-
Notifications
You must be signed in to change notification settings - Fork 602
[High] Patch libxml2 for CVE-2025-7425 #15479
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[High] Patch libxml2 for CVE-2025-7425 #15479
Conversation
67b9eaa to
c714315
Compare
|
Buddy Build has passed. |
|
/azurepipelines run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
Resolved Merge conflicts |
|
/azurepipelines run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
Kanishk-Bansal
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Patch has been taken from https://git.rockylinux.org/staging/rpms/libxml2/-/blob/r9/SOURCES/libxml2-2.9.13-CVE-2025-7425.patch which applies cleanly.
%autosetup -n %{name}-v%{version} -p1 ensures patch application
- Buddy Build
- patch applied during the build (check
rpm.log) - patch include an upstream reference
- PR has security tag
(cherry picked from commit 2d6fee5)
|
Auto cherry-pick results: Auto cherry-pick pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=1027221&view=results |
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./LICENSES-AND-NOTICES/SPECS/data/licenses.json,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
Patch libxml2 for CVE-2025-7425
This is a mitigation patch. While the issue is underlying in libxslt (and the CVE assigned for it), a
mitigation can be implemented in src:libxml2.
Patch Backported: Yes
Adjusted patch according to our version.
in
valid.call the
attr->atypeinstances are replaced withXML_ATTR_GET_ATYPE(attr). Origin patch contains smaller number of these instances.Reference taken from Redhat fix: RedHat fix: libxml2-2.9.13-CVE-2025-7425.patch
Change Log
Does this affect the toolchain?
YES
Associated issues
Links to CVEs
Test Methodology