Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
617 commits
Select commit Hold shift + click to select a range
50d9f48
[AUTOPATCHER-CORE] Upgrade `libssh` to 0.10.6 for CVE-2023-6004, CVE-…
CBL-Mariner-Bot Mar 19, 2025
c202a55
[AUTOPATCHER-CORE] Upgrade `glib` to 2.78.6 for CVE-2024-34397 [Mediu…
CBL-Mariner-Bot Mar 19, 2025
fc06498
Revert "Patch `libarchive` for CVE-2025-1632, CVE-2025-25724 [Medium]…
jslobodzian Mar 20, 2025
5244dca
Reapply "Patch `vitess` for CVE-2025-22868 [High] (#12729)"
jslobodzian Mar 27, 2025
5627666
Patch `heimdal` for CVE-2022-45142 [High] (#13123)
Kanishk-Bansal Mar 27, 2025
72d98ea
Patch ig for CVE-2025-29786 [HIGH] (#13088)
kgodara912 Mar 27, 2025
86170bb
Patch coredns for CVE-2025-29786 [HIGH] (#13087)
kgodara912 Mar 27, 2025
c9c3231
Patch keda for CVE-2025-29786 [HIGH] (#13086)
kgodara912 Mar 27, 2025
b9ea1d8
[AUTOPATCHER-CORE] Upgrade `vim` to 9.1.1198 for CVE-2025-29768 [Medi…
CBL-Mariner-Bot Mar 27, 2025
cf4969f
[Medium] Patch telegraf for CVE-2025-22870 and CVE-2024-51744 (#13133)
v-smalavathu Mar 27, 2025
db7d78a
[Medium] patch qtbase to fix CVE-2025-30348 (#13118)
jykanase Mar 27, 2025
151f88a
[AUTOPATCHER-CORE] Upgrade php to 8.3.19 for CVE-2025-1219, CVE-2025-…
CBL-Mariner-Bot Mar 31, 2025
698ca26
[High] patch vendored openssl code in edk2 in 3.0 (#13112)
tobiasb-ms Mar 31, 2025
64192db
[AUTOPATCHER-CORE] Upgrade libdwarf to 0.9.2 for CVE-2024-2002 [High]…
CBL-Mariner-Bot Mar 31, 2025
1d18ee0
[AUTOPATCHER-CORE] Upgrade mariadb to 10.11.11 for CVE-2025-21490 (#1…
CBL-Mariner-Bot Mar 31, 2025
d8412c8
Patch `azcopy` for CVE-2025-30204 [High] (#13175)
Kanishk-Bansal Mar 31, 2025
a860197
Patch cert-manager for CVE-2025-30204 [High] (#13180)
Kanishk-Bansal Mar 31, 2025
9375520
Patch `packer` for CVE-2025-30204 [High] (#13185)
Kanishk-Bansal Mar 31, 2025
b280dac
Patch `application-gateway-kubernetes-ingress` for CVE-2025-30204 [Hi…
Kanishk-Bansal Mar 31, 2025
6c6a094
Patch `coredns` for CVE-2025-30204 [High] (#13188)
Kanishk-Bansal Mar 31, 2025
cd6b55d
Patch `kubernetes` for CVE-2025-30204 [High] (#13190)
Kanishk-Bansal Mar 31, 2025
6c42c8d
Patch `prometheus` for CVE-2025-30204 [High] (#13193)
Kanishk-Bansal Mar 31, 2025
2f27eb0
Patch `flannel` for CVE-2025-30204 [High] (#13194)
Kanishk-Bansal Mar 31, 2025
29f8491
Patch `keda` for CVE-2025-30204, CVE-2025-29923 [High] (#13201)
Kanishk-Bansal Mar 31, 2025
4c70f61
Patch `telegraf` for CVE-2025-30204 [High] (#13208)
Kanishk-Bansal Mar 31, 2025
325dd75
Upgrade `libreswan` to 4.15 for CVE-2024-3652, CVE-2024-2357, CVE-202…
Kanishk-Bansal Mar 31, 2025
ba5732b
Patch `pytorch` for CVE-2021-22569, CVE-2024-7776 [High] (#13210)
Kanishk-Bansal Mar 31, 2025
8bb86d4
Upgrade libxslt to fix CVE-2024-55549 and CVE-2025-24855 [High] (#13003)
sindhu-karri Mar 31, 2025
0f6561e
Merge branch '3.0-dev' into joslobo/merge-for-april-update
jslobodzian Apr 2, 2025
39cc18a
Merge to 3.0 for April 2025 Update (#13256)
jslobodzian Apr 2, 2025
c25cb89
Merge branch '3.0' into fasttrack/3.0
jslobodzian Apr 8, 2025
7c4ff75
[AUTO-PR] azure-core/azurelinux:joslobo/CVE-2025-31115 (#13322)
CBL-Mariner-Bot Apr 9, 2025
d37fff9
Patch cmake for CVE-2024-48615 [High] (#13283)
KavyaSree2610 Apr 9, 2025
690ae4e
Upgrade erlang to 26.2.5.10 for CVE-2025-30211 [HIGH] (#13268)
sandeepkarambelkar Apr 9, 2025
69c549f
[AUTOPATCHER-CORE] Upgrade etcd to 3.5.21 for CVE-2025-30204 [High] (…
CBL-Mariner-Bot Apr 9, 2025
c517539
[MEDIUM] Patch numpy to fix CVE-2018-1999024 (#12348)
archana25-ms Apr 10, 2025
1b1b350
[Medium] Patch dietlibc for CVE-2015-1473 (#12432)
jykanase Apr 10, 2025
e41eb5b
Patch gnutls for CVE-2024-12133 [Medium] (#12639)
Ankita13-code Apr 10, 2025
244421d
[Medium] Patch vitess for CVE-2025-22870 (#12932)
v-smalavathu Apr 10, 2025
3088c47
Patch `ceph` for CVE-2021-28361 [High] (#13342)
Kanishk-Bansal Apr 10, 2025
6ef576b
[Low] Patch subversion for CVE-2024-46901 (#12862)
kevin-b-lockwood Apr 10, 2025
70ac23e
[Medium] patch memcached for CVE-2021-44647 (#13056)
jykanase Apr 10, 2025
6cb1b59
Patch expat for CVE-2024-8176 [HIGH] (#13062)
kgodara912 Apr 10, 2025
4750640
Patch prometheus-node-exporter for CVE-2025-22870 [Medium] (#13304)
xordux Apr 10, 2025
9bf6820
Upgrade libssh2 to 1.11.1 for CVE-2023-48795 [Medium] (#13274)
Sumynwa Apr 10, 2025
9fa399a
Upgrade `mysql` to 8.0.41 for CVE-2025-21490 & CVE-2024-11053 [High] …
Kanishk-Bansal Apr 10, 2025
3bd5930
Patch `blobfuse2` for CVE-2025-30204 [High] (#13174)
Kanishk-Bansal Apr 10, 2025
3885d28
Patch `fluent-bit` for CVE-2025-31498 [High] (#13378)
Ankita13-code Apr 14, 2025
0214534
Patch git-lfs for CVE-2025-22870 [Medium] (#13298)
xordux Apr 14, 2025
5df5b30
Patch prometheus-process-exporter for CVE-2025-22870 [Medium] (#13303)
xordux Apr 14, 2025
7d9a1d8
[Low] patch clang for CVE-2024-7883 (#13346)
jykanase Apr 14, 2025
90ce72a
Patch rabbitmq-server for CVE-2025-30219 [Medium] (#13199)
