Skip to content

Conversation

@konflux-internal-p02
Copy link

@konflux-internal-p02 konflux-internal-p02 bot commented Oct 16, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
audit-libs 4.0.3-1.el10 -> 4.0.3-4.el10
ca-certificates 2024.2.69_v8.0.303-102.3.el10 -> 2025.2.80_v9.0.305-102.el10_1
crypto-policies 20250214-1.gitfd9b9b9.el10_0.1 -> 20250905-2.gitc7eb7b2.el10_1
cyrus-sasl-lib 2.1.28-27.el10 -> 2.1.28-29.el10
dbus-broker 36-1.el10 -> 36-4.el10
device-mapper 10:1.02.202-6.el10 -> 10:1.02.206-3.el10
device-mapper-libs 10:1.02.202-6.el10 -> 10:1.02.206-3.el10
elfutils-debuginfod-client 0.192-6.el10_0 -> 0.193-1.el10
elfutils-default-yama-scope 0.192-6.el10_0 -> 0.193-1.el10
elfutils-libelf 0.192-6.el10_0 -> 0.193-1.el10
elfutils-libs 0.192-6.el10_0 -> 0.193-1.el10
expat 2.7.1-1.el10_0 -> 2.7.1-1.el10_1.3
filesystem 3.18-16.el10 -> 3.18-17.el10
glibc 2.39-46.el10_0 -> 2.39-58.el10_1.2
glibc-common 2.39-46.el10_0 -> 2.39-58.el10_1.2
glibc-gconv-extra 2.39-46.el10_0 -> 2.39-58.el10_1.2
glibc-minimal-langpack 2.39-46.el10_0 -> 2.39-58.el10_1.2
gmp 1:6.2.1-10.el10 -> 1:6.2.1-12.el10
kmod-libs 31-11.el10 -> 31-12.el10
libblkid 2.40.2-10.el10 -> 2.40.2-13.el10
libbpf 2:1.5.0-4.el10 -> 2:1.6.0-3.el10
libcom_err 1.47.1-3.el10 -> 1.47.1-4.el10
libcurl 8.9.1-5.el10 -> 8.12.1-2.el10
libfdisk 2.40.2-10.el10 -> 2.40.2-13.el10
libffi 3.4.4-9.el10 -> 3.4.4-10.el10
libgcc 14.2.1-7.el10 -> 14.3.1-2.1.el10
libmount 2.40.2-10.el10 -> 2.40.2-13.el10
libseccomp 2.5.3-10.el10 -> 2.5.6-1.el10
libselinux 3.8-2.el10_0 -> 3.9-1.el10
libsemanage 3.8.1-1.el10_0 -> 3.9-1.el10
libsepol 3.8-1.el10 -> 3.9-1.el10
libsmartcols 2.40.2-10.el10 -> 2.40.2-13.el10
libssh 0.11.1-1.el10 -> 0.11.1-4.el10_1
libssh-config 0.11.1-1.el10 -> 0.11.1-4.el10_1
libuuid 2.40.2-10.el10 -> 2.40.2-13.el10
openldap 2.6.8-3.el10 -> 2.6.9-1.el10
openssl-fips-provider 3.0.7-6.el10 -> 3.0.7-8.el10
openssl-fips-provider-so 3.0.7-6.el10 -> 3.0.7-8.el10
openssl-libs 1:3.2.2-16.el10_0.4 -> 1:3.5.1-4.el10_1
pam-libs 1.6.1-7.el10 -> 1.6.1-8.el10
redhat-release 10.0-30.el10 -> 10.1-17.el10
redhat-release-eula 10.0-30.el10 -> 10.1-17.el10
setup 2.14.5-4.el10 -> 2.14.5-7.el10
shadow-utils 2:4.15.0-5.el10 -> 2:4.15.0-8.el10
systemd 257-9.el10_0.1 -> 257-13.el10
systemd-libs 257-9.el10_0.1 -> 257-13.el10
systemd-pam 257-9.el10_0.1 -> 257-13.el10
tzdata 2025b-1.el10 -> 2025b-2.el10
util-linux-core 2.40.2-10.el10 -> 2.40.2-13.el10
zlib-ng-compat 2.2.3-1.el10 -> 2.2.3-2.el10
qatengine 1.7.0-1.el10 -> 1.9.0-1.el10
hwdata 0.379-10.4.el10 -> 0.379-10.6.el10
numactl-libs 2.0.19-1.el10 -> 2.0.19-2.el10
pciutils 3.13.0-5.el10 -> 3.13.0-6.el10
pciutils-libs 3.13.0-5.el10 -> 3.13.0-6.el10

expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing

CVE-2025-59375

More information

Details

A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.

Severity

Important

References


libssh: out-of-bounds read in sftp_handle()

CVE-2025-5318

More information

Details

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

Severity

Moderate

References


linux-pam: Linux-pam directory Traversal

CVE-2025-6020

More information

Details

A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.

Severity

Important

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-9.0/lock-file-maintenance-vulnerability branch 2 times, most recently from 1493e0d to 62a275b Compare November 4, 2025 12:06
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-9.0/lock-file-maintenance-vulnerability branch 5 times, most recently from fba5dde to 9ab0a1d Compare November 11, 2025 20:11
Signed-off-by: konflux-internal-p02 <170854209+konflux-internal-p02[bot]@users.noreply.github.com>
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-9.0/lock-file-maintenance-vulnerability branch from 9ab0a1d to 4c99b6d Compare November 13, 2025 12:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant