Граф коммитов

26 Коммитов

Автор SHA1 Сообщение Дата
Muhammad Falak R Wani c16735c961
golang: update 1.21.6 -> 1.21.11 to address CVE-2024-24790 (#9097)
Changelog: https://go.dev/doc/devel/release#go1.21.minor
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2024-06-10 12:37:44 +05:30
Rachel Menge 332adb9675
glibc: Fix nscd breakage and patch CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602 (#9051)
This commit does 3 things: address ipv6 breakage with nscd due to previous CVE fix, reformat previous CVE patches, and patch 4 new CVEs

The ipv6 w/ nscd breakage was due to CVE-2023-4806's patch and caused wrong results with IPv6 addresses when using nscd. The patch mixes up the variables i and count. Therefore backport the fix (227c903).

Additionally, the above fix highlighted that our original patches for CVE-2023-4806 and CVE-2023-5156 were malformed. Specifically, the CVE-2023-4806 patch which updates "/sysdeps/posix/getaddrinfo.c.” to latest from glibc-2.35 (commit 17092c0) did not include the changes to other files (mostly additional tests so impact was low) but did partially include CVE-2023-5156's changes. To fix, regenerate both patches based on commits from upstream stable 2.35.

Finally, this PR applies patches for CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602
2024-05-10 18:50:52 -07:00
Muhammad Falak R Wani bd9a5c7ce7
Upgraded `golang` version 1.20.10 -> 1.21.6 (#7640)
Changelog: https://go.dev/doc/devel/release#go1.21.0
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>
2024-02-09 15:02:54 -08:00
Nan Liu 85350c6651
Update change logs to sync up with the ones in PMC (#6750) 2023-11-14 17:01:14 -08:00
Nan Liu 15bf461433
Fix golang CVE-2023-29409, CVE-2023-39318, CVE-2023-39319, CVE-2023-39323, CVE-2023-39533 (#6470) 2023-10-31 14:50:57 -07:00
Pawel Winogrodzki 01547eeed5
Fixed CVE-2023-44487 in `nginx` and `golang` (CP of #6381) (#6395)
* Fixed CVE-2023-44487 in `nginx` and `golang` (#6381)

Co-authored-by: Dan Streetman <ddstreet@ieee.org>
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>

* Bumping 'kubernetes'.

---------

Co-authored-by: Dan Streetman <ddstreet@microsoft.com>
Co-authored-by: Dan Streetman <ddstreet@ieee.org>
2023-10-12 14:22:26 -07:00
Minghe Ren 044098bc0b
add patches for Glibc CVE-2023-4806 and CVE-2023-5156 (#6341)
* add patches for CVE

* bump dependency package release number

---------

Co-authored-by: minghe <rmhsawyer>
2023-10-06 14:55:34 -07:00
Mandeep Plaha 115ecc713d
Mandeepsplaha/patch cves against gdb (#6338)
* Patch CVE-2023-4911 in glibc
* Update all specs that build require glibc-static
2023-10-03 16:38:04 -07:00
bfjelds 1769d0f5b2
User/bfjelds/buildah CVE 2022 2990 (#6174)
* add patch for CVE-2022-2990

* add changelog and fix date

* fix version

* try fixing patch
2023-09-06 07:48:27 -07:00
Muhammad Falak R Wani e2ad74a2ca
Upgrade golang to 1.19.12 to address CVE-2023-29409 (#5946)
* golang: introduce patch to permit requests with invalid host headers

Reference: https://go-review.googlesource.com/c/go/+/518855
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-08-16 10:15:25 +05:30
Andrew Phelps 6d35fdd2fc
glibc: restore glibc-debuginfo package (#5795)
* update glibc so binaries are not stripped

* restore glibc-debuginfo
2023-07-14 16:20:19 -07:00
CBL-Mariner-Bot 78e1d24d47
Upgrade golang to 1.19.11 to fix CVE-2023-29406 (#5828) 2023-07-13 13:55:07 -07:00
CBL-Mariner-Bot c5a190f783
[AUTOPATCHER-CORE] Upgrade golang to 1.19.10 Address CVE-2023-24540, CVE-2023-29402, CVE-2023-29403, CVE-2023-29404, CVE-2023-29405 (#5689)
* Upgrade golang to 1.19.10 Adress CVEs

* Fix changelog

---------

Co-authored-by: Mitch Zhu <mitchzhu@microsoft.com>
2023-06-20 13:39:41 -07:00
Muhammad Falak R Wani a364e616af
golang: upgrade to 1.19.8 to address CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-24538 (#5228)
Reference: https://github.com/golang/go/issues?q=milestone%3AGo1.19.8+label%3ASecurity
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-04-05 21:38:04 +05:30
CBL-Mariner-Bot 42a2d6d72d
Upgrade golang to 1.19.7 to address CVE-2023-24532 (#5160)
Signed-off-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
2023-03-28 13:20:34 +05:30
CBL-Mariner-Bot 768aae23e3
Upgrade golang to 1.19.6 Address CVE-2022-41722, CVE-2022-41724, CVE-2022-41725, CVE-2022-41723 (#5096)
Co-authored-by: Rakshaa Viswanathan <46165429+rakshaa2000@users.noreply.github.com>
2023-03-17 21:20:58 +05:30
Sumynwa 4826601b58
buildah: Fix runtime requirements. (#4956) 2023-02-28 23:35:30 +05:30
CBL-Mariner-Bot 5ed28413bb
[AUTOPATCHER-CORE] Upgrade golang to 1.19.5 upgrade to latest - (#4759)
* Upgrade golang to 1.19.5 upgrade to latest

* remove release bump of spec that should stay on golang 1.18.8 or below
2023-02-03 20:56:43 +01:00
CBL-Mariner-Bot 63c1d45e66
[AUTOPATCHER-CORE] Upgrade golang to 1.19.4 upgrade to latest - (#4643)
* Upgrade golang to 1.19.4 upgrade to latest

* fix issues due to golang 1.19.4 upgrade

* re-add CVE-2022-41717.patch which is required by golang 1.17 spec

* clean up gh dependencies
2023-01-19 18:37:17 +01:00
Sam Meluch df80b9e578
Sammeluch/revert nbdkit to core (#4358)
* Revert "Patch buildah for CVE-2022-27651 (#4264)"

This reverts commit d1fadabbd6.

* Revert "Move nbdkit and its dependent packages from Extended to Core (#4163)"

This reverts commit 21d673ed73.
2022-12-02 16:15:28 -08:00
Ameya Usgaonkar 21d673ed73
Move nbdkit and its dependent packages from Extended to Core (#4163)
The dependent packages being Podman, Containernetworking-plugins, go-rpm-macros, catatonit, slirp4netns and buildah.
2022-11-14 09:50:13 +05:30
Olivia Crain a828f488f8
Upgrade golang to 1.18.8 to fix CVE-2022-2879, CVE-2022-2880, CVE-2022-41715, CVE-2022-27664, CVE-2022-32190 (#4157) 2022-11-01 16:37:38 -07:00
Andy Caldwell 366add1699
Police `glibc-static` versions (#3748)
* Make `glibc-static` a real package and police its version

* Add version bounds to all mentions of `glibc-static` in spec files

* Bump releases for all affected packages

* Add pipeline job to check static glibc versions

* Release new glibc packages with split out glibc-static

* Include distribution in requirement bounds

* Don't implicitly install glibc-static in pkggen chroot

* Correctly split up the static libraries between devel/static

* Consistent use of f-strings

* Allow libacvp to build without depending on `glibc-static`

* Remove `libhugetlbfs-tests` package

* Update kernel configs to not support static linking

* Declare `glibc-static` dependency for flannel

* Enable `-pie` by default in `clang`

* Rebuild SymCrypt with `-pie` enabled `clang`

* Use `glibc-static` on all platforms for `busybox`

* Tidy up libacvp Source lines

* Clang can't default to `-pie` so move `crt1.o` to `glibc-devel`

* Fix libacvp Source0 syntax

* Don't build static binaries in libhugetlbfs-tests

* Update kernel config signatures

* Kubevirt needs glibc-static too
2022-10-12 16:30:40 +01:00
Olivia Crain fdc6619ad3
Bump supported go versions to 1.17.13, 1.18.5 to fix fifteen CVEs (#3600)
Co-authored-by: Pawel Winogrodzki <pawelwi@microsoft.com>
2022-08-24 09:01:02 -07:00
Pawel Winogrodzki b42c6eaea7
[main][SPECS-EXTENDED] Fixing `buildach`, `libpsm2`, `podman`, and `sblim-*` packages. (#2369) 2022-03-01 17:18:03 -08:00
Thomas Crain a3e8771c8f
[main] Add SPECS-EXTENDED folder and populate with 2159 packages (#1754)
* Add specs-extended collection

* Update log4j for CVE-2021-44228
2021-12-13 10:40:12 -08:00