Skip to content

Commit d220b7f

Browse files
committed
Merge branch '3.0-dev' into anphel/3-mid-aug-release-snap
2 parents 25ef93e + 577658d commit d220b7f

File tree

6 files changed

+139
-4
lines changed

6 files changed

+139
-4
lines changed

SPECS-SIGNED/edk2-hvloader-signed/edk2-hvloader-signed.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
Summary: Signed HvLoader.efi for %{buildarch} systems
1212
Name: edk2-hvloader-signed-%{buildarch}
1313
Version: %{GITDATE}git%{GITCOMMIT}
14-
Release: 8%{?dist}
14+
Release: 9%{?dist}
1515
License: MIT
1616
Vendor: Microsoft Corporation
1717
Distribution: Azure Linux
@@ -74,6 +74,9 @@ popd
7474
/boot/efi/HvLoader.efi
7575

7676
%changelog
77+
* Mon Aug 11 2025 Azure Linux Security Servicing Account <[email protected]> - 20240524git3e722403cd16-9
78+
- Bump release for consistency with edk2 spec.
79+
7780
* Thu Apr 24 2025 Jyoti Kanase <[email protected]> - 20240524git3e722403cd16-8
7881
- Bump release for consistency with edk2 spec.
7982

SPECS/azurelinux-release/azurelinux-release.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
Summary: Azure Linux release files
66
Name: azurelinux-release
77
Version: %{dist_version}.0
8-
Release: 31%{?dist}
8+
Release: 32%{?dist}
99
License: MIT
1010
Vendor: Microsoft Corporation
1111
Distribution: Azure Linux
@@ -118,6 +118,9 @@ install -Dm0644 %{SOURCE4} -t %{buildroot}%{_sysctldir}/
118118
%{_sysctldir}/*.conf
119119

120120
%changelog
121+
* Fri Aug 22 2025 CBL-Mariner Servicing Account <[email protected]> - 3.0-32
122+
- Bump release for Aug 2025 Update 2
123+
121124
* Tue Jul 22 2025 CBL-Mariner Servicing Account <[email protected]> - 3.0-31
122125
- Bump release for Aug 2025 Update
123126

SPECS/edk2/CVE-2025-3770.patch

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
From 9e882b45ee5648f415540cea3c2c0f7e274b5e86 Mon Sep 17 00:00:00 2001
2+
From: John Mathews <[email protected]>
3+
Date: Fri, 30 May 2025 11:06:49 -0700
4+
Subject: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm: Safe handling of IDT register on
5+
SMM entry
6+
7+
Mitigates CVE-2025-3770
8+
9+
Do not assume that IDT.limit is loaded with a zero value upon SMM entry.
10+
Delay enabling Machine Check Exceptions in SMM until after the SMM IDT
11+
has been reloaded.
12+
13+
Signed-off-by: John Mathews <[email protected]>
14+
Signed-off-by: rpm-build <rpm-build>
15+
Upstream-reference: https://github.com/tianocore/edk2/commit/d2d8d38ee08c5e602fb092f940dfecc1f5a4eb38.patch
16+
---
17+
UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmiEntry.nasm | 6 +++++-
18+
1 file changed, 5 insertions(+), 1 deletion(-)
19+
20+
diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmiEntry.nasm b/UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmiEntry.nasm
21+
index 644366b..6e1cd45 100644
22+
--- a/UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmiEntry.nasm
23+
+++ b/UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmiEntry.nasm
24+
@@ -113,7 +113,7 @@ ProtFlatMode:
25+
mov eax, strict dword 0 ; source operand will be patched
26+
ASM_PFX(gPatchSmiCr3):
27+
mov cr3, rax
28+
- mov eax, 0x668 ; as cr4.PGE is not set here, refresh cr3
29+
+ mov eax, 0x628 ; as cr4.PGE is not set here, refresh cr3
30+
31+
mov cl, strict byte 0 ; source operand will be patched
32+
ASM_PFX(gPatch5LevelPagingNeeded):
33+
@@ -204,6 +204,10 @@ SmiHandlerIdtrAbsAddr:
34+
mov ax, [rbx + DSC_SS]
35+
mov ss, eax
36+
37+
+ mov rax, cr4 ; enable MCE
38+
+ bts rax, 6
39+
+ mov cr4, rax
40+
+
41+
mov rbx, [rsp + 0x8] ; rbx <- CpuIndex
42+
43+
; enable CET if supported
44+
--
45+
2.45.4
46+

SPECS/edk2/edk2.spec

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ ExclusiveArch: x86_64
5555

5656
Name: edk2
5757
Version: %{GITDATE}git%{GITCOMMIT}
58-
Release: 8%{?dist}
58+
Release: 9%{?dist}
5959
Summary: UEFI firmware for 64-bit virtual machines
6060
License: Apache-2.0 AND (BSD-2-Clause OR GPL-2.0-or-later) AND BSD-2-Clause-Patent AND BSD-3-Clause AND BSD-4-Clause AND ISC AND MIT AND LicenseRef-Fedora-Public-Domain
6161
URL: https://www.tianocore.org
@@ -138,6 +138,7 @@ Patch1002: CVE-2024-4741.patch
138138
Patch1003: CVE-2024-13176.patch
139139
Patch1004: CVE-2024-2511.patch
140140
Patch1005: CVE-2024-4603.patch
141+
Patch1006: CVE-2025-3770.patch
141142

142143
# python3-devel and libuuid-devel are required for building tools.
143144
# python3-devel is also needed for varstore template generation and
@@ -799,6 +800,9 @@ done
799800
/boot/efi/HvLoader.efi
800801

801802
%changelog
803+
* Mon Aug 11 2025 Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> - 20240524git3e722403cd16-9
804+
- Patch for CVE-2025-3770
805+
802806
* Thu Apr 24 2025 Jyoti Kanase <v-jykanase@microsoft.com> - 20240524git3e722403cd16-8
803807
- Fix CVE-2024-38796
804808

SPECS/libsoup/CVE-2025-4969.patch

Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
From 41e93c07278ce3d2f353c396045d757a7c4ed824 Mon Sep 17 00:00:00 2001
2+
From: Milan Crha <[email protected]>
3+
Date: Mon, 19 May 2025 17:48:27 +0200
4+
Subject: [PATCH] soup-multipart: Verify array bounds before accessing its
5+
members
6+
7+
The boundary could be at a place which, calculated, pointed
8+
before the beginning of the array. Check the bounds, to avoid
9+
read out of the array bounds.
10+
11+
Closes https://gitlab.gnome.org/GNOME/libsoup/-/issues/447
12+
13+
Signed-off-by: Azure Linux Security Servicing Account <[email protected]>
14+
Upstream-reference: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/467.patch
15+
---
16+
libsoup/soup-multipart.c | 2 +-
17+
tests/multipart-test.c | 22 ++++++++++++++++++++++
18+
2 files changed, 23 insertions(+), 1 deletion(-)
19+
20+
diff --git a/libsoup/soup-multipart.c b/libsoup/soup-multipart.c
21+
index a587fe7..27257e4 100644
22+
--- a/libsoup/soup-multipart.c
23+
+++ b/libsoup/soup-multipart.c
24+
@@ -104,7 +104,7 @@ find_boundary (const char *start, const char *end,
25+
continue;
26+
27+
/* Check that it's at start of line */
28+
- if (!(b == start || (b[-1] == '\n' && b[-2] == '\r')))
29+
+ if (!(b == start || (b - start >= 2 && b[-1] == '\n' && b[-2] == '\r')))
30+
continue;
31+
32+
/* Check for "--" or "\r\n" after boundary */
33+
diff --git a/tests/multipart-test.c b/tests/multipart-test.c
34+
index a3a0b36..b07e4db 100644
35+
--- a/tests/multipart-test.c
36+
+++ b/tests/multipart-test.c
37+
@@ -527,6 +527,27 @@ test_multipart_bounds_bad (void)
38+
g_bytes_unref (bytes);
39+
}
40+
41+
+static void
42+
+test_multipart_bounds_bad_2 (void)
43+
+{
44+
+ SoupMultipart *multipart;
45+
+ SoupMessageHeaders *headers;
46+
+ GBytes *bytes;
47+
+ const char *raw_data = "\n--123\r\nline\r\n--123--\r";
48+
+
49+
+ headers = soup_message_headers_new (SOUP_MESSAGE_HEADERS_MULTIPART);
50+
+ soup_message_headers_append (headers, "Content-Type", "multipart/mixed; boundary=\"123\"");
51+
+
52+
+ bytes = g_bytes_new (raw_data, strlen (raw_data));
53+
+
54+
+ multipart = soup_multipart_new_from_message (headers, bytes);
55+
+ g_assert_nonnull (multipart);
56+
+
57+
+ soup_multipart_free (multipart);
58+
+ soup_message_headers_unref (headers);
59+
+ g_bytes_unref (bytes);
60+
+}
61+
+
62+
static void
63+
test_multipart_too_large (void)
64+
{
65+
@@ -595,6 +616,7 @@ main (int argc, char **argv)
66+
g_test_add_data_func ("/multipart/async-small-reads", GINT_TO_POINTER (ASYNC_MULTIPART_SMALL_READS), test_multipart);
67+
g_test_add_func ("/multipart/bounds-good", test_multipart_bounds_good);
68+
g_test_add_func ("/multipart/bounds-bad", test_multipart_bounds_bad);
69+
+ g_test_add_func ("/multipart/bounds-bad-2", test_multipart_bounds_bad_2);
70+
g_test_add_func ("/multipart/too-large", test_multipart_too_large);
71+
72+
ret = g_test_run ();
73+
--
74+
2.45.4
75+

SPECS/libsoup/libsoup.spec

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Summary: libsoup HTTP client/server library
55
Name: libsoup
66
Version: 3.4.4
7-
Release: 8%{?dist}
7+
Release: 9%{?dist}
88
License: GPLv2
99
Vendor: Microsoft Corporation
1010
Distribution: Azure Linux
@@ -66,6 +66,7 @@ Patch16: CVE-2025-32053.patch
6666
Patch17: CVE-2025-4476.patch
6767
Patch18: CVE-2025-32907.patch
6868
Patch19: CVE-2025-4948.patch
69+
Patch20: CVE-2025-4969.patch
6970

7071
%description
7172
libsoup is HTTP client/server library for GNOME
@@ -133,6 +134,9 @@ find %{buildroot} -type f -name "*.la" -delete -print
133134
%defattr(-,root,root)
134135

135136
%changelog
137+
* Tue Aug 12 2025 Azure Linux Security Servicing Account <[email protected]> - 3.4.4-9
138+
- Patch for CVE-2025-4969
139+
136140
* Tue Jul 29 2025 Azure Linux Security Servicing Account <[email protected]> - 3.4.4-8
137141
- Patch for CVE-2025-4948
138142

0 commit comments

Comments
 (0)