Skip to content

Commit 073a799

Browse files
committed
Merge branch 'main' into 2.0
2 parents e6b5ba9 + 70d277a commit 073a799

File tree

107 files changed

+10791
-301
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+10791
-301
lines changed

SPECS-EXTENDED/gdal/gdal.spec

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Summary: GIS file format library
1515
#global pre rc1
1616
Name: gdal
1717
Version: 3.6.3
18-
Release: 4%{?dist}
18+
Release: 5%{?dist}
1919
License: MIT
2020
Vendor: Microsoft Corporation
2121
Distribution: Mariner
@@ -316,6 +316,11 @@ ctest -E "autotest_osr|autotest_alg|autotest_gdrivers|autotest_gcore"
316316

317317

318318
%changelog
319+
* Mon Dec 29 2025 Kshitiz Godara <[email protected]> - 3.6.3-5
320+
- Bumping the release version so that this package is re-built with
321+
the newer 1.14.6 hdf5 libraries. This ensures that the matching
322+
1.14.6 .so files Will be used at run time.
323+
319324
* Wed May 22 2024 George Mileka <[email protected]> - 3.6.3-4
320325
Remove the use of explicit hdf5 version from the build-time dependencies.
321326

SPECS-EXTENDED/netcdf/netcdf.spec

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
Summary: Libraries for the Unidata network Common Data Form
1313
Name: netcdf
1414
Version: 4.9.0
15-
Release: 6%{?dist}
15+
Release: 7%{?dist}
1616
License: NetCDF
1717
Vendor: Microsoft Corporation
1818
Distribution: Mariner
@@ -398,6 +398,11 @@ done
398398

399399

400400
%changelog
401+
* Mon Dec 29 2025 Kshitiz Godara <[email protected]> - 4.9.0-7
402+
- Bumping the release version so that this package is re-built with
403+
the newer 1.14.6 hdf5 libraries. This ensures that the matching
404+
1.14.6 .so files Will be used at run time.
405+
401406
* Wed May 22 2024 George Mileka <[email protected]> - 4.9.0-6
402407
Remove the use of the '_hdf5_version' and explicit hdf5 version from the
403408
build-time dependencies.

SPECS-SIGNED/grub2-efi-binary-signed/grub2-efi-binary-signed.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
Summary: Signed GRand Unified Bootloader for %{buildarch} systems
1313
Name: grub2-efi-binary-signed-%{buildarch}
1414
Version: 2.06
15-
Release: 15%{?dist}
15+
Release: 16%{?dist}
1616
License: GPLv3+
1717
Vendor: Microsoft Corporation
1818
Distribution: Mariner
@@ -77,6 +77,9 @@ cp %{SOURCE3} %{buildroot}/boot/efi/EFI/BOOT/%{grubpxeefiname}
7777
/boot/efi/EFI/BOOT/%{grubpxeefiname}
7878

7979
%changelog
80+
* Thu Nov 27 2025 Akhila Guruju <[email protected]> - 2.06-16
81+
- Bump release number to match grub release
82+
8083
* Tue Jun 17 2025 Kshitiz Godara <[email protected]> - 2.06-15
8184
- Bump release number to match grub release
8285

SPECS-SIGNED/hvloader-signed/hvloader-signed.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
Summary: Signed HvLoader.efi for %{buildarch} systems
77
Name: hvloader-signed-%{buildarch}
88
Version: 1.0.1
9-
Release: 14%{?dist}
9+
Release: 15%{?dist}
1010
License: MIT
1111
Vendor: Microsoft Corporation
1212
Distribution: Mariner
@@ -69,6 +69,9 @@ popd
6969
/boot/efi/HvLoader.efi
7070

7171
%changelog
72+
* Wed Nov 20 2025 Jyoti kanase <[email protected]> - 1.0.1-15
73+
- Bump release for consistency with hvloader spec.
74+
7275
* Tue Aug 12 2025 Azure Linux Security Servicing Account <[email protected]> - 1.0.1-14
7376
- Bump release for consistency with hvloader spec.
7477

Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
From af32d40d6e7e0936306edd41ed34272777c09eab Mon Sep 17 00:00:00 2001
2+
From: Chris <[email protected]>
3+
Date: Fri, 10 Mar 2023 13:45:41 -0800
4+
Subject: [PATCH 1/2] This commit fixes a potential denial of service
5+
vulnerability in logrus.Writer() that could be triggered by logging text
6+
longer than 64kb without newlines. Previously, the bufio.Scanner used by
7+
Writer() would hang indefinitely when reading such text without newlines,
8+
causing the application to become unresponsive.
9+
10+
---
11+
vendor/github.com/sirupsen/logrus/writer.go | 33 ++++++++++++++++++++-
12+
1 file changed, 32 insertions(+), 1 deletion(-)
13+
14+
diff --git a/vendor/github.com/sirupsen/logrus/writer.go b/vendor/github.com/sirupsen/logrus/writer.go
15+
index 72e8e3a..36032d0 100644
16+
--- a/vendor/github.com/sirupsen/logrus/writer.go
17+
+++ b/vendor/github.com/sirupsen/logrus/writer.go
18+
@@ -4,6 +4,7 @@ import (
19+
"bufio"
20+
"io"
21+
"runtime"
22+
+ "strings"
23+
)
24+
25+
// Writer at INFO level. See WriterLevel for details.
26+
@@ -20,15 +21,18 @@ func (logger *Logger) WriterLevel(level Level) *io.PipeWriter {
27+
return NewEntry(logger).WriterLevel(level)
28+
}
29+
30+
+// Writer returns an io.Writer that writes to the logger at the info log level
31+
func (entry *Entry) Writer() *io.PipeWriter {
32+
return entry.WriterLevel(InfoLevel)
33+
}
34+
35+
+// WriterLevel returns an io.Writer that writes to the logger at the given log level
36+
func (entry *Entry) WriterLevel(level Level) *io.PipeWriter {
37+
reader, writer := io.Pipe()
38+
39+
var printFunc func(args ...interface{})
40+
41+
+ // Determine which log function to use based on the specified log level
42+
switch level {
43+
case TraceLevel:
44+
printFunc = entry.Trace
45+
@@ -48,23 +52,50 @@ func (entry *Entry) WriterLevel(level Level) *io.PipeWriter {
46+
printFunc = entry.Print
47+
}
48+
49+
+ // Start a new goroutine to scan the input and write it to the logger using the specified print function.
50+
+ // It splits the input into chunks of up to 64KB to avoid buffer overflows.
51+
go entry.writerScanner(reader, printFunc)
52+
+
53+
+ // Set a finalizer function to close the writer when it is garbage collected
54+
runtime.SetFinalizer(writer, writerFinalizer)
55+
56+
return writer
57+
}
58+
59+
+// writerScanner scans the input from the reader and writes it to the logger
60+
func (entry *Entry) writerScanner(reader *io.PipeReader, printFunc func(args ...interface{})) {
61+
scanner := bufio.NewScanner(reader)
62+
+
63+
+ // Set the buffer size to the maximum token size to avoid buffer overflows
64+
+ scanner.Buffer(make([]byte, bufio.MaxScanTokenSize), bufio.MaxScanTokenSize)
65+
+
66+
+ // Define a split function to split the input into chunks of up to 64KB
67+
+ chunkSize := 64 * 1024 // 64KB
68+
+ splitFunc := func(data []byte, atEOF bool) (int, []byte, error) {
69+
+ if len(data) > chunkSize {
70+
+ return chunkSize, data[:chunkSize], nil
71+
+ }
72+
+ return 0, nil, nil
73+
+ }
74+
+
75+
+ //Use the custom split function to split the input
76+
+ scanner.Split(splitFunc)
77+
+
78+
+ // Scan the input and write it to the logger using the specified print function
79+
for scanner.Scan() {
80+
- printFunc(scanner.Text())
81+
+ printFunc(strings.TrimRight(scanner.Text(), "\r\n"))
82+
}
83+
+
84+
+ // If there was an error while scanning the input, log an error
85+
if err := scanner.Err(); err != nil {
86+
entry.Errorf("Error while reading from Writer: %s", err)
87+
}
88+
+
89+
+ // Close the reader when we are done
90+
reader.Close()
91+
}
92+
93+
+// WriterFinalizer is a finalizer function that closes then given writer when it is garbage collected
94+
func writerFinalizer(writer *io.PipeWriter) {
95+
writer.Close()
96+
}
97+
--
98+
2.45.4
99+
100+
101+
From be88ae64b9c8109d4ddd9c1981221d03c8476b44 Mon Sep 17 00:00:00 2001
102+
From: Chris <[email protected]>
103+
Date: Fri, 10 Mar 2023 13:45:41 -0800
104+
Subject: [PATCH 2/2] Scan text in 64KB chunks
105+
106+
This commit fixes a potential denial of service
107+
vulnerability in logrus.Writer() that could be
108+
triggered by logging text longer than 64KB
109+
without newlines. Previously, the bufio.Scanner
110+
used by Writer() would hang indefinitely when
111+
reading such text without newlines, causing the
112+
application to become unresponsive.
113+
114+
Signed-off-by: Azure Linux Security Servicing Account <[email protected]>
115+
Upstream-reference: https://github.com/sirupsen/logrus/pull/1376.patch
116+
---
117+
vendor/github.com/sirupsen/logrus/writer.go | 3 ++-
118+
1 file changed, 2 insertions(+), 1 deletion(-)
119+
120+
diff --git a/vendor/github.com/sirupsen/logrus/writer.go b/vendor/github.com/sirupsen/logrus/writer.go
121+
index 36032d0..7e7703c 100644
122+
--- a/vendor/github.com/sirupsen/logrus/writer.go
123+
+++ b/vendor/github.com/sirupsen/logrus/writer.go
124+
@@ -75,7 +75,8 @@ func (entry *Entry) writerScanner(reader *io.PipeReader, printFunc func(args ...
125+
if len(data) > chunkSize {
126+
return chunkSize, data[:chunkSize], nil
127+
}
128+
- return 0, nil, nil
129+
+
130+
+ return len(data), data, nil
131+
}
132+
133+
//Use the custom split function to split the input
134+
--
135+
2.45.4
136+

SPECS/cert-manager/cert-manager.spec

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Summary: Automatically provision and manage TLS certificates in Kubernetes
22
Name: cert-manager
33
Version: 1.11.2
4-
Release: 24%{?dist}
4+
Release: 25%{?dist}
55
License: ASL 2.0
66
Vendor: Microsoft Corporation
77
Distribution: Mariner
@@ -38,6 +38,7 @@ Patch15: CVE-2025-30204.patch
3838
Patch16: CVE-2024-51744.patch
3939
Patch17: CVE-2025-32386.patch
4040
Patch18: CVE-2025-22872.patch
41+
Patch19: CVE-2025-65637.patch
4142

4243
BuildRequires: golang
4344
Requires: %{name}-acmesolver
@@ -131,6 +132,9 @@ install -D -m0755 bin/webhook %{buildroot}%{_bindir}/
131132
%{_bindir}/webhook
132133

133134
%changelog
135+
* Mon Dec 08 2025 Azure Linux Security Servicing Account <[email protected]> - 1.11.2-25
136+
- Patch for CVE-2025-65637
137+
134138
* Thu Sep 04 2025 Akhila Guruju <[email protected]> - 1.11.2-24
135139
- Bump release to rebuild with golang
136140

SPECS/cf-cli/CVE-2025-65637.patch

Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
From 93f4a08fe4b678980b16560eff48b5d0a2fb5488 Mon Sep 17 00:00:00 2001
2+
From: Chris <[email protected]>
3+
Date: Fri, 10 Mar 2023 13:45:41 -0800
4+
Subject: [PATCH 1/2] This commit fixes a potential denial of service
5+
vulnerability in logrus.Writer() that could be triggered by logging text
6+
longer than 64kb without newlines. Previously, the bufio.Scanner used by
7+
Writer() would hang indefinitely when reading such text without newlines,
8+
causing the application to become unresponsive.
9+
10+
---
11+
vendor/github.com/sirupsen/logrus/writer.go | 33 ++++++++++++++++++++-
12+
1 file changed, 32 insertions(+), 1 deletion(-)
13+
14+
diff --git a/vendor/github.com/sirupsen/logrus/writer.go b/vendor/github.com/sirupsen/logrus/writer.go
15+
index 9e1f751..bbeef80 100644
16+
--- a/vendor/github.com/sirupsen/logrus/writer.go
17+
+++ b/vendor/github.com/sirupsen/logrus/writer.go
18+
@@ -4,6 +4,7 @@ import (
19+
"bufio"
20+
"io"
21+
"runtime"
22+
+ "strings"
23+
)
24+
25+
func (logger *Logger) Writer() *io.PipeWriter {
26+
@@ -14,15 +15,18 @@ func (logger *Logger) WriterLevel(level Level) *io.PipeWriter {
27+
return NewEntry(logger).WriterLevel(level)
28+
}
29+
30+
+// Writer returns an io.Writer that writes to the logger at the info log level
31+
func (entry *Entry) Writer() *io.PipeWriter {
32+
return entry.WriterLevel(InfoLevel)
33+
}
34+
35+
+// WriterLevel returns an io.Writer that writes to the logger at the given log level
36+
func (entry *Entry) WriterLevel(level Level) *io.PipeWriter {
37+
reader, writer := io.Pipe()
38+
39+
var printFunc func(args ...interface{})
40+
41+
+ // Determine which log function to use based on the specified log level
42+
switch level {
43+
case TraceLevel:
44+
printFunc = entry.Trace
45+
@@ -42,23 +46,50 @@ func (entry *Entry) WriterLevel(level Level) *io.PipeWriter {
46+
printFunc = entry.Print
47+
}
48+
49+
+ // Start a new goroutine to scan the input and write it to the logger using the specified print function.
50+
+ // It splits the input into chunks of up to 64KB to avoid buffer overflows.
51+
go entry.writerScanner(reader, printFunc)
