Граф коммитов

24 Коммитов

Автор SHA1 Сообщение Дата
Tobias Brick d80ac5964f
fix: add setuid bit to necessary binaries so regular users can run them (#5573) 2023-05-24 12:23:15 -07:00
Sam Meluch 39e584023c
Revert "[AUTOPATCHER-CORE] Patched shadow-utils to address CVE-2023-29383 - (#5439)" (#5458)
This reverts commit dcf65bb327.
2023-05-04 17:49:38 -07:00
CBL-Mariner-Bot dcf65bb327
[AUTOPATCHER-CORE] Patched shadow-utils to address CVE-2023-29383 - (#5439)
* Patch shadow-utils to address CVE-2023-29383

* Update SPECS/shadow-utils/shadow-utils.spec for spec linting

Co-authored-by: Muhammad Falak R Wani <falakreyaz@gmail.com>

---------

Co-authored-by: Rakshaa Viswanathan <46165429+rakshaa2000@users.noreply.github.com>
Co-authored-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-05-03 10:18:22 +05:30
Minghe Ren e519da0abd
Security changes to meet Azure security baseline (#3713)
* first commit of MarinerFedRamp2.0

* first commit for FedRAMP2.0

* patched all the asc cases in source code

* address Daniel's review comments for Mariner 2.0 FedRAMP

* move dsiabling ICMP redirect from source to packer

* Update SPECS/shadow-utils/shadow-utils.spec

Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>

* Update SPECS/fedramp/fedramp.spec

Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>

* address the comments in 2nd round reviews

* add asc.spec to replace fedramp.spec

* delete fedramp spec

* fix typo and remove changes for system-password

* update manifest file

* remove some unnecessary changes

* add empty line at end

* update to pass PR check

* address 1st round review comments

* update changelog for license

* address review comments

* remove ssh access

Co-authored-by: rmhsawyer <mingheren@gmail.com>
Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>
2022-09-13 11:33:30 -07:00
Andrew Phelps 801b122599
Move su from shadow-utils to util-linux (#3336)
* move su from shadow-utils to util-linux

* update manifests

* remove su pam config from shadow-utils

* restore su pam from shadow-utils

* fix su file

* fix shadow-utils BR

* update changelog

* update based on PR feedback
2022-07-08 13:08:25 -07:00
Minghe Ren 9d9da4f6ea
change /etc/shadow permission to 000 (#2782)
* change /etc/shadow permission to 000

* make shadow folder trackable

Co-authored-by: minghe <mingheren@microsoft.com>
2022-04-21 17:48:02 -07:00
rlmenge 9bce2a6748
Add requires libpwquality to shadow-utils (#2605)
Without this requires, chpasswd fails to locate the
pam_chauthtok() module.
2022-03-28 13:07:31 -07:00
Andrew Phelps 13c17c5af1
Fix build issue with audit and shadow-utils (#2537)
* modify build requires

* disable bubblewrap manuals

* include manuals in shadow-utils
2022-03-17 13:07:18 -07:00
Andrew Phelps 164099e63d
Add audit support to pam, openssh, shadow-utils, util-linux (#2416)
* add audit to toolchain

* update specs to build with audit

* enable audit in configuration steps

* update manifests

* fix util-linux files

* remove systemd files

* add audit and audit-libs to worker chroot

* remove circular dependency

* update sudo with audit support
2022-03-10 11:13:24 -08:00
Andrew Phelps d7cb7c78e9
Update toolchain and packages to build with gcc 11.2.0 and glibc 2.34 (#1623)
* update coreutils and texinfo specs

* update coreutils and texinfo in toolchain

* fix patch url

* update binutils to 2.37

* update version in manifests

* update util-linux mpfr mpc gmp

* fix mpfr tarball

* fix gmp

* update cgmanifest.json

* cleanup

* restore binutils patch

* fix gmp and mpfr specs

* update util-linux spec

* fix binutils and util-linux breaks

* update kernel CONFIG_LD_VERSION

* bump kernel release

* remove reference to rpm-define-RPM-LD-FLAGS.patch

* fix gen-ld-script.sh sha256sum

* update gcc spec to 11.2.0

* update kernel configs for gcc

* update cgmanifest

* update gcc to 11.2.0 in raw toolchain

* add patch for gcc texi issue

* update glibc to 2.34

* update manifests for diffutils and glibc

* disable tm_texi patch in toolchain

* fix SIGSTKSZ gcc issue

* patch m4 for glibc 2.34

* update make to 4.3 and diffutils to 3.8

* revert make to 4.2.1 due to operation not permitted error

* fix make and texinfo build issues with glibc 2.34

* dont build zstd in temp toolchain due to gcc build errors

* remove glibc workarounds for fintutils and gzip

* update findutils and gzip

* update gzip and findutils specs

* update gdbm to 1.21

* update elfutils to 1.185 in toolchain. fix manifests

* remove findutils test change

* remove texinfo patch

* fix kernel changelogs

* add patch for cpio extern issue

* restore rpm patch

* fix m4 spec

* fix elfutils and gpgme spec issues

* fix kernel-hyperv changelog

* update kbd and libtirpc to resolve gcc 11.2.0 issues

* fix m4 version in pkggen_core

* fix libtirpc in manifests

* fix nss error

* fix openjdk

* fix aarch64 openjdk8

* fix elfutils spec

* GODEBUG=netdns=go

* verbose rpm query

* fix coreutils on aarch64. use rpm 1.14.2.1 in raw toolchain. revert rpm.go

* bump cpio release

* revert rpm.go change

* cleanup toolchain scripts and specs. parallel make for glibc

* enable fortran

* remove aarch64 ld-2.27.so link

* add gfortran to toolchain manifests

* fix binutils changelog

* fix kernel release version

* update bison grep sed tar

* add glibc pthread patch

* upgrade file gawk and xz. fix sed and grep spec issues

* set -fcommon

* revert file to 5.34

* fix temp gawk version

* fix xz man1 files

* update libgpg-error to 1.43

* add ld-linux-aarch64.so.1 to glibc spec

* use /lib/ld-linux-aarch64.so.1

* update file 5.40 and bzip2 1.0.8 in toolchain. openjdk8 remove -fcommon.

* update to perl 5.32.0 in toolchain

* fix glibc aarch64 exclude. add shadow-utils provides. fix perl src filename

* fix efivar build. upgrade dtc

* Removing 'ctags'.

* Updating 'libacvp' to version 1.4.1.

* Updating 'nlohmann-json' to version 3.10.4.

* Updating 'dhcp.spec' CFLAGS to include CBL-Mariner's defaults.

* update and fix ipxe build. remove perl debuginfo.

* add fixes for autofs and libcomps

* Adjusting build steps for 'dhcp' and 'nlohmann-json'.

* fix rocksdb

* fix ntp

* fix libcomps url in cgmanifest. revert perl change

* fix nfs-utils

* fix azure-iot-sdk-c

* Remove 'tboot'.

* fix qemu-kvm

* update R and ant

* Updating 'libiothsm-std' to version 1.2.5.

* Linting.

* Remove tcp_wrappers  package

* fix syslinux

* Downgrading 'libiothsm-std' to 1.1.8.

* fix fuse. fix libcomps url

* Downgrading 'libacvp' to 1.3.0.

* Applying GCC 11 patch.

* fix fuse configure.ac issue

* Fixing 'libiothsm-std' build.

* Upgrade lldpad to 1.1.0

* Upgrade gdb to 11.1

* Upgrade catch to 2.13.7

* fixup! Upgrade gdb to 11.1

* fixup! Upgrade lldpad to 1.1.0

* remove bazel

* Updating 'toml11' to version 3.7.0.

* update cgmanifest for catch gdb lldpad

* fix qt5-qtbase

* fix device-mapper-multipath

* fix syslinux

* fix grpc

* fix kernel configs

* fix kernel-hyperv config

* increase heap size for ant

* update lttng-consume

* fix auoms

* update valgrind. fix arm64 gdb issue

* update arm64 kernel config

* fix blobfuse

* update and fix azure-iotedge

* fix grpc 1.41.1 in cgmanifest

* fix kernel and kernel-hyperv PTHREAD_STACK_MIN issue

* remove ant ant-contrib jna R

* Updating 'azure-iotedge' sources creation instructions.

* add back ant ant-contrib bazel jna R

* restrict jdk8 packages

* verify licenses

* only build conda picosat python-pycosat on arm64. fix cgmanifest

* update openjdk8 to version 1.8.0.302

* fix cgmanifest for ant and R

* always build ant

* update licenses. remove tdnf workaround. bump shadow-utils release

* update LICENSES-MAP.md to remove tboot ctags tcp_wrappers. bump libavcp release

* fix ant builds only on arm64

* Clarifying license for 'ntp'.

* Verifying license for 'ant-contrib'.

* Verifying more specs.

