Skip to content

Commit

Permalink
Merge pull request #4926 from microsoft/olivia/merge
Browse files Browse the repository at this point in the history
Merge 1.0-dev for February 2023 Release 3
  • Loading branch information
jslobodzian authored Feb 25, 2023
2 parents 69d4918 + 482eda4 commit 534dfba
Show file tree
Hide file tree
Showing 79 changed files with 1,964 additions and 568 deletions.
1 change: 1 addition & 0 deletions CVE-2023-0796.nopatch
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
The CVE-2023-0795.patch also fixes CVE-2023-0796
1 change: 1 addition & 0 deletions CVE-2023-0797.nopatch
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
The CVE-2023-0795.patch also fixes CVE-2023-0797
1 change: 1 addition & 0 deletions CVE-2023-0798.nopatch
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
The CVE-2023-0795.patch also fixes CVE-2023-0798
1 change: 1 addition & 0 deletions CVE-2023-0799.nopatch
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
The CVE-2023-0795.patch also fixes CVE-2023-0799
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
Summary: Signed GRand Unified Bootloader for %{buildarch} systems
Name: grub2-efi-binary-signed-%{buildarch}
Version: 2.06~rc1
Release: 9%{?dist}
Release: 10%{?dist}
License: GPLv3+
Vendor: Microsoft Corporation
Distribution: Mariner
Expand Down Expand Up @@ -54,6 +54,9 @@ cp %{SOURCE1} %{buildroot}/boot/efi/EFI/BOOT/%{grubefiname}
/boot/efi/EFI/BOOT/%{grubefiname}

%changelog
* Wed Feb 08 2023 Dan Streetman <[email protected]> - 2.06~rc1-10
- CVE-2022-3775

* Wed Dec 28 2022 Osama Esmail <[email protected]> - 2.06~rc1-9
- Bump release number to match grub release number

Expand Down
8 changes: 7 additions & 1 deletion SPECS-SIGNED/kernel-signed/kernel-signed.spec
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
%define uname_r %{version}-%{release}
Summary: Signed Linux Kernel for %{buildarch} systems
Name: kernel-signed-%{buildarch}
Version: 5.10.167.1
Version: 5.10.168.1
Release: 1%{?dist}
License: GPLv2
Vendor: Microsoft Corporation
Expand Down Expand Up @@ -147,6 +147,12 @@ ln -sf linux-%{uname_r}.cfg /boot/mariner.cfg
%endif

%changelog
* Wed Feb 22 2023 CBL-Mariner Servicing Account <[email protected]> - 5.10.168.1-1
- Auto-upgrade to 5.10.168.1

* Wed Feb 15 2023 Rachel Menge <[email protected]> - 5.10.167.1-2
- Bump release number to match kernel release

* Tue Feb 07 2023 CBL-Mariner Servicing Account <[email protected]> - 5.10.167.1-1
- Auto-upgrade to 5.10.167.1

Expand Down
2 changes: 1 addition & 1 deletion SPECS/bind/bind.signatures.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"Signatures": {
"bind-9.16.33.tar.xz": "ec4fbea4b2e368d1824971509e33fa159224ad14b436034c6bcd46104c328d91"
"bind-9.16.37.tar.xz": "0e4661d522a2fe1f111c1f0685e7d6993d657f81dae24e7a75dbd8db3ef2e2ab"
}
}
45 changes: 26 additions & 19 deletions SPECS/bind/bind.spec
Original file line number Diff line number Diff line change
@@ -1,24 +1,26 @@
Summary: Domain Name System software
Name: bind
Version: 9.16.33
Version: 9.16.37
Release: 1%{?dist}
License: ISC
Vendor: Microsoft Corporation
Distribution: Mariner
Group: Development/Tools
URL: https://www.isc.org/downloads/bind/
Source0: https://ftp.isc.org/isc/bind9/%{version}/%{name}-%{version}.tar.xz
# CVE-2019-6470 is fixed by updating the dhcp package to 4.4.1 or greater
Patch0: CVE-2019-6470.nopatch
Group: Development/Tools
Vendor: Microsoft Corporation
Distribution: Mariner
Requires: openssl
Requires: libuv
Requires(pre): /usr/sbin/useradd /usr/sbin/groupadd
Requires(postun):/usr/sbin/userdel /usr/sbin/groupdel
BuildRequires: openssl-devel
BuildRequires: libcap-devel
BuildRequires: python3
BuildRequires: python-ply
BuildRequires: libuv-devel
BuildRequires: openssl-devel
BuildRequires: python-ply
BuildRequires: python3
Requires: libuv
Requires: openssl
Requires(postun): %{_sbindir}/groupdel
Requires(postun): %{_sbindir}/userdel
Requires(pre): %{_sbindir}/groupadd
Requires(pre): %{_sbindir}/useradd
# Enforce fix for CVE-2019-6470
Conflicts: dhcp < 4.4.1

Expand All @@ -28,13 +30,14 @@ for the Internet. It is a reference implementation of those protocols, but it is
also production-grade software, suitable for use in high-volume and high-reliability applications.

%package utils
Summary: BIND utilities
Summary: BIND utilities

%description utils
%{summary}.


%prep
%autosetup -p1

%build
./configure \
--prefix=%{_prefix}
Expand All @@ -44,29 +47,30 @@ make -C lib/bind9 %{?_smp_mflags}
make -C lib/isccfg %{?_smp_mflags}
make -C lib/irs %{?_smp_mflags}
make -C bin/dig %{?_smp_mflags}

%install
make -C bin/dig DESTDIR=%{buildroot} install
find %{buildroot} -name '*.la' -delete
find %{buildroot} -type f -name "*.la" -delete -print
mkdir -p %{buildroot}/%{_sysconfdir}
mkdir -p %{buildroot}/%{_prefix}/lib/tmpfiles.d
mkdir -p %{buildroot}/%{_libdir}/tmpfiles.d
cat << EOF >> %{buildroot}/%{_sysconfdir}/named.conf
zone "." in {
type master;
allow-update {none;}; // no DDNS by default
};
EOF
echo "d /run/named 0755 named named - -" > %{buildroot}/%{_prefix}/lib/tmpfiles.d/named.conf
echo "d /run/named 0755 named named - -" > %{buildroot}/%{_libdir}/tmpfiles.d/named.conf

%pre
if ! getent group named >/dev/null; then
groupadd -r named
fi
if ! getent passwd named >/dev/null; then
useradd -g named -d /var/lib/bind\
useradd -g named -d %{_sharedstatedir}/bind\
-s /bin/false -M -r named
fi
%post -p /sbin/ldconfig

%post -p /sbin/ldconfig
%postun
/sbin/ldconfig
if getent passwd named >/dev/null; then
Expand All @@ -81,9 +85,12 @@ fi
%license LICENSE
%{_bindir}/*
%{_sysconfdir}/*
%{_prefix}/lib/tmpfiles.d/named.conf
%{_libdir}/tmpfiles.d/named.conf

%changelog
* Mon Feb 13 2023 CBL-Mariner Servicing Account <[email protected]> - 9.16.37-1
- Auto-upgrade to 9.16.37 - to fix CVE-2022-3736, CVE-2022-3094, CVE-2022-3924

* Mon Nov 14 2022 CBL-Mariner Servicing Account <[email protected]> - 9.16.33-1
- Auto-upgrade to 9.16.33 - CVE-2022-2795,CVE-2022-3080

Expand Down
32 changes: 32 additions & 0 deletions SPECS/binutils/CVE-2022-4285.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
From 5c831a3c7f3ca98d6aba1200353311e1a1f84c70 Mon Sep 17 00:00:00 2001
From: Nick Clifton <[email protected]>
Date: Wed, 19 Oct 2022 15:09:12 +0100
Subject: [PATCH] Fix an illegal memory access when parsing an ELF file
containing corrupt symbol version information.

PR 29699
* elf.c (_bfd_elf_slurp_version_tables): Fail if the sh_info field
of the section header is zero.
---
bfd/ChangeLog | 6 ++++++
bfd/elf.c | 4 +++-
2 files changed, 9 insertions(+), 1 deletion(-)

diff --git a/bfd/elf.c b/bfd/elf.c
index fe00e0f9189..7cd7febcf95 100644
--- a/bfd/elf.c
+++ b/bfd/elf.c
@@ -8730,7 +8730,9 @@ _bfd_elf_slurp_version_tables (bfd *abfd, bool default_imported_symver)
bfd_set_error (bfd_error_file_too_big);
goto error_return_verref;
}
- elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_alloc (abfd, amt);
+ if (amt == 0)
+ goto error_return_verref;
+ elf_tdata (abfd)->verref = (Elf_Internal_Verneed *) bfd_zalloc (abfd, amt);
if (elf_tdata (abfd)->verref == NULL)
goto error_return_verref;

--
2.31.1

6 changes: 5 additions & 1 deletion SPECS/binutils/binutils.spec
Original file line number Diff line number Diff line change
@@ -1,14 +1,15 @@
Summary: Contains a linker, an assembler, and other tools
Name: binutils
Version: 2.36.1
Release: 2%{?dist}
Release: 3%{?dist}
License: GPLv2+
Vendor: Microsoft Corporation
Distribution: Mariner
Group: System Environment/Base
URL: https://www.gnu.org/software/binutils
Source0: https://ftp.gnu.org/gnu/binutils/%{name}-%{version}.tar.xz
Patch0: CVE-2021-45078.patch
Patch1: CVE-2022-4285.patch

%description
The Binutils package contains a linker, an assembler,
Expand Down Expand Up @@ -119,6 +120,9 @@ make %{?_smp_mflags} check
%{_libdir}/libctf.so.0.*

%changelog
* Thu Feb 09 2023 Dan Streetman <[email protected]> 2.36.1-3
- CVE-2022-4285

* Thu Dec 23 2021 Muhammad Falak <[email protected]> 2.36.1-2
- Fix CVE-2021-45078

Expand Down
6 changes: 3 additions & 3 deletions SPECS/clamav/clamav.signatures.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"Signatures": {
"clamav-0.103.6.tar.gz": "aaa12e3dc19f1d323b1c50d7a10fa8af557e4390149e864d59bde39b6ad9ba33"
}
"Signatures": {
"clamav-0.103.8.tar.gz": "6f49da6ee927936de13d359e559d3944248e3a257d40b80b6c99ebe6fe8c8c3f"
}
}
7 changes: 5 additions & 2 deletions SPECS/clamav/clamav.spec
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
%{!?python3_sitelib: %global python3_sitelib %(python3 -c "from distutils.sysconfig import get_python_lib;print(get_python_lib())")}
Summary: Open source antivirus engine
Name: clamav
Version: 0.103.6
Release: 2%{?dist}
Version: 0.103.8
Release: 1%{?dist}
License: ASL 2.0 AND BSD AND bzip2-1.0.4 AND GPLv2 AND LGPLv2+ AND MIT AND Public Domain AND UnRar
Vendor: Microsoft Corporation
Distribution: Mariner
Expand Down Expand Up @@ -99,6 +99,9 @@ rm -f %{_var}/log/freshclam.log
%ghost %attr(-,clamav,clamav) %{_var}/log/freshclam.log

%changelog
* Fri Feb 17 2023 CBL-Mariner Servicing Account <[email protected]> - 0.103.8-1
- Auto-upgrade to 0.103.8 - CVE-2023-20032

*Fri Jul 22 2022 Olivia Crain <[email protected]> - 0.103.6-2
- Fix freshclam DB download (backport of Tom Fay's 2.0 changes)
- Create/delete clamav user and group on preinstall/postuninstall
Expand Down
94 changes: 94 additions & 0 deletions SPECS/curl/CVE-2022-43552.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,94 @@
From f3b4c5edf97c157a8ad3727827d1ac94062cfff8 Mon Sep 17 00:00:00 2001
From: Daniel Stenberg <[email protected]>
Date: Mon, 7 Nov 2022 17:09:48 +0100
Subject: [PATCH] smb/telnet: do not free the protocol struct in *_done()

