[AutoPR- Security] Patch libsoup for CVE-2026-1536, CVE-2025-32049 [HIGH]#167
Draft
azurelinux-security wants to merge 159 commits intofasttrack/3.0from
Draft
[AutoPR- Security] Patch libsoup for CVE-2026-1536, CVE-2025-32049 [HIGH]#167azurelinux-security wants to merge 159 commits intofasttrack/3.0from
azurelinux-security wants to merge 159 commits intofasttrack/3.0from
Conversation
…icrosoft#15165) Add patch to systemd to fix stack overflow when dropping tclass or qdisc in systemd-networkd. It avoids systemd SEGV crash in certain cases.
…user to choose either ethtool or mlnx-ethtool during installation, default is ethtool. (microsoft#15014) Make kexec-tools do not depend on ethtool only, enable user to choose either ethtool or mlnx-ethtool during installation, default is ethtool. Signed-off-by: Mayank Singh <mayansingh@microsoft.com> Co-authored-by: Mayank Singh <mayansingh@microsoft.com>
…t#15028) Co-authored-by: Suresh Babu Chalamalasetty <schalam@microsoft.com>
…2025-2310, CVE-2025-2914, CVE-2025-2926, CVE-2025-6816, CVE-2025-2925, CVE-2025-2924, CVE-2025-44905,CVE-2025-6269, CVE-2025-6750, CVE-2025-6857, CVE-2025-7067, CVE-2025-7068, CVE-2025-6858, CVE_2025-2923, CVE-2025-2913, CVE-2025-6516, CVE-2025-6818, CVE-2025-6817, CVE-2025-6856, CVE-2025-7069 (microsoft#15115) Signed-off-by: Kanishk Bansal <kanbansal@microsoft.com> Co-authored-by: kgodara912 <kshigodara@outlook.com> Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
…VE-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15305 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
CVE-2025-66418, CVE-2025-66471 [HIGH] - branch 3.0-dev" microsoft#15306 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: akhila-guruju <v-guakhila@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…CVE-2025-12385 [HIGH] - branch 3.0-dev" microsoft#15307 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: BinduSri-6522866 <v-badabala@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…] and CVE-2025-12969 [Medium] - branch 3.0-dev" microsoft#15308 Co-authored-by: BinduSri-6522866 <v-badabala@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…025-66293 [HIGH] - branch 3.0-dev" microsoft#15309 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Archana Shettigar <v-shettigara@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15310 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15311 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…or CVE-2025-66293 [HIGH]" - branch 3.0-dev" microsoft#15351 Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com>
…IUM] (microsoft#15294) Signed-off-by: Kanishk Bansal <kanbansal@microsoft.com> Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
…2025-65637 [HIGH] - branch 3.0-dev" microsoft#15352 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…ta-importer for CVE-2025-65637 [HIGH] - branch 3.0-dev" microsoft#15353 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…#15561) Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
Co-authored-by: CBL-Mariner Servicing Account <cblmargh@microsoft.com>
…026-21637, CVE-2025-59466, CVE-2025-59465, CVE-2025-55132, CVE-2025-55131 [HIGH] - branch 3.0-dev" microsoft#15624 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: BinduSri-6522866 <v-badabala@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-kata-containerd - branch 3.0-dev (microsoft#15623) Signed-off-by: Aurélien Bombo <abombo@microsoft.com> Signed-off-by: Aurélien Bombo <aurelien.bombo@microsoft.com> Co-authored-by: Aurélien Bombo <aurelien.bombo@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…2026-24747 [HIGH] - branch 3.0-dev" microsoft#15625 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…osoft#15579) Backports a fix for a credential leak vulnerability in containerd2's CRI error handling. When image pulls fail from private registries using URL-based authentication (e.g., Azure Blob Storage with SAS tokens), sensitive query parameters were being exposed in both containerd logs and Kubernetes pod events (visible via kubectl describe pod).
…onalization support in nodejs24 (microsoft#15385) Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
…t#15612) CONFIG_SQUASHFS_ZSTD With this a better compression algo (zstd) becomes available to users, this is a read-only kernel feature with minimal overhead when not in use. Already enabled in our ARM kernel. CONFIG_FW_CFG_SYSFS Enables module that permits firmware config injection. Minimal overhead, not loaded when not in use. Already enabled in our ARM kernel Co-authored-by: Jiri Appl <jiria@microsoft.com>
Co-authored-by: Archana Shettigar <v-shettigara@microsoft.com>
…VE-2025-66199, CVE-2025-68160, CVE-2025-69418, CVE-2025-69420, CVE-2025-69421 - branch 3.0-dev (microsoft#15627) Co-authored-by: corvus-callidus <lyrydber@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…RITICAL] - branch 3.0-dev (microsoft#15646) Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com> approving PR. Buddy build and expected tests passed.
Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
CVE-2026-22796 - branch 3.0-dev (microsoft#15698) Co-authored-by: corvus-callidus <lyrydber@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…-2025-69420, CVE-2025-69418, CVE-2025-68160 [HIGH] (microsoft#15702) Co-authored-by: Kanishk Bansal <kanbansal@microsoft.com>
…-dev (microsoft#15660) Co-authored-by: Rachel Menge <rachelmenge@microsoft.com>
…[HIGH] - branch 3.0-dev (microsoft#15703) Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com> Co-authored-by: jslobodzian <joslobo@microsoft.com>
…026-24882 [HIGH] - branch 3.0-dev" microsoft#15713 Co-authored-by: Azure Linux Security Servicing Account <azurelinux-security@microsoft.com>
…ft#15601) Co-authored-by: Kanishk Bansal <103916909+Kanishk-Bansal@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Auto Patch libsoup for CVE-2026-1536, CVE-2025-32049.
Autosec pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=1042913&view=results
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./LICENSES-AND-NOTICES/SPECS/data/licenses.json,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
What does the PR accomplish, why was it needed?
Change Log
Does this affect the toolchain?
YES/NO
Associated issues
Links to CVEs
Test Methodology