* revert libabcvp CFLAGS changes

* add kernel patch file

* set -fcommon to fix libacvp build

* fix python-filelock

* revert tdnf line change

Co-authored-by: CBL-Mariner Service Account <cblmargh@microsoft.com>
Co-authored-by: Pawel Winogrodzki <pawel.winogrodzki@microsoft.com>
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>
Co-authored-by: Thomas Crain <thcrain@microsoft.com>
2021-11-17 21:41:55 -08:00
Chris PeBenito 1e2e1afe61 shadow-utils: Make pam_loginuid optional.
This requires audit, which isn't used on all systems.
2021-10-26 17:56:25 +00:00
Pawel Winogrodzki bd5407103a
[dev] `cyrus-sasl`: adding and splitting subpackages (second attempt) (#1401) 2021-09-21 16:05:10 -07:00
Chris PeBenito f4a923205f shadow-utils: Update SELinux and loginuid session entries.
The current pam.d config sets the loginuid by su/sudo. The loginuid should
always reflect the UID that the user logged in as.

Add pam_selinux.so to login configs so users will have the correct SELinux
context on their session.

Signed-off-by: Chris PeBenito <Christopher.PeBenito@microsoft.com>
2021-09-16 18:46:13 +00:00
Thomas Crain 0b47438614
Use pam_pwquality in system-password PAM config (#1392) 2021-09-13 14:10:47 -07:00
jslobodzian 17b0e93e71
Merge 1.0 to dev branch
This merge brings the latest SELinux and many packages and CVE fixes from the 1.0 branch.
2021-08-19 13:46:51 -07:00
Thomas Crain 4859da4e1b Merge branch '1.0' into thcrain/pain (March Update) 2021-04-13 15:40:16 -05:00
Thomas Crain eae5b4006f Merge branch '1.0' into thcrain/ever-given 2021-04-06 22:39:22 -05:00
Henry Li 9ee0a38a19
Update shadow-utils and td-agent (#683)
* update shadow-utils and td-agent

* fix linting

* update td-agent Requires

* fix more comments

Co-authored-by: Henry Li <lihl@microsoft.com>
2021-03-02 13:47:55 -08:00
Joe Schmitt 4f6e6fafc0
[dev] Add additional provides to several specs (#467) 2021-01-04 09:22:01 -08:00
chalamalasetty d2b2216972
Remove password aging customized value to set default (#468)
* Increase maxium number of days a password can be used

* Update shadow utils version for toolchain deps

* Update lint changes as per build logs

* Remove PASS_MAX_DAYS customized value 90 to set default value

* Update var in SPEC file by removing macro

Co-authored-by: Suresh Babu Chalamalasetty <schalam@microsoft.com>
2020-12-16 14:30:38 -08:00
Joe Schmitt c1d384b3ad
[dev] Add additional provides and macros (#355) 2020-11-09 15:26:36 -08:00
jslobodzian 791c4b9e19
Build Break Fix: Rollback selinux checkins. (#204)
* Revert "Add missing %libsepolver definition in secilc.spec (#192)"

This reverts commit 9cff088bec.

* Revert "Add SELinux packages to Mariner. (#100)"

This reverts commit b2d918efac.
2020-10-13 19:37:01 -07:00
Daniel Burgener b2d918efac
Add SELinux packages to Mariner. (#100)
* Add SELinux packages to Mariner.

This commit add the following packages to Mariner to provide basic
SELinux support:

- checkpolicy
- libsemanage
- mcstrans
- policycoreutils
- secilc
- selinux-policy
- setools

The selinux-policy provided here is a generic base policy, which is not
specifically tuned for Mariner, therefore only permissive mode support
is enabled in this commit.  (Although users could load a custom policy
to run in enforcing mode).  Future phases have been discussed to add
SELinux enforcing mode support.

This commit does not enable SELinux by default.  In order to enable
SELinux support, one must first install necessary packages (libselinux,
policycoreutils, secilc, selinux-policy), and then append "lsm=selinux
selinux=1" to the kernel command line.  This will trigger an initial
boot to relabel the system, at which point the system will reboot, and
boot into an SELinux enabled system.  SELinux state can be queried with
the "getenforce" command line tool.  If SELinux has not been enabled, it
will report "Disabled" (the default).  If SELinux support has been
enabled as described in this paragraph, it will report "permissive".

This commit also modifies the following packages to enabled SELinux
functionality in existing packages:

- coreutils
- cronie
- dbus
- openssh
- pam
- rpm
- shadow-utils
- systemd
- util-linux

This enables them to build with SELinux support so that when SELinux is
enabled, they have SELinux related functionality available.

Because coreutils is a basic package and requires building with
libselinux-devel present in order to enable key SELinux functionality,
several dependencies in other packages that rely on coreutils (namely
python2, python3 and systemd-bootstrap) had to be removed in order to
avoid circular dependencies.  There does not appear to be a functional
impact from this change based on my testing.
2020-10-07 09:13:55 -04:00
Jon Slobodzian b877013b27 Initial CBL-Mariner commit to GitHub 2020-08-06 20:17:52 -07:00