Ankita13-code Apr 14, 2025
9f78198
Patch augeas for CVE-2025-2588 [MEDIUM] (#13206)
kgodara912 Apr 14, 2025
99890bc
[Medium] Upgrade grpc version to 1.62.3 for CVE-2024-7246 (#13117)
jykanase Apr 14, 2025
e0e3350
Patch wpa_supplicant for CVE-2025-24912 [Low] (#13120)
Kanishk-Bansal Apr 14, 2025
bec3cb1
[LOW] Patch unzip to fix CVE-2021-4217 (#13104)
archana25-ms Apr 14, 2025
620b7d3
[Low] patch vitess for CVE-2024-53257 (#12834)
kevin-b-lockwood Apr 14, 2025
6324fd2
[MEDIUM] Patch syslinux to fix CVE-2011-2501,CVE-2011-2691,CVE-2011-3…
archana25-ms Apr 14, 2025
655e7b4
[Medium] Patch ruby for CVE-2025-25186 (#12471)
v-smalavathu Apr 14, 2025
37b8ecc
(security) golang: bump Go version to 1.24.2-1 (#13254)
Apr 10, 2025
1a0f47f
(security) golang: bump Go version to 1.23.8-1 (#13253)
Apr 10, 2025
6d47f0b
[Medium] edk2 openssl CVE-2024-13176 (#13404)
tobiasb-ms Apr 15, 2025
29d3daa
Patch coredns for CVE-2024-53259 [Medium] (#13247)
Ankita13-code Apr 15, 2025
0787195
[Low]patch flannel for CVE-2024-51744 (#13031)
jykanase Apr 15, 2025
5ad0e2c
[Low} Patch dcos-cli for CVE-2024-51744 (#13030)
jykanase Apr 15, 2025
112a484
[Low] patch bcc for CVE-2024-2314 (#12998)
jykanase Apr 15, 2025
4e8320c
Patch telegraf for CVE-2024-35255 and CVE-2025-27144 [Medium]. (#12678)
mayankfz Apr 15, 2025
e110eab
python-requests: add patch for CVE-2024-35195 (#11724)
arc9693 Apr 15, 2025
6147d8d
Patch `ruby` CVE-2025-27219, CVE-2025-27220, CVE-2025-27221 [Medium] …
Kanishk-Bansal Apr 17, 2025
241c992
[Medium] Patch azcopy for CVE-2025-22870 and CVE-2024-51744 (#12988)
v-smalavathu Apr 17, 2025
d10c7a7
Patch `elfutils` for CVE-2025-1372, CVE-2025-1376 & CVE-2025-1377 [Me…
Kanishk-Bansal Apr 17, 2025
ecdc6fb
Patch keda for CVE-2024-51744, CVE-2025-22870 and fix CVE-2025-29923 …
realsdx Apr 17, 2025
b4bd87f
[Medium] Patch nodejs for CVE-2024-34064, CVE-2020-28493 (#12259)
kevin-b-lockwood Apr 18, 2025
83c221c
Patch prometheus for CVE-2024-35255 [Medium]. (#12686)
mayankfz Apr 18, 2025
521d892
[Medium] Patch gnutls for CVE-2024-12243 (#12882)
v-smalavathu Apr 18, 2025
a37f637
[Low] Patch kubernetes for CVE-2024-51744 (#13072)
v-smalavathu Apr 18, 2025
db9a58f
[Medium] Patch haproxy for CVE-2025-32464 (#13398)
v-smalavathu Apr 18, 2025
eed0b8d
Patch openssh for CVE-2025-32728 [MEDIUM] (#13451)
realsdx Apr 18, 2025
51337bf
Patch telegraf for CVE-2025-30215 [CRITICAL] (#13457)
realsdx Apr 18, 2025
90ce549
Upgrade erlang to 26.2.5.11 for CVE-2025-32433 [CRITICAL] (#13458)
kgodara912 Apr 18, 2025
bde9dbf
[AUTO-PR] azure-core/azurelinux:anphel/3-perl-cve (#13484)
CBL-Mariner-Bot Apr 18, 2025
99232d8
[Medium] patch qemu for CVE-2021-20255, CVE-2023-6693, CVE-2023-6683 …
kevin-b-lockwood Apr 21, 2025
cf7442d
[Medium] Patch influxdb for CVE-2025-22870 and CVE-2024-51744 (#13095)
v-smalavathu Apr 21, 2025
e85b417
[Medium] Patch packer for CVE-2025-22870 and CVE-2024-51744 (#13110)
v-smalavathu Apr 21, 2025
5754d01
[LOW] Patch ceph for CVE-2020-14378 (#13166)
archana25-ms Apr 21, 2025
0a815eb
Patch giflib for CVE-2025-31344 [HIGH] (#13423)
realsdx Apr 21, 2025
9cca236
Patch `graphviz` for CVE-2023-46045 [High] (#13504)
Kanishk-Bansal Apr 21, 2025
a2a561f
Fix `crash` for CVE-2021-20197, CVE-2022-47673, CVE-2022-47696 [High]…
Kanishk-Bansal Apr 22, 2025
e2d8fed
Patch `giflib` for CVE-2021-40633 [High] (#13520)
Kanishk-Bansal Apr 22, 2025
17777ac
[AUTOPATCHER-CORE] Upgrade pgbouncer to 1.24.1 to fix CVE-2025-2291 […
CBL-Mariner-Bot Apr 22, 2025
c1b9407
[High] Patch moby-engine for CVE-2025-30204 (#13533)
dallasd1 Apr 22, 2025
9b3b0bb
[High] Patch libsoup for CVE-2025-32913, CVE-2025-32906, CVE-2025-329…
kevin-b-lockwood Apr 22, 2025
926db59
Patch `pytorch` for CVE-2025-32434, CVE-2025-3730 [Critical] (#13554)
Kanishk-Bansal Apr 23, 2025
6de75b5
[Medium] Patch prometheus for CVE-2025-22870 and CVE-2024-51744 (#12929)
v-smalavathu Apr 23, 2025
588729d
Patch nodejs for CVE-2025-27516 [Medium] (#12874)
sandeepkarambelkar Apr 23, 2025
cb0a42a
Upgrade `fcgi` to 2.4.5 for CVE-2025-23016 [Critical] (#13560)
Kanishk-Bansal Apr 24, 2025
0c4f8b2
Patch libsoup for CVE-2025-32908, CVE-2025-32914 [HIGH] (#13582)
kgodara912 Apr 25, 2025
ae3aa91
Patch `keda` for CVE-2025-22872 [Medium] (#13584)
Kanishk-Bansal Apr 25, 2025
952c633
flux: patch CVE-2024-43806 (#11979)
arc9693 Apr 25, 2025
0942a6e
[AUTOPATCHER-CORE] Upgrade valkey to 8.0.3 for CVE-2025-21605 [High] …
CBL-Mariner-Bot Apr 28, 2025
7edc702
Merge branch '3.0-dev' into anphel/3-merge-for-apr-2025-monthly
anphel31 Apr 29, 2025
806af31
Merge 3.0-dev for April 2025 monthly release (#13620)
jslobodzian Apr 29, 2025
7e483a8
Grab latest 3.0-dev to revert golang update. (#13631)
jslobodzian Apr 29, 2025
1cf1ee1
Merge branch '3.0' into fasttrack/3.0
jslobodzian May 5, 2025
53538e4
Patch `dnf5` CVE-2024-1929, CVE-2024-1930, CVE-2024-2746 [High] (#13646)
Kanishk-Bansal May 5, 2025
2d30841
Patch busybox for CVE-2023-39810 [HIGH] (#13651)
