Skip to content

Conversation

@akhila-guruju
Copy link
Contributor

@akhila-guruju akhila-guruju commented Jan 12, 2026

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

Patch libxml2 for CVE-2025-7425
This is a mitigation patch. While the issue is underlying in libxslt (and the CVE assigned for it), a
mitigation can be implemented in src:libxml2.

Patch Backported: Yes
Adjusted patch according to our version.
in valid.c
all the attr->atype instances are replaced with XML_ATTR_GET_ATYPE(attr). Origin patch contains smaller number of these instances.
Reference taken from Redhat fix: RedHat fix: libxml2-2.9.13-CVE-2025-7425.patch

Change Log
  • new file: SPECS/libxml2/CVE-2025-7425.patch
  • modified: SPECS/libxml2/libxml2.spec
  • modified: toolkit/resources/manifests/package/pkggen_core_aarch64.txt
  • modified: toolkit/resources/manifests/package/pkggen_core_x86_64.txt
  • modified: toolkit/resources/manifests/package/toolchain_aarch64.txt
  • modified: toolkit/resources/manifests/package/toolchain_x86_64.txt
Does this affect the toolchain?

YES

Associated issues
Links to CVEs
Test Methodology
  • Local Build
  • Patch applies cleanly
image

@microsoft-github-policy-service microsoft-github-policy-service bot added Packaging fasttrack/3.0 PRs Destined for Azure Linux 3.0 labels Jan 12, 2026
@akhila-guruju akhila-guruju marked this pull request as ready for review January 12, 2026 07:03
@akhila-guruju akhila-guruju requested a review from a team as a code owner January 12, 2026 07:03
@Kanishk-Bansal
Copy link
Contributor

Buddy Build

@akhila-guruju
Copy link
Contributor Author

Buddy Build has passed.

@Kanishk-Bansal
Copy link
Contributor

/azurepipelines run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

@akhila-guruju
Copy link
Contributor Author

Resolved Merge conflicts

@Kanishk-Bansal
Copy link
Contributor

/azurepipelines run

@azure-pipelines
Copy link

Azure Pipelines successfully started running 1 pipeline(s).

Copy link
Contributor

@Kanishk-Bansal Kanishk-Bansal left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Patch has been taken from https://git.rockylinux.org/staging/rpms/libxml2/-/blob/r9/SOURCES/libxml2-2.9.13-CVE-2025-7425.patch which applies cleanly.

%autosetup -n %{name}-v%{version} -p1 ensures patch application

  • Buddy Build 
  • patch applied during the build (check rpm.log)
  • patch include an upstream reference
  • PR has security tag

@Kanishk-Bansal Kanishk-Bansal added the CVEFixReadyForMaintainerReview When a CVE fix has been reviewed by release manager and is ready for stable maintainer review label Jan 15, 2026
@jslobodzian jslobodzian merged commit 2d6fee5 into microsoft:fasttrack/3.0 Jan 15, 2026
34 of 35 checks passed
CBL-Mariner-Bot pushed a commit that referenced this pull request Jan 15, 2026
@CBL-Mariner-Bot
Copy link
Collaborator

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

CVEFixReadyForMaintainerReview When a CVE fix has been reviewed by release manager and is ready for stable maintainer review fasttrack/3.0 PRs Destined for Azure Linux 3.0 Packaging security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants