azurelinux icon indicating copy to clipboard operation
azurelinux copied to clipboard

Patched CVE-2024-2410 in `mysql`.

Open PawelWMS opened this issue 1 year ago • 0 comments

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • [X] The toolchain has been rebuilt successfully (or no changes were made to it)
  • [X] The toolchain/worker package manifests are up-to-date
  • [X] Any updated packages successfully build (or no packages were changed)
  • [X] Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • [X] Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • [X] All package sources are available
  • [X] cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • [X] LICENSE-MAP files are up-to-date (./SPECS/LICENSES-AND-NOTICES/data/licenses.json, ./SPECS/LICENSES-AND-NOTICES/LICENSES-MAP.md, ./SPECS/LICENSES-AND-NOTICES/LICENSE-EXCEPTIONS.PHOTON)
  • [X] All source files have up-to-date hashes in the *.signatures.json files
  • [X] sudo make go-tidy-all and sudo make go-test-coverage pass
  • [X] Documentation has been updated to match any changes to the build system
  • [X] Ready to merge

Summary

CVE-2024-2410 affects the protobuf version (3.24.4) bundled in mysql. Our official version of protobuf (3.17.3) is too old for mysql and updating protobuf is not feasible due to the number of affected packages. Reverting to fixing the bundled protobuf.

Patch taken from Protobuf's 25.0 release notes.

Changes addressing test failures:

  • Switched to running tests as user test. Some of the tests were not expecting to be run as root and that was causing the failures.
  • Removed ChaCha ciphers from the list of acceptable ciphers in test_tls_server_context.cc. AZL version of OpenSSL builds with the no-chacha option, so these ciphers are just not available and that's expected.
Does this affect the toolchain?

No.

Links to CVEs
  • https://nvd.nist.gov/vuln/detail/CVE-2024-2410
Test Methodology
  • Local builds.
  • PR check.

PawelWMS avatar Oct 29 '24 17:10 PawelWMS