Skip to content

Update CVE patches to fix CVE issues#661

Merged
andy-vm merged 1 commit intoopen-edge-platform:3.0-devfrom
polmoorx:upgrade_go_to_fix_CVE
Jan 22, 2026
Merged

Update CVE patches to fix CVE issues#661
andy-vm merged 1 commit intoopen-edge-platform:3.0-devfrom
polmoorx:upgrade_go_to_fix_CVE

Conversation

@polmoorx
Copy link
Copy Markdown
Contributor

@polmoorx polmoorx commented Jan 6, 2026

Merge Checklist

All boxes should be checked before merging the PR

  • The changes in the PR have been built and tested
  • cgmanifest file has been updated if required
  • Ready to merge

Description

Any Newly Introduced Dependencies

NO

How Has This Been Tested?

Manually tested.

@polmoorx polmoorx force-pushed the upgrade_go_to_fix_CVE branch from aa721ee to 8c6dd71 Compare January 7, 2026 07:33
@polmoorx polmoorx marked this pull request as ready for review January 7, 2026 09:33
@polmoorx polmoorx requested a review from a team as a code owner January 7, 2026 09:33
Comment thread SPECS/caddy/caddy.spec Outdated
Comment thread SPECS/rpc/rpc.spec Outdated
Comment thread SPECS/caddy/caddy.spec Outdated
Comment thread SPECS/rpc/rpc.spec Outdated
@polmoorx polmoorx force-pushed the upgrade_go_to_fix_CVE branch 2 times, most recently from b65a6d2 to cc62f82 Compare January 8, 2026 09:30
@andy-vm
Copy link
Copy Markdown
Contributor

andy-vm commented Jan 9, 2026

upgrading from 1.25.1 to 1.25.5 is fine, if there is cve reported

no need to change go version in caddy and rpc go and enable cgo

@polmoorx polmoorx force-pushed the upgrade_go_to_fix_CVE branch from cc62f82 to d1d168d Compare January 14, 2026 17:59
@polmoorx polmoorx changed the title Update Go version to fix CVE issues Update CVE patches to fix CVE issues Jan 14, 2026
@polmoorx
Copy link
Copy Markdown
Contributor Author

upgrading from 1.25.1 to 1.25.5 is fine, if there is cve reported

no need to change go version in caddy and rpc go and enable cgo

Thank you for the review. I have reverted the changes.

@andy-vm
Copy link
Copy Markdown
Contributor

andy-vm commented Jan 15, 2026

LGTM
please also share test result, log or screenshot

@polmoorx
Copy link
Copy Markdown
Contributor Author

polmoorx commented Jan 15, 2026

LGTM please also share test result, log or screenshot

Hi @andy-vm,

Thank you for review.

CVE resolved snap from bdba:
image

For Jenkins Build please see On Demand Developer Build#1526.

@aaroncyew
Copy link
Copy Markdown
Member

aaroncyew commented Jan 16, 2026

@andy-vm @liulis-sg @polmoorx
the CVE patch is looking for this golang code vendor/github.com/google/certificate-transparency-go/x509/verify.go

kindly revisit the changes

@andy-vm
Copy link
Copy Markdown
Contributor

andy-vm commented Jan 19, 2026

@polmoorx please double check the CVE test result and share CVE scan url

@polmoorx
Copy link
Copy Markdown
Contributor Author

@andy-vm @liulis-sg @polmoorx the CVE patch is looking for this golang code vendor/github.com/google/certificate-transparency-go/x509/verify.go

kindly revisit the changes

@aaroncyew,

As discussed, we rebuilt the spec locally and did not observe any issues with the current patch.

@open-edge-platform open-edge-platform deleted a comment from polmoorx Jan 20, 2026
@polmoorx polmoorx force-pushed the upgrade_go_to_fix_CVE branch from d1d168d to d3a804e Compare January 20, 2026 03:50
@aaroncyew aaroncyew self-requested a review January 20, 2026 11:35
aaroncyew
aaroncyew previously approved these changes Jan 20, 2026
Copy link
Copy Markdown
Member

@aaroncyew aaroncyew left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1, CVE patch and srpm build has been reviewed.

srpm build logs is attached to JIRA ticket for this fix.

@polmoorx polmoorx force-pushed the upgrade_go_to_fix_CVE branch from d3a804e to 29186ca Compare January 20, 2026 12:37
- Include fix for CVE-2025-61727 and CVE-2025-61729.

- Updated caddy.spec file to update release,
  bump version, and add changelog entries.

Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>
Copy link
Copy Markdown
Contributor

@andy-vm andy-vm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@andy-vm andy-vm merged commit 9169fda into open-edge-platform:3.0-dev Jan 22, 2026
14 of 17 checks passed
cheeyanglee pushed a commit to cheeyanglee/edge-microvisor-toolkit that referenced this pull request Jan 23, 2026
- Include fix for CVE-2025-61727 and CVE-2025-61729.

- Updated caddy.spec file to update release,
  bump version, and add changelog entries.

Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>
cheeyanglee added a commit that referenced this pull request Jan 23, 2026
* ip4save config change (#620)

* Update full.json

Added ip4save changes for iso

* Create configure-ip4save.sh

Post installation script for iso to allow type 8 incoming ping

* Separated post installation paths in full.json

* Fixed file permission for configure-ip4save.sh

* Fixed indentation for full.json

---------

Co-authored-by: andy-vm <108446482+andy-vm@users.noreply.github.com>
Co-authored-by: Mohamad Noor Alim Hussin <mohamad.noor.alim.hussin@intel.com>

* Upgrade otelcol-contrib version to fix CVE. (#623)

- Upgrade version to 0.141.0.
 - Remove CVE-2025-22872.patch since changes are part of latest version.
 - Fixes CVE-2025-47913, CVE-2025-47914 and CVE-2025-58181.

Signed-off-by: Unniche, BasavarajX <basavarajx.unniche@intel.com>
Co-authored-by: andy-vm <108446482+andy-vm@users.noreply.github.com>

* Upgrade the RPC version from 2.45.1 to 2.48.9 (#619)

- Upgraded the RPC from 2.45.1 to 2.48.9 to resolve the
  CVE-2025-47914, CVE-2025-58181 and CVE-2025-47913.

- Update the rpc.spec file with release, dump version and changelog entry.

Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>

* restore caddy (#642)

* restore caddy

* restore caddy

---------

Co-authored-by: andy.peng <andypeng@pglgull002.png.intel.com>
Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>

* CVE Fix for x-crypto component in caddy (#672)

- Applied suggested patch from NVD database for
 - CVE-2025-58181.

Signed-off-by: Unniche, BasavarajX <basavarajx.unniche@intel.com>
Co-authored-by: andy-vm <108446482+andy-vm@users.noreply.github.com>

* Removed go-rpm-macros dependency in caddy.spec (#689)

* Update CVE patches to fix CVE issues (#661)

- Include fix for CVE-2025-61727 and CVE-2025-61729.

- Updated caddy.spec file to update release,
  bump version, and add changelog entries.

Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>

---------

Signed-off-by: Unniche, BasavarajX <basavarajx.unniche@intel.com>
Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>
Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Co-authored-by: chrngc <149708414+chrngc@users.noreply.github.com>
Co-authored-by: andy-vm <108446482+andy-vm@users.noreply.github.com>
Co-authored-by: Mohamad Noor Alim Hussin <mohamad.noor.alim.hussin@intel.com>
Co-authored-by: bunnichx <101382885+bunnichx@users.noreply.github.com>
Co-authored-by: POLMOOR SHIVA KUMAR <polmoorx.shiva.kumar@intel.com>
Co-authored-by: andy.peng <andypeng@pglgull002.png.intel.com>
ssinghax pushed a commit to ssinghax/edge-microvisor-toolkit that referenced this pull request Feb 6, 2026
* Add triage for x-crypto component of caddy package. (open-edge-platform#116)

- ported the patch and PR open-edge-platform#672 is created in EMT open-edge
- repo. Hence, marking CVE-2025-58181 as patched.

Signed-off-by: Unniche, BasavarajX <basavarajx.unniche@intel.com>
Reviewed-by: Aaron Chan <aaron.chun.yew.chan@intel.com>

* override device-management-toolkit-rpc-go for rpc (open-edge-platform#113)

- Override device-management-toolkit-rpc-go version to v2.48.9

Signed-off-by: RajeshX Shanmugam <rajesh1x.shanmugam@intel.com>
Reviewed-by: Aaron Chan <aaron.chun.yew.chan@intel.com>

* Upgrade version for qemu (open-edge-platform#114)

- Add qemu version 9.1.0 to 10.0.4
- Remove triage CVEs, no longer required.

Signed-off-by: RajeshX Shanmugam <rajesh1x.shanmugam@intel.com>
Reviewed-by: Aaron Chan <aaron.chun.yew.chan@intel.com>

* Add triage for golang-runtime component of caddy. (open-edge-platform#119)

- ported the patch and PR open-edge-platform#661 is created in EMT
- marked CVE-2025-61727 and CVE-2025-61729 as patched.

Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>
Reviewed-by: Aaron Chan <aaron.chun.yew.chan@intel.com>

* gstreamer1 version v1.26.5 on next branch

Signed-off-by: Aaron Chan <aaron.chun.yew.chan@intel.com>

---------

Signed-off-by: Unniche, BasavarajX <basavarajx.unniche@intel.com>
Signed-off-by: RajeshX Shanmugam <rajesh1x.shanmugam@intel.com>
Signed-off-by: Polmoorx Shiva Kumar <polmoorx.shiva.kumar@intel.com>
Signed-off-by: Aaron Chan <aaron.chun.yew.chan@intel.com>
Co-authored-by: bunnichx <101382885+bunnichx@users.noreply.github.com>
Co-authored-by: Rajesh Shanmugam <rajesh1x.shanmugam@intel.com>
Co-authored-by: POLMOOR SHIVA KUMAR <polmoorx.shiva.kumar@intel.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants