-
Notifications
You must be signed in to change notification settings - Fork 522
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update openssl to 3.3.2 under cloud-hypervisor-cvm in order to address CVE-2024-6119 #10475
base: fasttrack/3.0
Are you sure you want to change the base?
Conversation
SPECS/cloud-hypervisor-cvm/upgrade-openssl-to-3.3.2-to-address-CVE-2024-6119.patch
Show resolved
Hide resolved
ae60794
to
754faf8
Compare
754faf8
to
542f11f
Compare
# cd %%{name}-%%{version} | ||
# cargo update -p openssl-src --precise 300.3.2+3.3.2 | ||
# diff -u ../cloud-hypervisor-msft-v38.0.72.2.backup/Cargo.lock Cargo.lock > ../upgrade-openssl-to-3.3.2-to-address-CVE-2024-6119.patch | ||
Patch0: upgrade-openssl-to-3.3.2-to-address-CVE-2024-6119.patch |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In theory we should be able to introduce openssh-devel and the rust build should use the system version of openssh and break the dependency on openssl. I think and I think that might be a better solution.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is that something that you want to do as part of high sev CVE as opposed to merging as is and addressing separately?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am ok taking it this way, but nobody will follow up on that until the next CVE issue. If my suggestion is correct, then it will be essentially fix this issue permanently...and I think that would be a better solution.
Update openssl to 3.3.2 under cloud-hypervisor-cvm in order to address CVE-2024-6119
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-static
subpackages, etc.) have had theirRelease
tag incremented../cgmanifest.json
,./toolkit/scripts/toolchain/cgmanifest.json
,.github/workflows/cgmanifest.json
)./LICENSES-AND-NOTICES/SPECS/data/licenses.json
,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md
,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON
)*.signatures.json
filessudo make go-tidy-all
andsudo make go-test-coverage
passSummary
This PR updates
openssl
dependency ofcloud-hypervisor-cvm
to version3.3.2
, as that is the version that contains a patch for CVE-2024-6119. The patch has been included into the vendored archive and is also part of this change.Change Log
Does this affect the toolchain?
NO
Links to CVEs
Test Methodology