55Name: cloud-hypervisor-cvm
66Summary: Cloud Hypervisor CVM is an open source Virtual Machine Monitor (VMM) that enables running SEV SNP enabled VMs on top of MSHV using the IGVM file format as payload.
77Version: 38.0.72.2
8- Release: 2 %{?dist }
8+ Release: 3 %{?dist }
99License: ASL 2.0 OR BSD-3-clause
1010Vendor: Microsoft Corporation
1111Distribution: Mariner
@@ -15,15 +15,23 @@ Source0: https://github.com/microsoft/cloud-hypervisor/archive/refs/tags/
1515%if 0%{?using_vendored_crates }
1616# Note: the %%{name}-%%{version}-cargo.tar.gz file contains a cache created by capturing the contents downloaded into $CARGO_HOME.
1717# To update the cache and config.toml run:
18- # tar -xf %{name}-%{version}.tar.gz
19- # cd %{name}-%{version}
18+ # tar -xf %%{name}-%%{version}.tar.gz
19+ # cd %%{name}-%%{version}
20+ # patch -u -p0 < ../upgrade-openssl-to-3.3.2-to-address-CVE-2024-6119.patch
2021# cargo vendor > config.toml
21- # tar -czf %{name}-%{version}-cargo.tar.gz vendor/
22- # rename the tarball to %{name}-%{version}-cargo.tar.gz when updating version
23- Source1: %{name }-%{version }-cargo.tar.gz
22+ # tar -czf %%{name}-%%{version}-cargo.tar.gz vendor/
23+ # rename the tarball to %%{name}-%%{version}-2-cargo.tar.gz when updating version
24+ # (feel free to drop -2 and this comment on version change)
25+ Source1: %{name }-%{version }-2-cargo.tar.gz
2426Source2: config.toml
2527%endif
26- Patch0: 0001-hypervisor-mshv-Fix-panic-when-rejecting-extended-gu.patch
28+ # Generated using:
29+ # tar -xf %%{name}-%%{version}.tar.gz
30+ # cd %%{name}-%%{version}
31+ # cargo update -p openssl-src --precise 300.3.2+3.3.2
32+ # diff -u ../cloud-hypervisor-msft-v38.0.72.2.backup/Cargo.lock Cargo.lock > ../upgrade-openssl-to-3.3.2-to-address-CVE-2024-6119.patch
33+ Patch0: upgrade-openssl-to-3.3.2-to-address-CVE-2024-6119.patch
34+ Patch1: 0001-hypervisor-mshv-Fix-panic-when-rejecting-extended-gu.patch
2735
2836Conflicts: cloud-hypervisor
2937
@@ -72,12 +80,15 @@ Cloud Hypervisor is an open source Virtual Machine Monitor (VMM) that runs on to
7280
7381%prep
7482
75- %autosetup -p1 -n cloud-hypervisor-msft-v%{version }
83+ %setup -q -n cloud-hypervisor-msft-v%{version }
7684%if 0%{?using_vendored_crates }
7785tar xf %{SOURCE1 }
7886mkdir -p .cargo
7987cp %{SOURCE2 } .cargo/
8088%endif
89+ # The vendored archive has been populated based on the patch, so we need to
90+ # repatch here as well in order to use the same versions
91+ %autopatch -p1
8192
8293%install
8394install -d %{buildroot }%{_bindir }
@@ -139,9 +150,12 @@ cargo build --release --target=%{rust_musl_target} %{cargo_pkg_feature_opts} %{c
139150%license LICENSE-BSD-3-Clause
140151
141152%changelog
142- * Fri Aug 23 2024 Manuel Huber <mahuber@microsoft.com> - 38.0.72.2-2
153+ * Mon Sep 23 2024 Manuel Huber <mahuber@microsoft.com> - 38.0.72.2-3
143154- Add upstream patch to prevent crash
144155
156+ * Tue Sep 17 2024 Jiri Appl <jiria@microsoft.com> - 38.0.72.2-2
157+ - Patch openssl in the vendored archive to 3.3.2 to address CVE-2024-6119
158+
145159* Thu Jul 04 2024 Archana Choudhary <archana1@microsoft.com> - 38.0.72.2-1
146160- Upgrade to v38.0.72.2
147161- Fixes CVE-2023-45853, CVE-2018-25032, CVE-2023-5363, CVE-2023-5678, CVE-2023-6129, CVE-2023-6237, CVE-2024-0727, CVE-2024-4603
0 commit comments