52+
+
53+
+ // Set a finalizer function to close the writer when it is garbage collected
54+
runtime.SetFinalizer(writer, writerFinalizer)
55+
56+
return writer
57+
}
58+
59+
+// writerScanner scans the input from the reader and writes it to the logger
60+
func (entry *Entry) writerScanner(reader *io.PipeReader, printFunc func(args ...interface{})) {
61+
scanner := bufio.NewScanner(reader)
62+
+
63+
+ // Set the buffer size to the maximum token size to avoid buffer overflows
64+
+ scanner.Buffer(make([]byte, bufio.MaxScanTokenSize), bufio.MaxScanTokenSize)
65+
+
66+
+ // Define a split function to split the input into chunks of up to 64KB
67+
+ chunkSize := 64 * 1024 // 64KB
68+
+ splitFunc := func(data []byte, atEOF bool) (int, []byte, error) {
69+
+ if len(data) > chunkSize {
70+
+ return chunkSize, data[:chunkSize], nil
71+
+ }
72+
+ return 0, nil, nil
73+
+ }
74+
+
75+
+ //Use the custom split function to split the input
76+
+ scanner.Split(splitFunc)
77+
+
78+
+ // Scan the input and write it to the logger using the specified print function
79+
for scanner.Scan() {
80+
- printFunc(scanner.Text())
81+
+ printFunc(strings.TrimRight(scanner.Text(), "\r\n"))
82+
}
83+
+
84+
+ // If there was an error while scanning the input, log an error
85+
if err := scanner.Err(); err != nil {
86+
entry.Errorf("Error while reading from Writer: %s", err)
87+
}
88+
+
89+
+ // Close the reader when we are done
90+
reader.Close()
91+
}
92+
93+
+// WriterFinalizer is a finalizer function that closes then given writer when it is garbage collected
94+
func writerFinalizer(writer *io.PipeWriter) {
95+
writer.Close()
96+
}
97+
--
98+
2.45.4
99+
100+
101+
From 944504874319c871da113e3722fe40b7a361e2a1 Mon Sep 17 00:00:00 2001
102+
From: Chris <[email protected]>
103+
Date: Fri, 10 Mar 2023 13:45:41 -0800
104+
Subject: [PATCH 2/2] Scan text in 64KB chunks
105+
106+
This commit fixes a potential denial of service
107+
vulnerability in logrus.Writer() that could be
108+
triggered by logging text longer than 64KB
109+
without newlines. Previously, the bufio.Scanner
110+
used by Writer() would hang indefinitely when
111+
reading such text without newlines, causing the
112+
application to become unresponsive.
113+
114+
Signed-off-by: Azure Linux Security Servicing Account <[email protected]>
115+
Upstream-reference: https://github.com/sirupsen/logrus/pull/1376.patch
116+
---
117+
vendor/github.com/sirupsen/logrus/writer.go | 3 ++-
118+
1 file changed, 2 insertions(+), 1 deletion(-)
119+
120+
diff --git a/vendor/github.com/sirupsen/logrus/writer.go b/vendor/github.com/sirupsen/logrus/writer.go
121+
index bbeef80..bc6c19c 100644
122+
--- a/vendor/github.com/sirupsen/logrus/writer.go
123+
+++ b/vendor/github.com/sirupsen/logrus/writer.go
124+
@@ -69,7 +69,8 @@ func (entry *Entry) writerScanner(reader *io.PipeReader, printFunc func(args ...
125+
if len(data) > chunkSize {
126+
return chunkSize, data[:chunkSize], nil
127+
}
128+
- return 0, nil, nil
129+
+
130+
+ return len(data), data, nil
131+
}
132+
133+
//Use the custom split function to split the input
134+
--
135+
2.45.4
136+

0 commit comments

Comments
 (0)