It is managed by the generic layer.
---
lib/smb.c | 14 ++------------
lib/telnet.c | 3 ---
2 files changed, 2 insertions(+), 15 deletions(-)

diff --git a/lib/smb.c b/lib/smb.c
index 2cfe041df..48d5a2fe0 100644
--- a/lib/smb.c
+++ b/lib/smb.c
@@ -56,12 +56,10 @@ static CURLcode smb_setup_connection(struct Curl_easy *data,
struct connectdata *conn);
static CURLcode smb_connect(struct Curl_easy *data, bool *done);
static CURLcode smb_connection_state(struct Curl_easy *data, bool *done);
static CURLcode smb_do(struct Curl_easy *data, bool *done);
static CURLcode smb_request_state(struct Curl_easy *data, bool *done);
-static CURLcode smb_done(struct Curl_easy *data, CURLcode status,
- bool premature);
static CURLcode smb_disconnect(struct Curl_easy *data,
struct connectdata *conn, bool dead);
static int smb_getsock(struct Curl_easy *data, struct connectdata *conn,
curl_socket_t *socks);
static CURLcode smb_parse_url_path(struct Curl_easy *data,
@@ -72,11 +70,11 @@ static CURLcode smb_parse_url_path(struct Curl_easy *data,
*/
const struct Curl_handler Curl_handler_smb = {
"SMB", /* scheme */
smb_setup_connection, /* setup_connection */
smb_do, /* do_it */
- smb_done, /* done */
+ ZERO_NULL, /* done */
ZERO_NULL, /* do_more */
smb_connect, /* connect_it */
smb_connection_state, /* connecting */
smb_request_state, /* doing */
smb_getsock, /* proto_getsock */
@@ -99,11 +97,11 @@ const struct Curl_handler Curl_handler_smb = {
*/
const struct Curl_handler Curl_handler_smbs = {
"SMBS", /* scheme */
smb_setup_connection, /* setup_connection */
smb_do, /* do_it */
- smb_done, /* done */
+ ZERO_NULL, /* done */
ZERO_NULL, /* do_more */
smb_connect, /* connect_it */
smb_connection_state, /* connecting */
smb_request_state, /* doing */
smb_getsock, /* proto_getsock */
@@ -934,18 +932,10 @@ static CURLcode smb_request_state(struct Curl_easy *data, bool *done)
request_state(data, next_state);

return CURLE_OK;
}

-static CURLcode smb_done(struct Curl_easy *data, CURLcode status,
- bool premature)
-{
- (void) premature;
- Curl_safefree(data->req.p.smb);
- return status;
-}
-
static CURLcode smb_disconnect(struct Curl_easy *data,
struct connectdata *conn, bool dead)
{
struct smb_conn *smbc = &conn->proto.smbc;
(void) dead;
diff --git a/lib/telnet.c b/lib/telnet.c
index 24d3f1efb..22bc81e75 100644
--- a/lib/telnet.c
+++ b/lib/telnet.c
@@ -1246,13 +1246,10 @@ static CURLcode telnet_done(struct Curl_easy *data,
if(!tn)
return CURLE_OK;

curl_slist_free_all(tn->telnet_vars);
tn->telnet_vars = NULL;
-
- Curl_safefree(data->req.p.telnet);
-
return CURLE_OK;
}

static CURLcode telnet_do(struct Curl_easy *data, bool *done)
{
--
2.38.1

6 changes: 5 additions & 1 deletion SPECS/curl/curl.spec
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,15 @@ Summary: An URL retrieval utility and library
Name: curl
# Heads up: 7.87 breaks perl-WWW-Curl (see #4588).
Version: 7.86.0
Release: 2%{?dist}
Release: 3%{?dist}
License: MIT
Vendor: Microsoft Corporation
Distribution: Mariner
Group: System Environment/NetworkingLibraries
URL: https://curl.haxx.se
Source0: https://curl.haxx.se/download/%{name}-%{version}.tar.gz
Patch0: CVE-2022-43551.patch
Patch1: CVE-2022-43552.patch
BuildRequires: krb5-devel
BuildRequires: libssh2-devel
BuildRequires: openssl-devel
Expand Down Expand Up @@ -90,6 +91,9 @@ find %{buildroot} -type f -name "*.la" -delete -print
%{_libdir}/libcurl.so.4*

%changelog
* Mon Feb 13 2023 Dallas Delaney <[email protected]> - 7.86.0-3
- Apply patch to fix CVE-2022-43552

* Thu Jan 12 2023 Aurélien Bombo <[email protected]> - 7.86.0-2
- Apply patch to fix CVE-2022-43551.

Expand Down
Loading

0 comments on commit 534dfba

Please sign in to comment.