kgodara912 May 5, 2025
98d5f1d
Patch libsoup for CVE-2025-2784 [HIGH], CVE-2025-32050, CVE-2025-3205…
kgodara912 May 5, 2025
602b37b
Patch qemu for CVE-2024-4467, CVE-2024-7730 [HIGH], CVE-2024-6505, CV…
kgodara912 May 5, 2025
b28d733
virtiofsd: patch CVE-2024-43806 (#11957)
arc9693 May 5, 2025
7fb545b
Switched the fast-track PR check to run on an AZL 3.0 agent pool. (#1…
PawelWMS May 8, 2025
fee3490
Bumped Golang to versions 1.23.9 and 1.24.3-1. (#13717)
PawelWMS May 9, 2025
e45ad9e
SymCrypt-OpenSSL -- Update mechanism for creating keysinuse logging d…
tobiasb-ms May 9, 2025
4e93cdf
[AUTO-PR] Cherry-picked CVE-2025-22247 fix in `openvm-tools` (#13762)
CBL-Mariner-Bot May 13, 2025
f4a5ae4
Patch `syslog-ng` for CVE-2024-47619 [High] (#13732)
Kanishk-Bansal May 13, 2025
649b28c
[3.0 fasttrack] glibc: add pthread_cond_wait patch (#13763)
anphel31 May 13, 2025
83f1c53
Upgrade SymCrypt-OpenSSL to 1.8.1 (#13803)
tobiasb-ms May 15, 2025
02ceb98
Merge 3.0-dev for May 2025 2 release
PawelWMS May 15, 2025
28f87c2
Latest 3.0-dec update.
PawelWMS May 15, 2025
cab4240
Merge 3.0-dev for May 2025 2 release (#13809)
jslobodzian May 15, 2025
dc78d7c
Revert "Merge 3.0-dev for May 2025 2 release" (#13833)
PawelWMS May 20, 2025
4754737
Prepare May 2025 Update 2 (#13808)
PawelWMS May 15, 2025
2251bb6
kernel-64k: enabling config options required for GB200 and GB200F dia…
sidchintamaneni May 17, 2025
696dc13
kernel-64k: Added a new patch to solve EFI slack slots issue (#13783)
sidchintamaneni May 20, 2025
1de4113
Anphel/3 mid may 2025 update b (#13839)
jslobodzian May 21, 2025
8fd0667
Revert "Anphel/3 mid may 2025 update b" (#13846)
anphel31 May 21, 2025
da84812
Revert "Revert "Merge 3.0-dev for May 2025 2 release"" (#13847)
anphel31 May 21, 2025
3d04526
Sync 3.0-dev to 3.0 as of e19b003a (#13848)
jslobodzian May 21, 2025
3cd11c5
Fixed reporting of build errors (CP: #13889) (#13897)
PawelWMS May 27, 2025
d5b5683
Merge branch '3.0' into fasttrack/3.0
jslobodzian May 27, 2025
16f9e39
[AUTOPATCHER-CORE] Upgrade rubygem-rexml to 3.3.9 fix CVE-2024-49761 …
CBL-Mariner-Bot May 28, 2025
e48fe35
Patch python-setuptools for CVE-2025-47273 [High]. (#13891)
mayankfz May 28, 2025
19a140b
Merge branch '3.0-dev' into joslobo/merge-for-monthly-update
jslobodzian Jun 2, 2025
64ef81a
Merge for June 2025 Update (#13935)
jslobodzian Jun 2, 2025
edd4ed3
Updated `clang`, `compiler-rt`, `libcxx`, `lld`, `lldb`, and `llvm` t…
PawelWMS Jun 4, 2025
de0177c
Merge branch '3.0' into fasttrack/3.0
jslobodzian Jun 10, 2025
f028ad9
Patch javapackages-bootstrap for CVE-2024-25710 [HIGH] (#13820)
realsdx Jun 11, 2025
635a805
Upgrade `mysql` to 8.0.42 for fixing 25 CVEs (#13953)
Kanishk-Bansal Jun 11, 2025
56cc2a5
Upgrade bind to 9.20.9 for CVE-2025-40775 (#13893)
Copilot Jun 11, 2025
b0b2f48
[High] Patch opa for CVE-2025-46569 (#13984)
akhila-guruju Jun 12, 2025
c397e34
[High] Patch python3 for CVE-2025-4516, CVE-2025-4517, CVE-2024-12718…
jykanase Jun 12, 2025
ca3fbc6
[High] patch grub2 for CVE-2025-0624 (#13939)
jykanase Jun 13, 2025
5472414
[High] Patch libsoup for CVE-2025-4476, CVE-2025-32907 (#13853)
kevin-b-lockwood Jun 16, 2025
10c1198
Patch `glibc` for CVE-2023-4527, CVE-2023-4806, CVE-2024-33599, CVE-2…
Kanishk-Bansal Jun 17, 2025
067d614
Revert "Patch `glibc` for CVE-2023-4527, CVE-2023-4806, CVE-2024-3359…
mbykhovtsev-ms Jun 18, 2025
a1c4cdc
update network timeout to 20min by default to allow for larger filesi…
sameluch Jun 20, 2025
9bf48ca
[HIGH] Patch coredns for CVE-2025-47950 (#14023)
aninda-al Jun 20, 2025
c2f14a0
Cherry-pick of golang version bumps (#14029)
mbykhovtsev-ms Jun 20, 2025
052c91a
Patch `frr` for CVE-2024-55553 [High] (#14041)
Kanishk-Bansal Jun 20, 2025
15bcf58
Upgrade clamav to 1.0.9 to address CVE-2025-20260 [CRITICAL] (#14088)
kgodara912 Jun 26, 2025
d237a0c
[High] Patch protobuf for CVE-2025-4565 (#14044)
akhila-guruju Jun 26, 2025
9d91664
[HIGH] Patch rubygem-webrick for CVE-2025-6442 (#14122)
archana25-ms Jun 27, 2025
6eefa9e
[High] patch pam for CVE-2025-6020 (#14087)
jykanase Jun 30, 2025
aab3c3b
[High] Patch ruby for CVE-2025-6442 (#14129)
kevin-b-lockwood Jun 30, 2025
465d1d9
[AUTO-PR] azure-core/azurelinux:3.0/cve/sudo/2025-32462_2025-32463 (#…
CBL-Mariner-Bot Jul 1, 2025
c4d6b31
Merge branch '3.0-dev' into mbykhovtsev/3.0-staging
mbykhovtsev-ms Jul 1, 2025
a4334d2
add install-prereqs-and-configure option, update docs (#14096)
sameluch Jul 1, 2025
94d301b
3.0 June update (#14200)
jslobodzian Jul 2, 2025
d4652d2
Merge branch '3.0' into fasttrack/3.0
jslobodzian Jul 8, 2025
fd6298b
[3.0] Added a workaround for PR checks from forked repos. (#14218)
PawelWMS Jul 10, 2025
362d4f4
[3.0] Fix quotation marks (#14244)
mbykhovtsev-ms Jul 10, 2025
d35eae7
[AutoPR- Security] Patch ceph for CVE-2025-52555 (#14187)
azurelinux-security Jul 10, 2025
af08367
[AutoPR- Security] Patch gdk-pixbuf2 for CVE-2025-6199 (#14185)
