Skip to content

CVE Patch Review: cert-manager CVE-2025-11065 [MEDIUM]#15725

Closed
Copilot wants to merge 1 commit into3.0from
copilot/review-cve-patch-pr-15689
Closed

CVE Patch Review: cert-manager CVE-2025-11065 [MEDIUM]#15725
Copilot wants to merge 1 commit into3.0from
copilot/review-cve-patch-pr-15689

Conversation

Copy link
Contributor

Copilot AI commented Feb 4, 2026

Merge Checklist

All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)

  • The toolchain has been rebuilt successfully (or no changes were made to it)
  • The toolchain/worker package manifests are up-to-date
  • Any updated packages successfully build (or no packages were changed)
  • Packages depending on static components modified in this PR (Golang, *-static subpackages, etc.) have had their Release tag incremented.
  • Package tests (%check section) have been verified with RUN_CHECK=y for existing SPEC files, or added to new SPEC files
  • All package sources are available
  • cgmanifest files are up-to-date and sorted (./cgmanifest.json, ./toolkit/scripts/toolchain/cgmanifest.json, .github/workflows/cgmanifest.json)
  • LICENSE-MAP files are up-to-date (./LICENSES-AND-NOTICES/SPECS/data/licenses.json, ./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md, ./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)
  • All source files have up-to-date hashes in the *.signatures.json files
  • sudo make go-tidy-all and sudo make go-test-coverage pass
  • Documentation has been updated to match any changes to the build system
  • Ready to merge

Summary

Review of PR #15689 - CVE patch for cert-manager addressing error message leaks in vendored mapstructure library.

Review Findings:

Item Status
Patch entry (Patch20)
Release bump (25→26)
Changelog entry
Upstream reference
Backport correctness

Upstream patch has been backported manually. Vendor codebase lacks newer APIs (StringToURLHookFunc, StringToNetIPAddrHookFunc, etc.) present in upstream. Backport verified against upstream commit.

Change Log
  • Reviewed spec file changes: patch declaration, release bump, changelog
  • Verified patch against upstream commit
  • Confirmed backport is functionally equivalent to upstream fix
  • Reviewed build status
Does this affect the toolchain?

NO

Links to CVEs
Test Methodology

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • nvd.nist.gov
    • Triggering command: /home/REDACTED/work/_temp/ghcca-node/node/bin/node /home/REDACTED/work/_temp/ghcca-node/node/bin/node --enable-source-maps /home/REDACTED/work/_temp/copilot-developer-action-main/dist/index.js (dns block)

If you need me to access, download, or install something from one of these locations, you can either:


✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.

@microsoft-github-policy-service microsoft-github-policy-service bot added security 3.0 PRs Destined for 3.0 labels Feb 4, 2026
Copilot AI changed the title [WIP] Review CVE patch for security vulnerabilities in Azure Linux CVE Patch Review: cert-manager CVE-2025-11065 [MEDIUM] Feb 4, 2026
Copilot AI requested a review from Kanishk-Bansal February 4, 2026 15:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3.0 PRs Destined for 3.0 security

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants