Skip to content

fix cve-2022-21698 in local-path-provisioner#7575

Merged
jslobodzian merged 3 commits intofasttrack/2.0from
tobiasb/cve-2022-21698-local-path-provisioner
Feb 1, 2024
Merged

fix cve-2022-21698 in local-path-provisioner#7575
jslobodzian merged 3 commits intofasttrack/2.0from
tobiasb/cve-2022-21698-local-path-provisioner

Conversation

@tobiasb-ms
Copy link
Copy Markdown
Contributor

@tobiasb-ms tobiasb-ms commented Jan 31, 2024

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./SPECS/LICENSES-AND-NOTICES/data/licenses.json, ./SPECS/LICENSES-AND-NOTICES/LICENSES-MAP.md, ./SPECS/LICENSES-AND-NOTICES/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

Fixes CVE-2022-21698 for local-path-provisioner. The vulnerability is in the client_golang go module, which is vendored in this package. Fix is to apply a (modified) patch to the vendored code.

Change Log
  • Modified the upstream patch to work with the older version of client_golang used by this package, along with getting rid of tests.
Does this affect the toolchain?

NO

Links to CVEs
Test Methodology

@tobiasb-ms tobiasb-ms requested a review from a team as a code owner January 31, 2024 18:57
@tobiasb-ms tobiasb-ms force-pushed the tobiasb/cve-2022-21698-local-path-provisioner branch from 0c1a53b to b8b1de6 Compare January 31, 2024 22:16
@PawelWMS
Copy link
Copy Markdown
Contributor

The moby-runc ptest failure is unrelated to this change. It's a known failing package tests and the failure was triggered by a different PR merging a fix to that package a short while ago.

@mfrw mfrw added the fasttrack/2.0 PRs Destined for Azure Linux 2.0 label Feb 1, 2024
Comment thread SPECS/local-path-provisioner/local-path-provisioner.spec Outdated
@mfrw mfrw added the security label Feb 1, 2024
@jslobodzian jslobodzian merged commit cbdba31 into fasttrack/2.0 Feb 1, 2024
@jslobodzian jslobodzian deleted the tobiasb/cve-2022-21698-local-path-provisioner branch February 1, 2024 23:32
CBL-Mariner-Bot pushed a commit that referenced this pull request Feb 1, 2024
Co-authored-by: jslobodzian <joslobo@microsoft.com>
Co-authored-by: Muhammad Falak R Wani <falakreyaz@gmail.com>
(cherry picked from commit cbdba31)
@CBL-Mariner-Bot
Copy link
Copy Markdown
Collaborator

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

fasttrack/2.0 PRs Destined for Azure Linux 2.0 security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants