[AutoPR- Security] Patch coredns for CVE-2026-26018, CVE-2026-26017 [HIGH]#16146
Conversation
|
Reason for Build failure: |
|
Buddy Build has passed. |
CVE Patch Review: PR #16146 — Patch coredns for CVE-2026-26018, CVE-2026-26017PR: #16146 CVE Summary
Both CVEs are fixed upstream in CoreDNS v1.14.2. The Azure Linux package is at v1.11.4, so backported patches are required. Spec File
Patch VerificationCVE-2026-26018 —
|
| Architecture | Build | Tests | Result |
|---|---|---|---|
| x86_64 (amd64) | PASSED | 746/746 tests passed (82 packages) | SUCCESS |
| aarch64 (arm64) | PASSED | 746/746 tests passed (81 packages) | SUCCESS |
Build Log Details (amd64)
- All 12 patches applied cleanly with
--fuzz=0(strict matching) - Go version: 1.24.13,
CGO_ENABLED=0 - No compilation errors or warnings
- No changelog warnings (dates valid, chronological order correct)
- RPM produced:
coredns-1.11.4-14.azl3.x86_64.rpm - Only cosmetic warning: hostname canonicalization in build container (expected)
Build Log Details (arm64)
- All 12 patches applied cleanly with
--fuzz=0 - Go version: 1.24.13,
CGO_ENABLED=0 - No compilation errors or warnings
- No changelog warnings
- RPM produced:
coredns-1.11.4-14.azl3.aarch64.rpm - Race detector enabled during tests — no data races detected
PR Description
- CVE summary provided
- Change log lists both CVEs
- NVD links provided for both CVEs
- Buddy build URL provided
- Autosec pipeline run linked
- Merge checklist completed
Findings and Observations
-
Minor cosmetic diff in CVE-2026-26017.patch: The comment change in
zplugin.go("Include all plugins"→"Include all the plugins") is not present in the upstream patch. This is a non-functional change and does not affect security or correctness, but ideally patches should match upstream exactly to minimize review burden. -
No signature file updates: The PR does not include changes to
*.signatures.json. This is typically auto-generated during the build process and may not require manual updates for patch files. -
Branch targeting is correct: Both CVEs are HIGH severity, and the PR targets
fasttrack/3.0which is appropriate for high-severity security fixes.
Verdict
LGTM — Both patches correctly backport the upstream security fixes. Build passed on both architectures with all 746 tests passing. Patches apply cleanly with zero fuzz.
|
/azurepipelines run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
Auto Patch coredns for CVE-2026-26018, CVE-2026-26017.
Autosec pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=1065637&view=results
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./LICENSES-AND-NOTICES/SPECS/data/licenses.json,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
What does the PR accomplish, why was it needed?
Change Log
Does this affect the toolchain?
YES/NO
Associated issues
Links to CVEs
Test Methodology