Skip to content

Bump Microsoft.Build* from 17.11.4 to 17.14.28 (security)#1618

Merged
dsyme merged 3 commits intomainfrom
copilot/update-microsoft-build-packages
Feb 22, 2026
Merged

Bump Microsoft.Build* from 17.11.4 to 17.14.28 (security)#1618
dsyme merged 3 commits intomainfrom
copilot/update-microsoft-build-packages

Conversation

Copy link
Contributor

Copilot AI commented Feb 22, 2026

Microsoft.Build, Microsoft.Build.Framework, Microsoft.Build.Tasks.Core, and Microsoft.Build.Utilities.Core at 17.11.4 have two known high-severity CVEs: a DoS (GHSA-w3q9-fxm7-j8fq) and a spoofing vulnerability (GHSA-h4j7-5rxr-p4wc). These packages are only consumed by the FAKE build toolchain, not the library itself.

Changes

  • paket.dependencies — bumps all four Microsoft.Build* packages in the Fake group from 17.11.417.14.28
  • paket.lock — regenerated via dotnet paket update --group Fake to resolve the new transitive dependency graph
Original prompt

This section details on the original issue you should resolve

<issue_title>[Repo Assist] Microsoft.Build 17.11.4 has known high-severity security vulnerabilities — needs update</issue_title>
<issue_description>🤖 This is an automated issue from Repo Assist.

The Microsoft.Build, Microsoft.Build.Framework, Microsoft.Build.Tasks.Core, and Microsoft.Build.Utilities.Core packages pinned at 17.11.4 in the Fake group of paket.dependencies have known high-severity vulnerabilities:

These packages are only used by the FAKE build toolchain (build/build.fsproj), so the production library itself is not affected at runtime. However the build environment is exposed.

Recommended Fix

Update to Microsoft.Build 17.14.28 (latest 17.x). Note that 17.14.x targets .NETFramework rather than net8.0 on NuGet, so compatibility with FAKE on .NET 8 should be tested. Alternatively, consider whether FAKE 6.1.4 supports Microsoft.Build 17.14.x.

These packages were intentionally skipped in the recent dependency bump PR to allow maintainers to review the upgrade path.

Generated by Repo Assist

To install this workflow, run gh aw add githubnext/agentics/workflows/repo-assist.md@0d6e8cf9db90470cd5477c6a40b350fd9f9e1422. View source at https://github.com/githubnext/agentics/tree/0d6e8cf9db90470cd5477c6a40b350fd9f9e1422/workflows/repo-assist.md.

[!WARNING]

⚠️ Firewall blocked 3 domains

The following domains were blocked by the firewall during workflow execution:

  • schemas.microsoft.com
  • tomasp.net
  • www.google.com

Comments on the Issue (you are @copilot in this section)


💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.

…ity vulnerabilities

Co-authored-by: dsyme <7204669+dsyme@users.noreply.github.com>
Copilot AI changed the title [WIP] Update Microsoft.Build packages to resolve security vulnerabilities Bump Microsoft.Build* from 17.11.4 to 17.14.28 (security) Feb 22, 2026
@dsyme dsyme marked this pull request as ready for review February 22, 2026 19:10
@dsyme dsyme merged commit a662d72 into main Feb 22, 2026
2 checks passed
@dsyme dsyme deleted the copilot/update-microsoft-build-packages branch February 22, 2026 19:33
github-actions bot added a commit that referenced this pull request Feb 23, 2026
Add entries for:
- #1613: CSS pseudo-class NotSupportedException fix (#1383)
- #1617: ConvertDateTimeOffset xs:dateTime fallback fix (#1437)
- #1618: Microsoft.Build security bump
- #1619: XmlProvider EmbeddedResource GetSchema fix (#1310)
- #1621: StrictBooleans parameter for CsvProvider
- #1625: CsvProvider.InferRows multiline quoted field fix (#1439)
- #1626: XSD group reference cycle guard (#1419)

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Repo Assist] Microsoft.Build 17.11.4 has known high-severity security vulnerabilities — needs update

2 participants