Skip to content

[High] Patch docker-buildx for CVE-2026-35469#17071

Open
akhila-guruju wants to merge 2 commits intomicrosoft:fasttrack/3.0from
Kanishk-Bansal:topic/docker-buildx/3.0/CVE-2026-35469
Open

[High] Patch docker-buildx for CVE-2026-35469#17071
akhila-guruju wants to merge 2 commits intomicrosoft:fasttrack/3.0from
Kanishk-Bansal:topic/docker-buildx/3.0/CVE-2026-35469

Conversation

@akhila-guruju
Copy link
Copy Markdown
Contributor

@akhila-guruju akhila-guruju commented May 7, 2026

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

Patch docker-buildx for CVE-2026-35469

Upgraded vendor github.com/moby/spdystream from v0.2.0 to v0.5.1
using go get github.com/moby/spdystream@v0.5.1

Upstream Patch reference: https://github.com/moby/spdystream/compare/v0.2.0...v0.5.1.patch
Fixed Version: https://github.com/moby/spdystream/releases/tag/v0.5.1

Change Log
  • modified: SPECS/docker-buildx/docker-buildx.spec
  • new: SPECS/docker-buildx/CVE-2026-35469.patch
Does this affect the toolchain?

NO

Associated issues
  • #xxxx
Links to CVEs
Test Methodology
  • Local Build
  • Patch Applies cleanly
image image

@microsoft-github-policy-service microsoft-github-policy-service Bot added Packaging fasttrack/3.0 PRs Destined for Azure Linux 3.0 labels May 7, 2026
@Kanishk-Bansal
Copy link
Copy Markdown
Contributor

/azurepipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

@akhila-guruju akhila-guruju marked this pull request as ready for review May 7, 2026 08:31
@akhila-guruju akhila-guruju requested a review from a team as a code owner May 7, 2026 08:31
@Kanishk-Bansal
Copy link
Copy Markdown
Contributor

/azurepipelines run

@azure-pipelines
Copy link
Copy Markdown

Azure Pipelines successfully started running 1 pipeline(s).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

fasttrack/3.0 PRs Destined for Azure Linux 3.0 Packaging security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants