Skip to content

[High] patch containerd2 for CVE-2026-35469, CVE-2026-34986#16830

Merged
jslobodzian merged 3 commits intomicrosoft:fasttrack/3.0from
Kanishk-Bansal:topic_containerd2-3.0-cve
Apr 27, 2026
Merged

[High] patch containerd2 for CVE-2026-35469, CVE-2026-34986#16830
jslobodzian merged 3 commits intomicrosoft:fasttrack/3.0from
Kanishk-Bansal:topic_containerd2-3.0-cve

Conversation

@jykanase
Copy link
Copy Markdown
Contributor

@jykanase jykanase commented Apr 23, 2026

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

patch containerd2 for CVE-2026-35469, CVE-2026-34986

Change Log
Does this affect the toolchain?

NO

Associated issues
  • #xxxx
Links to CVEs
Test Methodology
  • local build:
Screenshot 2026-04-23 150123

@jykanase jykanase requested a review from a team as a code owner April 23, 2026 09:35
@microsoft-github-policy-service microsoft-github-policy-service Bot added Packaging fasttrack/3.0 PRs Destined for Azure Linux 3.0 labels Apr 23, 2026
@jykanase jykanase changed the title patch containerd2 for CVE-2026-35469 [High] patch containerd2 for CVE-2026-35469 Apr 23, 2026
@Kanishk-Bansal
Copy link
Copy Markdown
Contributor

/azurepipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@Kanishk-Bansal Kanishk-Bansal added security CVEFixReadyForMaintainerReview When a CVE fix has been reviewed by release manager and is ready for stable maintainer review labels Apr 23, 2026
Copy link
Copy Markdown
Contributor

@Kanishk-Bansal Kanishk-Bansal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Patch was lost in the last upgrade we need this fix

Comment thread SPECS/containerd2/containerd2.spec Outdated

%changelog
* Thu Apr 24 2026 Jyoti Kanase <v-jykanase@microsoft.com> - 2.1.6-2
- Modified patch for CVE-2025-64329
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jykanase why does the changelog cve number not match the CVE and patch. What does "Modified patch" mean?

@jykanase jykanase force-pushed the topic_containerd2-3.0-cve branch from b1ec8da to 654b1c1 Compare April 24, 2026 03:41
@acortelyou
Copy link
Copy Markdown
Member

curious why 2.1.6 was merged instead of 2.1.7 which already had this patch

@Kanishk-Bansal Kanishk-Bansal force-pushed the topic_containerd2-3.0-cve branch from 348243f to 26eafde Compare April 26, 2026 05:30
jykanase and others added 3 commits April 26, 2026 05:31
Signed-off-by: Kanishk Bansal <kanbansal@microsoft.com>
@Kanishk-Bansal Kanishk-Bansal force-pushed the topic_containerd2-3.0-cve branch from 26eafde to 2197cfc Compare April 26, 2026 05:31
@Kanishk-Bansal Kanishk-Bansal self-requested a review April 26, 2026 05:46
@Kanishk-Bansal
Copy link
Copy Markdown
Contributor

/azurepipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@Kanishk-Bansal Kanishk-Bansal changed the title [High] patch containerd2 for CVE-2026-35469 [High] patch containerd2 for CVE-2026-35469, CVE-2026-34986 Apr 26, 2026
.../github.com/moby/spdystream/spdy/PATENTS | 22 +++++
.../moby/spdystream/spdy/dictionary.go | 16 ----
.../moby/spdystream/spdy/options.go | 25 ++++++
.../moby/spdystream/spdy/options_test.go | 33 ++++++++
Copy link
Copy Markdown
Contributor

@aadhar-agarwal aadhar-agarwal Apr 27, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nitpick (non-blocking): Drop options_test.go from the patch

The patch creates vendor/.../spdy/options_test.go, but go mod vendor excludes test files from the vendor directory. Confirmed this file is not present in containerd's upstream vendor tree either. Harmless, but can we drop it from this patch?

@aadhar-agarwal
Copy link
Copy Markdown
Contributor

curious why 2.1.6 was merged instead of 2.1.7 which already had this patch

2.1.7 introduced AppArmor profile changes that add abi/3.0 - this requires the apparmor-abstractions package, which isn't installed in AgentBaker. All AKS clusters were failing to deploy with Could not open 'abi/3.0': No such file or directory. We stayed on 2.1.6 and backported the CVE fixes to avoid that breakage while the AppArmor dependency is resolved. There is a patch for this in containerd that we can carry forward

@jslobodzian jslobodzian merged commit 2cdc7d3 into microsoft:fasttrack/3.0 Apr 27, 2026
30 checks passed
@CBL-Mariner-Bot
Copy link
Copy Markdown
Collaborator

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CVEFixReadyForMaintainerReview When a CVE fix has been reviewed by release manager and is ready for stable maintainer review fasttrack/3.0 PRs Destined for Azure Linux 3.0 Packaging security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants