forked from microsoft/azurelinux
-
Notifications
You must be signed in to change notification settings - Fork 0
[AutoPR- Security] Patch libsoup for CVE-2026-1536, CVE-2025-32049 [HIGH] #167
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Draft
azurelinux-security
wants to merge
159
commits into
fasttrack/3.0
Choose a base branch
from
azure-autosec/libsoup/3.0/1042913
base: fasttrack/3.0
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Draft
[AutoPR- Security] Patch libsoup for CVE-2026-1536, CVE-2025-32049 [HIGH] #167
azurelinux-security
wants to merge
159
commits into
fasttrack/3.0
from
azure-autosec/libsoup/3.0/1042913
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…icrosoft#15165) Add patch to systemd to fix stack overflow when dropping tclass or qdisc in systemd-networkd. It avoids systemd SEGV crash in certain cases.
…user to choose either ethtool or mlnx-ethtool during installation, default is ethtool. (microsoft#15014) Make kexec-tools do not depend on ethtool only, enable user to choose either ethtool or mlnx-ethtool during installation, default is ethtool. Signed-off-by: Mayank Singh <mayansingh@microsoft.com> Co-authored-by: Mayank Singh <mayansingh@microsoft.com>
…t#15028) Co-authored-by: Suresh Babu Chalamalasetty <schalam@microsoft.com>
…2025-2310, CVE-2025-2914, CVE-2025-2926, CVE-2025-6816, CVE-2025-2925, CVE-2025-2924, CVE-2025-44905,CVE-2025-6269, CVE-2025-6750, CVE-2025-6857, CVE-2025-7067, CVE-2025-7068, CVE-2025-6858, CVE_2025-2923, CVE-2025-2913, CVE-2025-6516, CVE-2025-6818, CVE-2025-6817, CVE-2025-6856, CVE-2025-7069 (microsoft#15115) Signed-off-by: Kanishk Bansal <kanbansal@microsoft.com> Co-authored-by: kgodara912 <kshigodara@outlook.com> Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
…VE-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15305 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
CVE-2025-66418, CVE-2025-66471 [HIGH] - branch 3.0-dev" microsoft#15306 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: akhila-guruju <v-guakhila@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…CVE-2025-12385 [HIGH] - branch 3.0-dev" microsoft#15307 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: BinduSri-6522866 <v-badabala@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…] and CVE-2025-12969 [Medium] - branch 3.0-dev" microsoft#15308 Co-authored-by: BinduSri-6522866 <v-badabala@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…025-66293 [HIGH] - branch 3.0-dev" microsoft#15309 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Archana Shettigar <v-shettigara@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15310 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15311 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…or CVE-2025-66293 [HIGH]" - branch 3.0-dev" microsoft#15351 Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com>
…IUM] (microsoft#15294) Signed-off-by: Kanishk Bansal <kanbansal@microsoft.com> Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
…2025-65637 [HIGH] - branch 3.0-dev" microsoft#15352 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…ta-importer for CVE-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15353 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…#15561) Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
Co-authored-by: CBL-Mariner Servicing Account <cblmargh@microsoft.com>
…026-21637, CVE-2025-59466, CVE-2025-59465, CVE-2025-55132, CVE-2025-55131 [HIGH] - branch 3.0-dev" microsoft#15624 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: BinduSri-6522866 <v-badabala@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-kata-containerd - branch 3.0-dev (microsoft#15623) Signed-off-by: Aurélien Bombo <abombo@microsoft.com> Signed-off-by: Aurélien Bombo <aurelien.bombo@microsoft.com> Co-authored-by: Aurélien Bombo <aurelien.bombo@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…2026-24747 [HIGH] - branch 3.0-dev" microsoft#15625 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…osoft#15579) Backports a fix for a credential leak vulnerability in containerd2's CRI error handling. When image pulls fail from private registries using URL-based authentication (e.g., Azure Blob Storage with SAS tokens), sensitive query parameters were being exposed in both containerd logs and Kubernetes pod events (visible via kubectl describe pod).
…onalization support in nodejs24 (microsoft#15385) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
…t#15612) CONFIG_SQUASHFS_ZSTD With this a better compression algo (zstd) becomes available to users, this is a read-only kernel feature with minimal overhead when not in use. Already enabled in our ARM kernel. CONFIG_FW_CFG_SYSFS Enables module that permits firmware config injection. Minimal overhead, not loaded when not in use. Already enabled in our ARM kernel Co-authored-by: Jiri Appl <jiria@microsoft.com>
Co-authored-by: Archana Shettigar <v-shettigara@microsoft.com>
…VE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421 - branch 3.0-dev (microsoft#15627) Co-authored-by: corvus-callidus <lyrydber@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…RITICAL] - branch 3.0-dev (microsoft#15646) Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com> approving PR. Buddy build and expected tests passed.
Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
CVE-2026-22796 - branch 3.0-dev (microsoft#15698) Co-authored-by: corvus-callidus <lyrydber@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-2025-69420, CVE-2025-69418, CVE-2025-68160 [HIGH] (microsoft#15702) Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
…-dev (microsoft#15660) Co-authored-by: Rachel Menge <rachelmenge@microsoft.com>
…[HIGH] - branch 3.0-dev (microsoft#15703) Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…026-24882 [HIGH] - branch 3.0-dev" microsoft#15713 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
…ft#15601) Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Auto Patch libsoup for CVE-2026-1536, CVE-2025-32049.
Autosec pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=1042913&view=results
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./LICENSES-AND-NOTICES/SPECS/data/licenses.json,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
What does the PR accomplish, why was it needed?
Change Log
Does this affect the toolchain?
YES/NO
Associated issues
Links to CVEs
Test Methodology