Skip to content

[High] patch containerd2 for CVE-2026-35469#16830

Open
jykanase wants to merge 2 commits intomicrosoft:fasttrack/3.0from
Kanishk-Bansal:topic_containerd2-3.0-cve
Open

[High] patch containerd2 for CVE-2026-35469#16830
jykanase wants to merge 2 commits intomicrosoft:fasttrack/3.0from
Kanishk-Bansal:topic_containerd2-3.0-cve

Conversation

@jykanase
Copy link
Copy Markdown
Contributor

@jykanase jykanase commented Apr 23, 2026

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

patch containerd2 for CVE-2026-35469

Change Log
Does this affect the toolchain?

NO

Associated issues
  • #xxxx
Links to CVEs
Test Methodology
  • local build:
Screenshot 2026-04-23 150123

@jykanase jykanase requested a review from a team as a code owner April 23, 2026 09:35
@microsoft-github-policy-service microsoft-github-policy-service Bot added Packaging fasttrack/3.0 PRs Destined for Azure Linux 3.0 labels Apr 23, 2026
@jykanase jykanase changed the title patch containerd2 for CVE-2026-35469 [High] patch containerd2 for CVE-2026-35469 Apr 23, 2026
@Kanishk-Bansal
Copy link
Copy Markdown
Contributor

/azurepipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@Kanishk-Bansal Kanishk-Bansal added security CVEFixReadyForMaintainerReview When a CVE fix has been reviewed by release manager and is ready for stable maintainer review labels Apr 23, 2026
Copy link
Copy Markdown
Contributor

@Kanishk-Bansal Kanishk-Bansal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Patch was lost in the last upgrade we need this fix

Comment thread SPECS/containerd2/containerd2.spec Outdated

%changelog
* Thu Apr 24 2026 Jyoti Kanase <v-jykanase@microsoft.com> - 2.1.6-2
- Modified patch for CVE-2025-64329
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jykanase why does the changelog cve number not match the CVE and patch. What does "Modified patch" mean?

@jykanase jykanase force-pushed the topic_containerd2-3.0-cve branch from b1ec8da to 654b1c1 Compare April 24, 2026 03:41
@acortelyou
Copy link
Copy Markdown
Member

curious why 2.1.6 was merged instead of 2.1.7 which already had this patch

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CVEFixReadyForMaintainerReview When a CVE fix has been reviewed by release manager and is ready for stable maintainer review fasttrack/3.0 PRs Destined for Azure Linux 3.0 Packaging security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants