Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
34 changes: 34 additions & 0 deletions SPECS/kata-containers-cc/CVE-2025-58354.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
From 9bc2db68d3a6267841c27258fc8463cfa6433b78 Mon Sep 17 00:00:00 2001
From: AllSpark <[email protected]>
Date: Mon, 29 Sep 2025 07:03:16 +0000
Subject: [PATCH] initramfs: Enforce --panic-on-corruption for veritysetup
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Let's enforce an error on veritysetup in case there's any tampering with
the rootfs.

Signed-off-by: Fabiano Fidêncio <[email protected]>
Signed-off-by: Azure Linux Security Servicing Account <[email protected]>
Upstream-reference: AI Backport of https://github.com/kata-containers/kata-containers/commit/3e67f92e34be974e792c153add76e4e4baac9de0.patch
---
tools/packaging/static-build/initramfs/init.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tools/packaging/static-build/initramfs/init.sh b/tools/packaging/static-build/initramfs/init.sh
index 4b224280b7..3dca85dd7b 100755
--- a/tools/packaging/static-build/initramfs/init.sh
+++ b/tools/packaging/static-build/initramfs/init.sh
@@ -32,7 +32,7 @@ hash_device=${root_device%?}2

if [ -e ${root_device} ] && [ -e ${hash_device} ] && [ "${rootfs_verifier}" = "dm-verity" ]
then
- veritysetup open "${root_device}" root "${hash_device}" "${rootfs_hash}"
+ veritysetup open --panic-on-corruption "${root_device}" root "${hash_device}" "${rootfs_hash}"
mount /dev/mapper/root /mnt
else
echo "No LUKS device found"
--
2.45.4

6 changes: 5 additions & 1 deletion SPECS/kata-containers-cc/kata-containers-cc.spec
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@

Name: kata-containers-cc
Version: 3.2.0.azl2
Release: 8%{?dist}
Release: 9%{?dist}
Summary: Kata Confidential Containers package developed for Confidential Containers on AKS
License: ASL 2.0
Vendor: Microsoft Corporation
Expand All @@ -27,6 +27,7 @@ Patch2: CVE-2024-24786.patch
Patch3: CVE-2023-44487.patch
Patch4: CVE-2024-43806.patch
Patch5: CVE-2025-5791.patch
Patch6: CVE-2025-58354.patch

ExclusiveArch: x86_64

Expand Down Expand Up @@ -295,6 +296,9 @@ install -D -m 0755 %{_builddir}/%{name}-%{version}/tools/osbuilder/image-builder
%exclude %{osbuilder}/tools/osbuilder/rootfs-builder/ubuntu

%changelog
* Mon Sep 29 2025 Azure Linux Security Servicing Account <[email protected]> - 3.2.0.azl2-9
- Patch for CVE-2025-58354

* Thu Sep 04 2025 Akhila Guruju <[email protected]> - 3.2.0.azl2-8
- Bump release to rebuild with golang

Expand Down
Loading