Refresh RPM lockfiles [SECURITY] #334
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
File tools/rpm-manifests/rpms.in.yaml:
2:1.12.2-1.el9_5
->2:1.14.0-1.el9
2:1.37.6-1.el9_5
->2:1.39.4-2.el9_6
2:1-96.el9_5
->2:1-117.el9_6
1.16.1-1.el9
->1.23.1-2.el9_6
2.43.5-2.el9_5
->2.47.3-1.el9_6
1.6-15.el9
->1.6-17.el9_6.2
2:1.12.2-1.el9
->2:1.14.1-1.el9_6
0^20240806.gee36266-6.el9_5
->0^20250217.ga1e48a0-10.el9_6
4:5.2.2-13.el9_5
->5:5.4.0-13.el9_6
3.11.9-7.el9_5.2
->3.11.11-2.el9_6.2
3.11.9-7.el9_5.2
->3.11.11-2.el9_6.2
65.5.1-3.el9
->65.5.1-4.el9_6
1.3.1-1.el9
->1.3.2-1.el9
2.1.0-22.el9
->2.1.0-25.el9
2.5.0-3.el9_5.1
->2.5.0-5.el9_6
5.3.28-54.el9
->5.3.28-57.el9_6
2.37.4-20.el9
->2.37.4-21.el9
3.9.0-1.el9
->3.11.0-1.el9
8.7p1-43.el9
->8.7p1-45.el9
8.7p1-43.el9
->8.7p1-45.el9
1.5.1-22.el9_5
->1.5.1-26.el9_6
2:4.9-10.el9_5
->2:4.9-12.el9
2.37.4-20.el9
->2.37.4-21.el9
2.37.4-20.el9
->2.37.4-21.el9
2.21-29.el9
->2.21-30.el9_6
Warning
Some dependencies could not be looked up. Check the warning logs for more information.
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
CVE-2025-22871
More information
Severity
Moderate
References
git: Git arbitrary code execution
CVE-2025-48384
More information
Severity
Important
References
gitk: Git file creation flaw
CVE-2025-27613
More information
Severity
Important
References
gitk: git script execution flaw
CVE-2025-27614
More information
Severity
Important
References
git: Newline confusion in credential helpers can lead to credential exfiltration in git
CVE-2024-52006
More information
Severity
Important
References
git: Git does not sanitize URLs when asking for credentials interactively
CVE-2024-50349
More information
Severity
Important
References
git: Git GUI can create and overwrite files for which the user has write permission
CVE-2025-46835
More information
Severity
Important
References
git: Git arbitrary file writes
CVE-2025-48385
More information
Severity
Important
References
jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)
CVE-2025-48060
More information
Severity
Moderate
References
jq: jq has signed integer overflow in jv.c:jvp_array_write
CVE-2024-23337
More information
Severity
Moderate
References
cpython: python: Extraction filter bypass for linking outside extraction directory
CVE-2025-4330
More information
Severity
Important
References
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
CVE-2024-12718
More information
Severity
Important
References
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
CVE-2025-4138
More information
Severity
Important
References
cpython: Tarfile extracts filtered members when errorlevel=0
CVE-2025-4435
More information
Severity
Important
References
cpython: Cpython infinite loop when parsing a tarfile
CVE-2025-8194
More information
Severity
Moderate
References
python: cpython: Arbitrary writes via tarfile realpath overflow
CVE-2025-4517
More information
Severity
Important
References
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
CVE-2025-47273
More information
Severity
Moderate
References
linux-pam: Linux-pam directory Traversal
CVE-2025-6020
More information
Severity
Important
References
linux-pam: Incomplete fix for CVE-2025-6020
CVE-2025-8941
More information
Severity
Important
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test
.This PR has been generated by MintMaker (powered by Renovate Bot).