finally, this PR applies patches for CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602
2024-05-10 18:50:52 -07:00
Chris PeBenito 0a74e855b4
busybox: Enable SELinux features. (#6772)
Signed-off-by: Chris PeBenito <chpebeni@linux.microsoft.com>
2023-11-17 14:44:09 -05:00
Minghe Ren 044098bc0b
add patches for Glibc CVE-2023-4806 and CVE-2023-5156 (#6341)
* add patches for CVE

* bump dependency package release number

---------

Co-authored-by: minghe <rmhsawyer>
2023-10-06 14:55:34 -07:00
Mandeep Plaha 115ecc713d
Mandeepsplaha/patch cves against gdb (#6338)
* Patch CVE-2023-4911 in glibc
* Update all specs that build require glibc-static
2023-10-03 16:38:04 -07:00
jslobodzian eb08b37916
Bump package version to recompile binaries with fixed gcc stack prote… (#6253)
* Bump package version to recompile binaries with fixed gcc stack protection (CVE-2023-4039)

* Bump debuginfo versions in toolchain manifests

* Bump kernel headers to match kernel

* Update SPECS/gettext/gettext.spec

Taking suggestion

Co-authored-by: Muhammad Falak R Wani <falakreyaz@gmail.com>

* Update for code review comments

* Fix for code review comment in qt5-qtdeclarative changelog

* Fix dash version for signed spec files

---------

Co-authored-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-09-21 17:10:15 -04:00
Andrew Phelps 6d35fdd2fc
glibc: restore glibc-debuginfo package (#5795)
* update glibc so binaries are not stripped

* restore glibc-debuginfo
2023-07-14 16:20:19 -07:00
Andy Caldwell 366add1699
Police `glibc-static` versions (#3748)
* Make `glibc-static` a real package and police its version

* Add version bounds to all mentions of `glibc-static` in spec files

* Bump releases for all affected packages

* Add pipeline job to check static glibc versions

* Release new glibc packages with split out glibc-static

* Include distribution in requirement bounds

* Don't implicitly install glibc-static in pkggen chroot

* Correctly split up the static libraries between devel/static

* Consistent use of f-strings

* Allow libacvp to build without depending on `glibc-static`

* Remove `libhugetlbfs-tests` package

* Update kernel configs to not support static linking

* Declare `glibc-static` dependency for flannel

* Enable `-pie` by default in `clang`

* Rebuild SymCrypt with `-pie` enabled `clang`

* Use `glibc-static` on all platforms for `busybox`

* Tidy up libacvp Source lines

* Clang can't default to `-pie` so move `crt1.o` to `glibc-devel`

* Fix libacvp Source0 syntax

* Don't build static binaries in libhugetlbfs-tests

* Update kernel config signatures

* Kubevirt needs glibc-static too
2022-10-12 16:30:40 +01:00
Muhammad Falak R Wani 9a87454201
busybox: patch CVE-2022-30065 (#3516)
Also introduce three more fixes from upstream:
* e2952dfaf awk: input numbers are never octal or hex
* e63d7cdfd awk: fix use after free (CVE-2022-30065)
* daa66ed62 ash: fix use-after-free in pattern substituon code
* 7c2a3bdde ash: fix use-after-free in bash pattern substitution

Reference: https://bugs.busybox.net/show_bug.cgi?id=14781
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2022-08-11 18:19:20 +05:30
Pawel Winogrodzki 88e0b9c7eb
`busybox`: patching CVE-2022-28391. (#3031)
* Patching CVE-2022-28391 in 'busybox'.

* Switching to using '%autosetup'.
2022-05-20 14:09:36 -07:00
Henry Li 5026c400b3
upgrade busybox (#1863)
Co-authored-by: Henry Li <lihl@microsoft.com>
2022-01-07 10:03:01 -08:00
Henry Beberman 760eb4762a
busybox patch CVE-2021-28831 (#800) 2021-03-26 16:22:26 -07:00
Mateusz Malisz 0695cac045
Add distroless containers (#403)
Co-authored-by: Jon Slobodzian <joslobo@microsoft.com>
2020-12-15 16:31:49 -08:00
jslobodzian 534d5bfc58
Revert "Implement "distroless" containers (#252)" (#264)
This reverts commit e41efdda19.
2020-10-25 18:37:45 -07:00
Mateusz Malisz e41efdda19
Implement "distroless" containers (#252)
* Create distroless container without bash and surplus dependencies
* Remove RPM database for distroless
* Add busybox and uclibc. Add distroless-packages-debug
* Update cgmanifest

Co-authored-by: Jon Slobodzian <joslobo@microsoft.com>
Co-authored-by: MateuszMalisz <mamalisz@microsoft.com>
2020-10-24 11:28:47 +02:00