azurelinux-security Jul 14, 2025
c82e6dd
[HIGH] Patch cloud-init for CVE-2024-6174 & [MEDIUM] CVE-2024-11584 …
archana25-ms Jul 14, 2025
edd5c50
Patch `busybox` for CVE-2022-48174 [Critical] (#14227)
Kanishk-Bansal Jul 14, 2025
e7dbbc0
[AutoPR- Security] Patch gnutls for CVE-2025-32990, CVE-2025-32989, C…
azurelinux-security Jul 14, 2025
b63356e
[AutoPR- Security] Patch gnutls for CVE-2025-6395 (#14294)
azurelinux-security Jul 15, 2025
d952003
[AutoPR- Security] Patch libssh for CVE-2025-5987, CVE-2025-5372, CVE…
azurelinux-security Jul 15, 2025
2b05e64
[High] Upgrade httpd to 2.4.64 to fix CVE-2025-49812, CVE-2025-53020,…
kevin-b-lockwood Jul 15, 2025
043fe78
[AutoPR- Security] Patch mtr for CVE-2025-49809 (#14291)
azurelinux-security Jul 15, 2025
16d6577
[HIGH] Upgrade: git version to 2.45.4 to fix CVE-2025-27614, CVE-2025…
archana25-ms Jul 15, 2025
6ee528b
[AutoPR- Security] Patch gdk-pixbuf2 for CVE-2025-7345 (#14275)
azurelinux-security Jul 17, 2025
ee84d60
[AutoPR- Security] Patch sysbench for CVE-2024-25178, CVE-2024-25176 …
azurelinux-security Jul 17, 2025
ce2f41e
Merge branch '3.0-dev' into mbykhovtsev/3.0-sync
mbykhovtsev-ms Jul 21, 2025
be5b61b
3.0 sync (#14359)
jslobodzian Jul 22, 2025
9cb8c4f
[3.0] Upgrade nvidia-container-toolkit and libnvidia-container to 1.1…
sameluch Jul 25, 2025
21b8241
[High] Update valkey to fix CVE-2025-32023, CVE-2025-48367 (#14240)
kevin-b-lockwood Jul 25, 2025
dca9040
Patch libxml2 for CVE-2025-49794, CVE-2025-49796[CRITICAL], CVE-2025-…
kgodara912 Jul 25, 2025
6232d12
[AutoPR- Security] Patch jq for CVE-2025-48060 [HIGH] (#14368)
azurelinux-security Jul 25, 2025
056d6fe
Added the `python-junit-xml` package. (#14266)
PawelWMS Jul 25, 2025
c67ff8c
Merge branch '3.0-dev' into anphel/3.0-merge-august-2025
anphel31 Jul 29, 2025
62084ef
August 2025 3.0 release merge (#14408)
anphel31 Jul 29, 2025
15c99d8
Merge branch '3.0' into fasttrack/3.0
jslobodzian Aug 7, 2025
f037d4b
Replaced PyPi's `junit-xml` with AZL's `python3-junit-xml` (#14268)
PawelWMS Aug 7, 2025
5a20429
[AutoPR- Security] Patch ceph for CVE-2024-48916 [HIGH] (#14420)
azurelinux-security Aug 8, 2025
8faae7f
[AutoPR- Security] Patch libsoup for CVE-2025-4948 [HIGH] (#14412)
azurelinux-security Aug 8, 2025
3a2787d
Patch `sqlite` for CVE-2025-6965 [High] (#14381)
MadhurAggarwal Aug 11, 2025
1be1fe0
[AutoPR- Security] Patch python3 for CVE-2025-8194 [HIGH] (#14443)
azurelinux-security Aug 12, 2025
0a3a1d7
[AutoPR- Security] Patch icu for CVE-2025-5222 [HIGH] (#14486)
azurelinux-security Aug 15, 2025
59e8296
[AUTOPATCHER-CORE] Upgrade postgresql to 16.10 for CVE-2025-8714, CVE…
CBL-Mariner-Bot Aug 18, 2025
25ef93e
merge 3.0-dev changes for mid august release
anphel31 Aug 22, 2025
d220b7f
Merge branch '3.0-dev' into anphel/3-mid-aug-release-snap
anphel31 Aug 22, 2025
57f868f
[3.0] Merge changes for Mid-August release (#14562)
anphel31 Aug 22, 2025
47553bb
Merge branch '3.0' into fasttrack/3.0
PawelWMS Sep 4, 2025
e63bd61
Patch qemu for CVE-2024-7409 [HIGH] (#14519)
kgodara912 Sep 4, 2025
8ce78fb
[High] Patch keras for CVE-2025-8747 (#14485)
kevin-b-lockwood Sep 4, 2025
6a0fb93
golang: bump Go version; major version update [fasttrack/3.0] (#14616)
dagood Sep 5, 2025
ca2c71d
Merge branch '3.0-dev' into anphel/3-sep-2025-release-snap
anphel31 Sep 10, 2025
ef7f9eb
Merge changes for 3.0 Sep 2025 monthly release (#14646)
anphel31 Sep 10, 2025
985e0b7
Fix : patch application of CVE-2025-4802 in `glibc` (#14582)
Kanishk-Bansal Sep 10, 2025
5114dd2
Revert "Fix : patch application of CVE-2025-4802 in `glibc` (#14582)"…
PawelWMS Sep 12, 2025
6d2deb1
Merge branch '3.0' into fasttrack/3.0
PawelWMS Sep 17, 2025
5051d65
[AutoPR- Security] Patch coredns for CVE-2025-58063 [HIGH] (#14651)
azurelinux-security Sep 17, 2025
69757e9
[AUTOPATCHER-CORE] Upgrade perl-JSON-XS to 4.04 for CVE-2025-40928 [H…
CBL-Mariner-Bot Sep 17, 2025
d3975f8
Fix : patch application of CVE-2025-4802 in `glibc` (re-apply: #14582…
PawelWMS Sep 17, 2025
15df961
Fixed `coredns` random rebuilds bug. (#14697)
PawelWMS Sep 19, 2025
ef8df83
[AUTOPATCHER-CORE] Upgrade cups to 2.4.13 for CVE-2025-58060 [High], …
CBL-Mariner-Bot Sep 19, 2025
71e4c0c
[fasttrack 3.0] Upgrade kernels to 6.6.104.2 (#14694)
rlmenge Sep 22, 2025
8c91911
[AutoPR- Security] Patch keras for CVE-2025-9905, CVE-2025-9906 [HIGH…
azurelinux-security Sep 24, 2025
d86f913
[3.0][toolkit] Optimized processing time of prebuilt specs (#14705)
PawelWMS Oct 1, 2025
4cecfd5
[AutoPR- Security] Patch libtiff for CVE-2025-9900 [HIGH] (#14735)
azurelinux-security Oct 1, 2025
ad3982c
[AutoPR- Security] Patch squid for CVE-2025-59362 [HIGH] (#14738)
azurelinux-security Oct 1, 2025
e32a4e4
Upgrade `valkey` to 8.0.6 for CVE-2025-49844 CVE-2025-46817 CVE-2025-…
Kanishk-Bansal Oct 8, 2025
66c7638
Set-up circular deps check to use PMC for fast-track (#14841)
PawelWMS Oct 9, 2025
792cfc1
