Skip to content

Commit 0772b19

Browse files
authored
[MEDIUM] Patch cri-tools for CVE-2025-22872 (#13869)
1 parent c0f440a commit 0772b19

2 files changed

Lines changed: 47 additions & 1 deletion

File tree

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
From 961dbc9f2f6de5c24c53d76248218a4c4a0dd771 Mon Sep 17 00:00:00 2001
2+
From: Aninda <v-anipradhan@microsoft.com>
3+
Date: Wed, 21 May 2025 23:19:37 -0400
4+
Subject: [PATCH] Address CVE-2025-22872
5+
Upstream Patch Reference: https://github.com/golang/net/commit/e1fcd82abba34df74614020343be8eb1fe85f0d9
6+
7+
---
8+
vendor/golang.org/x/net/html/token.go | 18 ++++++++++++++++--
9+
1 file changed, 16 insertions(+), 2 deletions(-)
10+
11+
diff --git a/vendor/golang.org/x/net/html/token.go b/vendor/golang.org/x/net/html/token.go
12+
index de67f93..9bbdf7d 100644
13+
--- a/vendor/golang.org/x/net/html/token.go
14+
+++ b/vendor/golang.org/x/net/html/token.go
15+
@@ -839,8 +839,22 @@ func (z *Tokenizer) readStartTag() TokenType {
16+
if raw {
17+
z.rawTag = strings.ToLower(string(z.buf[z.data.start:z.data.end]))
18+
}
19+
- // Look for a self-closing token like "<br/>".
20+
- if z.err == nil && z.buf[z.raw.end-2] == '/' {
21+
+ // Look for a self-closing token (e.g. <br/>).
22+
+ //
23+
+ // Originally, we did this by just checking that the last character of the
24+
+ // tag (ignoring the closing bracket) was a solidus (/) character, but this
25+
+ // is not always accurate.
26+
+ //
27+
+ // We need to be careful that we don't misinterpret a non-self-closing tag
28+
+ // as self-closing, as can happen if the tag contains unquoted attribute
29+
+ // values (i.e. <p a=/>).
30+
+ //
31+
+ // To avoid this, we check that the last non-bracket character of the tag
32+
+ // (z.raw.end-2) isn't the same character as the last non-quote character of
33+
+ // the last attribute of the tag (z.pendingAttr[1].end-1), if the tag has
34+
+ // attributes.
35+
+ nAttrs := len(z.attr)
36+
+ if z.err == nil && z.buf[z.raw.end-2] == '/' && (nAttrs == 0 || z.raw.end-2 != z.attr[nAttrs-1][1].end-1) {
37+
return SelfClosingTagToken
38+
}
39+
return StartTagToken
40+
--
41+
2.34.1
42+

SPECS/cri-tools/cri-tools.spec

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
Summary: CRI tools
88
Name: cri-tools
99
Version: 1.29.0
10-
Release: 6%{?dist}
10+
Release: 7%{?dist}
1111
License: Apache-2.0
1212
Vendor: Microsoft Corporation
1313
Distribution: Mariner
@@ -18,6 +18,7 @@ Patch0: CVE-2024-21626.patch
1818
Patch1: CVE-2023-45288.patch
1919
Patch2: CVE-2024-24786.patch
2020
Patch3: CVE-2024-45338.patch
21+
Patch4: CVE-2025-22872.patch
2122
BuildRequires: glib-devel
2223
BuildRequires: glibc-devel
2324
BuildRequires: golang
@@ -48,6 +49,9 @@ install -p -m 755 -t %{buildroot}%{_bindir} "${BUILD_FOLDER}/critest"
4849
%{_bindir}/critest
4950

5051
%changelog
52+
* Thu May 22 2025 Aninda Pradhan <v-anipradhan@microsoft.com> - 1.29.0-7
53+
- Patch CVE-2025-22872
54+
5155
* Mon Jan 06 2025 Sumedh Sharma <sumsharma@microsoft.com> - 1.29.0-6
5256
- Add patch for CVE-2024-45338
5357

0 commit comments

Comments
 (0)