[AutoPR- Security] Patch ceph for CVE-2025-9648 [HIGH] (#14779)
azurelinux-security Oct 9, 2025
83ac4bc
[AutoPR- Security] Patch edk2 for CVE-2025-9230 [HIGH] (#14776)
azurelinux-security Oct 14, 2025
8754279
[AutoPR- Security] Patch qtsvg for CVE-2025-10729 [HIGH] (#14818)
azurelinux-security Oct 14, 2025
c2c892c
[AUTOPATCHER-CORE] Upgrade openssl to 3.3.5 CVEs (#14772)
CBL-Mariner-Bot Oct 17, 2025
3ae03d6
(security) golang: bump Go version to 1.24.9-1 (#14862)
bot-for-go[bot] Oct 18, 2025
6e25c2e
(security) golang: bump Go version to 1.25.3-1 (#14863)
bot-for-go[bot] Oct 18, 2025
223630d
[AutoPR- Security] Patch squid for CVE-2025-62168 [CRITICAL] (#14898)
azurelinux-security Oct 21, 2025
4ad665b
Merge branch '3.0-dev' into anphel/3-oct-2025-snap
anphel31 Oct 21, 2025
55cb174
[3.0] Oct 2025 Monthly release (#14901)
anphel31 Oct 21, 2025
22453eb
Merge branch '3.0' into fasttrack/3.0
jslobodzian Oct 28, 2025
5c51b25
Adjust the conflict package name for mlnx-ofa_kernel-hwe-modules (#14…
jslobodzian Oct 29, 2025
0476c33
Upgrade `bind` to 9.20.15 for CVE-2025-40778, CVE-2025-8677, CVE-2025…
Kanishk-Bansal Oct 30, 2025
b840be6
[AutoPR- Security] Patch coredns for CVE-2025-59530 [HIGH] (#14930)
azurelinux-security Oct 30, 2025
6f98ff9
[AutoPR- Security] Patch libsoup for CVE-2025-11021 [HIGH] (#14947)
azurelinux-security Oct 30, 2025
52caab9
Prepare October 2025 Update 2 (#14975)
CBL-Mariner-Bot Oct 30, 2025
e530f31
Patch iperf3 to fix compat with openssl 3.3.5 (#14962)
corvus-callidus Oct 30, 2025
cb183a9
ca-certificates: revert adding TLS RSA Root G2 & TLS ECC Root G2 base…
anphel31 Oct 30, 2025
6911950
Merge changes for 3.0 monthly update - ca-certs & iperf3 (#14984)
jslobodzian Oct 30, 2025
a580079
Merge branch '3.0' into fasttrack/3.0
jslobodzian Nov 3, 2025
3f6181e
[AutoPR- Security] Patch xorg-x11-server-Xwayland for CVE-2025-62231,…
azurelinux-security Nov 3, 2025
bbb7ce6
[AutoPR- Security] Patch keras for CVE-2025-12060 [HIGH] (#14985)
azurelinux-security Nov 3, 2025
3e849df
[AUTO-PR] azure-core/azurelinux:liunan/runc133 (#15023)
CBL-Mariner-Bot Nov 6, 2025
fa985d5
Merge branch '3.0-dev' into pawelwi/3.0_release_merge
PawelWMS Nov 6, 2025
9ed12fd
Prepare November 2025 release (#15025)
jslobodzian Nov 6, 2025
7336c24
Merge branch '3.0' into fasttrack/3.0
jslobodzian Nov 12, 2025
5ea1c27
Configuring network isolation for OneBranch pipelines. (#15016)
PawelWMS Nov 13, 2025
a9d9b63
[AutoPR- Security] Patch nodejs for CVE-2025-5222 [HIGH] (#15032)
azurelinux-security Nov 13, 2025
7e73c65
[AutoPR- Security] Patch moby-containerd-cc for CVE-2025-64329, CVE-2…
azurelinux-security Nov 13, 2025
02a30ce
[AutoPR- Security] Patch containerd2 for CVE-2024-25621 [HIGH] (#15053)
azurelinux-security Nov 18, 2025
c733d57
[HIGH] Patch packer for CVE-2025-47913 (#15116)
archana25-ms Nov 18, 2025
ba8bca9
[AutoPR- Security] Patch ceph for CVE-2024-47866 [HIGH] (#15077)
azurelinux-security Nov 18, 2025
f44bc8c
[AutoPR- Security] Patch libmicrohttpd for CVE-2025-59777 [HIGH] (#15…
azurelinux-security Nov 18, 2025
07feaa4
[AutoPR- Security] Patch docker-compose for CVE-2025-47913 [HIGH] (#1…
azurelinux-security Nov 19, 2025
0308a74
[AutoPR- Security] Patch docker-buildx for CVE-2025-47913 [HIGH] (#15…
azurelinux-security Nov 19, 2025
46e52ca
[AutoPR- Security] Patch kubevirt for CVE-2025-47913 [HIGH] (#15123)
azurelinux-security Nov 19, 2025
962e73f
[AutoPR- Security] Patch telegraf for CVE-2025-47913 [HIGH] (#15124)
azurelinux-security Nov 19, 2025
20036e2
Patch kubernetes for CVE-2025-52881
azurelinux-security Nov 24, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions .pipelines/fasttrack/FasttrackMergeNotifier.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,8 @@ extends:
template: v2/OneBranch.NonOfficial.CrossPlat.yml@templates
parameters:
featureFlags:
LinuxHostVersion:
Network: R1
runOnHost: true
globalSdl:
credscan:
Expand Down
3 changes: 3 additions & 0 deletions .pipelines/prchecks/DevPRCheck.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ variables:
extends:
template: v2/OneBranch.NonOfficial.CrossPlat.yml@templates
parameters:
featureFlags:
LinuxHostVersion:
Network: R1
globalSdl:
credscan:
suppressionsFile: .config/CredScanSuppressions.json
Expand Down
3 changes: 3 additions & 0 deletions .pipelines/prchecks/FastTrackPRCheck.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ variables:
extends:
template: v2/OneBranch.NonOfficial.CrossPlat.yml@templates
parameters:
featureFlags:
LinuxHostVersion:
Network: R1
globalSdl:
credscan:
suppressionsFile: .config/CredScanSuppressions.json
Expand Down
33 changes: 33 additions & 0 deletions SPECS/ceph/CVE-2024-47866.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
From a22a0dbb1d46322007ac4b4e87854ba2ccc8335a Mon Sep 17 00:00:00 2001
From: Suyash Dongre <suyashd999@gmail.com>
Date: Wed, 20 Aug 2025 23:22:41 +0530
Subject: [PATCH] Check if `HTTP_X_AMZ_COPY_SOURCE` header is empty

The issue was that the `HTTP_X_AMZ_COPY_SOURCE` header could be present but empty (i.e., an empty string rather than NULL). The code only checked if the pointer was not NULL, but didn't verify that the string had content. When an empty string was passed to RGWCopyObj::parse_copy_location(), it would eventually try to access name_str[0] on an empty string, causing a crash.

Fixes: https://tracker.ceph.com/issues/72669

Signed-off-by: Suyash Dongre <suyashd999@gmail.com>
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
Upstream-reference: https://patch-diff.githubusercontent.com/raw/ceph/ceph/pull/65159.patch
---
src/rgw/rgw_op.cc | 3 +++
1 file changed, 3 insertions(+)

diff --git a/src/rgw/rgw_op.cc b/src/rgw/rgw_op.cc
index 71fb198..68f74b7 100644
--- a/src/rgw/rgw_op.cc
+++ b/src/rgw/rgw_op.cc
@@ -5240,6 +5240,9 @@ bool RGWCopyObj::parse_copy_location(const std::string_view& url_src,
params_str = url_src.substr(pos + 1);
}

+ if (name_str.empty()) {
+ return false;
+ }
if (name_str[0] == '/') // trim leading slash
name_str.remove_prefix(1);

--
2.45.4

8 changes: 6 additions & 2 deletions SPECS/ceph/ceph.spec
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
Summary: User space components of the Ceph file system
Name: ceph
Version: 18.2.2
Release: 11%{?dist}
Release: 12%{?dist}
License: LGPLv2 and LGPLv3 and CC-BY-SA and GPLv2 and Boost and BSD and MIT and Public Domain and GPLv3 and ASL-2.0
URL: https://ceph.io/
Vendor: Microsoft Corporation
Expand All @@ -31,6 +31,7 @@ Patch16: CVE-2020-14378.patch
Patch17: CVE-2025-52555.patch
Patch18: CVE-2024-48916.patch
Patch19: CVE-2025-9648.patch
Patch20: CVE-2024-47866.patch
#
# Copyright (C) 2004-2019 The Ceph Project Developers. See COPYING file
# at the top-level directory of this distribution and at
Expand Down Expand Up @@ -2021,6 +2022,9 @@ exit 0
%config %{_sysconfdir}/prometheus/ceph/ceph_default_alerts.yml

%changelog
* Thu Nov 13 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 18.2.2-12
- Patch for CVE-2024-47866

* Fri Oct 03 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 18.2.2-11
- Patch for CVE-2025-9648

Expand All @@ -2030,7 +2034,7 @@ exit 0
* Tue Jul 01 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 18.2.2-9
- Patch for CVE-2025-52555

* Wed 16 Apr 2025 Archana Shettigar <v-shettigara@microsoft.com> - 18.2.2-8
* Wed Apr 16 2025 Archana Shettigar <v-shettigara@microsoft.com> - 18.2.2-8
- Patch CVE-2020-14378

* Thu Apr 10 2025 Kanishk Bansal <kanbansal@microsoft.com> - 18.2.2-7
Expand Down
111 changes: 111 additions & 0 deletions SPECS/containerd2/CVE-2024-25621.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,111 @@
From 46223b256bfb3f42e193d947d1b1ef551260749f Mon Sep 17 00:00:00 2001
From: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Date: Mon, 27 Oct 2025 16:42:59 +0900
Subject: [PATCH] Fix directory permissions

- Create /var/lib/containerd with 0o700 (was: 0o711).
- Create config.TempDir with 0o700 (was: 0o711).
- Create /run/containerd/io.containerd.grpc.v1.cri with 0o700 (was: 0o755).
- Create /run/containerd/io.containerd.sandbox.controller.v1.shim with 0o700 (was: 0o711).
- Leave /run/containerd and /run/containerd/io.containerd.runtime.v2.task created with 0o711,
as required by userns-remapped containers.
/run/containerd/io.containerd.runtime.v2.task/<NS>/<ID> is created with:
- 0o700 for non-userns-remapped containers
- 0o710 for userns-remapped containers with the remapped root group as the owner group.

Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
Upstream-reference: https://github.com/containerd/containerd/commit/7c59e8e9e970d38061a77b586b23655c352bfec5.patch
---
cmd/containerd/server/server.go | 14 ++++++++++++--
core/runtime/v2/task_manager.go | 2 ++
plugins/cri/runtime/plugin.go | 7 +++++++
plugins/sandbox/controller.go | 6 +++++-
4 files changed, 26 insertions(+), 3 deletions(-)

diff --git a/cmd/containerd/server/server.go b/cmd/containerd/server/server.go
index 9f38cb3..c9e3698 100644
--- a/cmd/containerd/server/server.go
+++ b/cmd/containerd/server/server.go
@@ -81,10 +81,16 @@ func CreateTopLevelDirectories(config *srvconfig.Config) error {
return errors.New("root and state must be different paths")
}

- if err := sys.MkdirAllWithACL(config.Root, 0o711); err != nil {
+ if err := sys.MkdirAllWithACL(config.Root, 0o700); err != nil {
+ return err
+ }
+ // chmod is needed for upgrading from an older release that created the dir with 0o711
+ if err := os.Chmod(config.Root, 0o700); err != nil {
return err
}

+ // For supporting userns-remapped containers, the state dir cannot be just mkdired with 0o700.
+ // Each of plugins creates a dedicated directory beneath the state dir with appropriate permission bits.
if err := sys.MkdirAllWithACL(config.State, 0o711); err != nil {
return err
}
@@ -99,7 +105,11 @@ func CreateTopLevelDirectories(config *srvconfig.Config) error {
}

if config.TempDir != "" {
- if err := sys.MkdirAllWithACL(config.TempDir, 0o711); err != nil {
+ if err := sys.MkdirAllWithACL(config.TempDir, 0o700); err != nil {
+ return err
+ }
+ // chmod is needed for upgrading from an older release that created the dir with 0o711
+ if err := os.Chmod(config.Root, 0o700); err != nil {
return err
}
if runtime.GOOS == "windows" {
diff --git a/core/runtime/v2/task_manager.go b/core/runtime/v2/task_manager.go
index f396ced..024763a 100644
--- a/core/runtime/v2/task_manager.go
+++ b/core/runtime/v2/task_manager.go
@@ -74,6 +74,8 @@ func init() {
shimManager := shimManagerI.(*ShimManager)
root, state := ic.Properties[plugins.PropertyRootDir], ic.Properties[plugins.PropertyStateDir]
for _, d := range []string{root, state} {
+ // root: the parent of this directory is created as 0o700, not 0o711.
+ // state: the parent of this directory is created as 0o711 too, so as to support userns-remapped containers.
if err := os.MkdirAll(d, 0711); err != nil {
return nil, err
}
diff --git a/plugins/cri/runtime/plugin.go b/plugins/cri/runtime/plugin.go
index adc64d9..07f64a1 100644
--- a/plugins/cri/runtime/plugin.go
+++ b/plugins/cri/runtime/plugin.go
@@ -91,6 +91,13 @@ func initCRIRuntime(ic *plugin.InitContext) (interface{}, error) {
rootDir := filepath.Join(containerdRootDir, "io.containerd.grpc.v1.cri")
containerdStateDir := filepath.Dir(ic.Properties[plugins.PropertyStateDir])
stateDir := filepath.Join(containerdStateDir, "io.containerd.grpc.v1.cri")
+ if err := os.MkdirAll(stateDir, 0o700); err != nil {
+ return nil, err
+ }
+ // chmod is needed for upgrading from an older release that created the dir with 0o755
+ if err := os.Chmod(stateDir, 0o700); err != nil {
+ return nil, err
+ }
c := criconfig.Config{
RuntimeConfig: *pluginConfig,
ContainerdRootDir: containerdRootDir,
diff --git a/plugins/sandbox/controller.go b/plugins/sandbox/controller.go
index aec9cc3..165f2e8 100644
--- a/plugins/sandbox/controller.go
+++ b/plugins/sandbox/controller.go
@@ -68,7 +68,11 @@ func init() {
state := ic.Properties[plugins.PropertyStateDir]
root := ic.Properties[plugins.PropertyRootDir]
for _, d := range []string{root, state} {
- if err := os.MkdirAll(d, 0711); err != nil {
+ if err := os.MkdirAll(d, 0700); err != nil {
+ return nil, err
+ }
+ // chmod is needed for upgrading from an older release that created the dir with 0o711
+ if err := os.Chmod(d, 0o700); err != nil {
return nil, err
}
}
--
2.45.4

6 changes: 5 additions & 1 deletion SPECS/containerd2/containerd2.spec
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
Summary: Industry-standard container runtime
Name: %{upstream_name}2
Version: 2.0.0
Release: 14%{?dist}
Release: 15%{?dist}
License: ASL 2.0
Group: Tools/Container
URL: https://www.containerd.io
Expand All @@ -23,6 +23,7 @@ Patch3: CVE-2025-22872.patch
Patch4: CVE-2025-47291.patch
Patch5: multi-snapshotters-support.patch
Patch6: tardev-support.patch
Patch7: CVE-2024-25621.patch
%{?systemd_requires}

BuildRequires: golang < 1.25
Expand Down Expand Up @@ -98,6 +99,9 @@ fi
%dir /opt/containerd/lib

%changelog
* Tue Nov 11 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 2.0.0-15
- Patch for CVE-2024-25621

* Sun Aug 31 2025 Andrew Phelps <anphel@microsoft.com> - 2.0.0-14
- Set BR for golang to < 1.25

Expand Down
51 changes: 51 additions & 0 deletions SPECS/docker-buildx/CVE-2025-47913.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
From e5db42e32d99478b5f123a78f9e93b9a69e32abc Mon Sep 17 00:00:00 2001
From: AllSpark <allspark@microsoft.com>
Date: Tue, 18 Nov 2025 15:59:55 +0000
Subject: [PATCH] ssh/agent: return an error for unexpected message types

Previously, receiving an unexpected message type in response to a key
listing or a signing request could cause a panic due to a failed type
assertion.

This change adds a default case to the type switch in order to detect
and explicitly handle unknown or invalid message types, returning a
descriptive error instead of crashing.

Fixes golang/go#75178

Reviewed-by: backport
Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
Upstream-reference: AI Backport of https://github.com/golang/crypto/commit/559e062ce8bfd6a39925294620b50906ca2a6f95.patch
---
vendor/golang.org/x/crypto/ssh/agent/client.go | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/vendor/golang.org/x/crypto/ssh/agent/client.go b/vendor/golang.org/x/crypto/ssh/agent/client.go
index fecba8e..6dc73e0 100644
--- a/vendor/golang.org/x/crypto/ssh/agent/client.go
+++ b/vendor/golang.org/x/crypto/ssh/agent/client.go
@@ -430,8 +430,9 @@ func (c *client) List() ([]*Key, error) {
return keys, nil
case *failureAgentMsg:
return nil, errors.New("agent: failed to list keys")
+ default:
+ return nil, fmt.Errorf("agent: failed to list keys, unexpected message type %T", msg)
}
- panic("unreachable")
}

// Sign has the agent sign the data using a protocol 2 key as defined
@@ -462,8 +463,9 @@ func (c *client) SignWithFlags(key ssh.PublicKey, data []byte, flags SignatureFl
return &sig, nil
case *failureAgentMsg:
return nil, errors.New("agent: failed to sign challenge")
+ default:
+ return nil, fmt.Errorf("agent: failed to sign challenge, unexpected message type %T", msg)
}
- panic("unreachable")
}

// unmarshal parses an agent message in packet, returning the parsed
--
2.45.4

6 changes: 5 additions & 1 deletion SPECS/docker-buildx/docker-buildx.spec
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Summary: A Docker CLI plugin for extended build capabilities with BuildKi
Name: docker-buildx
# update "commit_hash" above when upgrading version
Version: 0.14.0
Release: 7%{?dist}
Release: 8%{?dist}
License: ASL 2.0
Group: Tools/Container
Vendor: Microsoft Corporation
Expand All @@ -16,6 +16,7 @@ Patch1: CVE-2024-45338.patch
Patch2: CVE-2025-22869.patch
Patch3: CVE-2025-0495.patch
Patch4: CVE-2025-22872.patch
Patch5: CVE-2025-47913.patch

BuildRequires: bash
BuildRequires: golang < 1.25
Expand Down Expand Up @@ -49,6 +50,9 @@ install -m 755 buildx "%{buildroot}%{_libexecdir}/docker/cli-plugins/docker-buil
%{_libexecdir}/docker/cli-plugins/docker-buildx

%changelog
* Tue Nov 18 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 0.14.0-8
- Patch for CVE-2025-47913

* Sun Aug 31 2025 Andrew Phelps <anphel@microsoft.com> - 0.14.0-7
- Set BR for golang to < 1.25

Expand Down
50 changes: 50 additions & 0 deletions SPECS/docker-compose/CVE-2025-47913.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
From 3a083d7126710d186760b49c440ce07bdb9a0f27 Mon Sep 17 00:00:00 2001
From: AllSpark <allspark@microsoft.com>
Date: Tue, 18 Nov 2025 15:58:07 +0000
Subject: [PATCH] ssh/agent: return an error for unexpected message types

Previously, receiving an unexpected message type in response to a key
listing or a signing request could cause a panic due to a failed type
assertion.

This change adds a default case to the type switch in order to detect
and explicitly handle unknown or invalid message types, returning a
descriptive error instead of crashing.

Fixes golang/go#75178

Signed-off-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
Upstream-reference: AI Backport of https://github.com/golang/crypto/commit/559e062ce8bfd6a39925294620b50906ca2a6f95.patch
---
vendor/golang.org/x/crypto/ssh/agent/client.go | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/vendor/golang.org/x/crypto/ssh/agent/client.go b/vendor/golang.org/x/crypto/ssh/agent/client.go
index fecba8e..6dc73e0 100644
--- a/vendor/golang.org/x/crypto/ssh/agent/client.go
+++ b/vendor/golang.org/x/crypto/ssh/agent/client.go
@@ -430,8 +430,9 @@ func (c *client) List() ([]*Key, error) {
return keys, nil
case *failureAgentMsg:
return nil, errors.New("agent: failed to list keys")
+ default:
+ return nil, fmt.Errorf("agent: failed to list keys, unexpected message type %T", msg)
}
- panic("unreachable")
}

// Sign has the agent sign the data using a protocol 2 key as defined
@@ -462,8 +463,9 @@ func (c *client) SignWithFlags(key ssh.PublicKey, data []byte, flags SignatureFl
return &sig, nil
case *failureAgentMsg:
return nil, errors.New("agent: failed to sign challenge")
+ default:
+ return nil, fmt.Errorf("agent: failed to sign challenge, unexpected message type %T", msg)
}
- panic("unreachable")
}

// unmarshal parses an agent message in packet, returning the parsed
--
2.45.4

6 changes: 5 additions & 1 deletion SPECS/docker-compose/docker-compose.spec
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
Summary: Define and run multi-container applications with Docker
Name: docker-compose
Version: 2.27.0
Release: 5%{?dist}
Release: 6%{?dist}
License: ASL 2.0
Vendor: Microsoft Corporation
Distribution: Azure Linux
Expand All @@ -17,6 +17,7 @@ Patch1: CVE-2024-45338.patch
Patch2: CVE-2025-22869.patch
Patch3: CVE-2024-10846.patch
Patch4: CVE-2025-22872.patch
Patch5: CVE-2025-47913.patch
BuildRequires: golang
Requires: docker-cli
Obsoletes: moby-compose < %{version}-%{release}
Expand Down Expand Up @@ -49,6 +50,9 @@ install -D -m0755 bin/build/docker-compose %{buildroot}/%{_libexecdir}/docker/cl
%{_libexecdir}/docker/cli-plugins/docker-compose

%changelog
* Tue Nov 18 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 2.27.0-6
- Patch for CVE-2025-47913

* Wed Apr 23 2025 Jyoti Kanase <v-jykanase@microsoft.com> - 2.27.0-5
- Patch CVE-2025-22872

Expand Down
Loading