Skip to content

Conversation

@konflux-internal-p02
Copy link

@konflux-internal-p02 konflux-internal-p02 bot commented Oct 17, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
keepalived 2.2.8-4.el9_5 -> 2.2.8-6.el9
perl-Net-SSLeay 1.94-1.el9 -> 1.94-3.el9
audit-libs 3.1.5-4.el9 -> 3.1.5-7.el9
ca-certificates 2024.2.69_v8.0.303-91.4.el9_4 -> 2025.2.80_v9.0.305-91.el9
crypto-policies 20250128-1.git5269e22.el9 -> 20250905-1.git377cc42.el9_7
curl-minimal 7.76.1-31.el9_6.1 -> 7.76.1-34.el9
cyrus-sasl-lib 2.1.27-21.el9 -> 2.1.27-22.el9
elfutils-libelf 0.192-6.el9_6 -> 0.193-1.el9
expat 2.5.0-5.el9_6 -> 2.5.0-5.el9_7.1
glibc 2.34-168.el9_6.23 -> 2.34-231.el9_7.2
glibc-common 2.34-168.el9_6.23 -> 2.34-231.el9_7.2
glibc-gconv-extra 2.34-168.el9_6.23 -> 2.34-231.el9_7.2
glibc-minimal-langpack 2.34-168.el9_6.23 -> 2.34-231.el9_7.2
iproute 6.11.0-1.el9 -> 6.14.0-2.el9
kmod-libs 28-10.el9 -> 28-11.el9
libbpf 2:1.5.0-1.el9 -> 2:1.5.0-2.el9
libcap 2.48-9.el9_2 -> 2.48-10.el9
libcom_err 1.46.5-7.el9 -> 1.46.5-8.el9
libcurl 7.76.1-31.el9_6.1 -> 7.76.1-34.el9
libgcc 11.5.0-5.el9_5 -> 11.5.0-11.el9
libsepol 3.6-2.el9 -> 3.6-3.el9
libssh 0.10.4-13.el9 -> 0.10.4-15.el9_7
libssh-config 0.10.4-13.el9 -> 0.10.4-15.el9_7
libstdc++ 11.5.0-5.el9_5 -> 11.5.0-11.el9
libxml2 2.9.13-12.el9_6 -> 2.9.13-14.el9_7
ncurses 6.2-10.20210508.el9_6.2 -> 6.2-12.20210508.el9
ncurses-base 6.2-10.20210508.el9_6.2 -> 6.2-12.20210508.el9
ncurses-libs 6.2-10.20210508.el9_6.2 -> 6.2-12.20210508.el9
openssl 1:3.2.2-6.el9_5.1 -> 1:3.5.1-4.el9_7
openssl-fips-provider 3.0.7-6.el9_5 -> 3.0.7-8.el9
openssl-fips-provider-so 3.0.7-6.el9_5 -> 3.0.7-8.el9
openssl-libs 1:3.2.2-6.el9_5.1 -> 1:3.5.1-4.el9_7
redhat-release 9.6-0.1.el9 -> 9.7-0.7.el9
redhat-release-eula 9.6-0.1.el9 -> 9.7-0.7.el9
rpm 4.16.1.3-37.el9 -> 4.16.1.3-39.el9
rpm-libs 4.16.1.3-37.el9 -> 4.16.1.3-39.el9
shadow-utils 2:4.9-12.el9 -> 2:4.9-15.el9
sqlite-libs 3.34.1-8.el9_6 -> 3.34.1-9.el9_7
systemd 252-51.el9_6.2 -> 252-55.el9_7.7
systemd-libs 252-51.el9_6.2 -> 252-55.el9_7.7
systemd-pam 252-51.el9_6.2 -> 252-55.el9_7.7
systemd-rpm-macros 252-51.el9_6.2 -> 252-55.el9_7.7
tzdata 2025b-1.el9 -> 2025b-2.el9

expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing

CVE-2025-59375

More information

Details

A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.

Severity

Important

References


libssh: out-of-bounds read in sftp_handle()

CVE-2025-5318

More information

Details

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

Severity

Moderate

References


libxslt: libxml2: Inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c

CVE-2025-9714

More information

Details

A flaw was found in libxstl/libxml2. The 'exsltDynMapFunction' function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling 'dyn:map()', leading to stack exhaustion and a local denial of service.

Severity

Moderate

References


sqlite: Integer Truncation in SQLite

CVE-2025-6965

More information

Details

A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.

Severity

Important

References


systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump

CVE-2025-4598

More information

Details

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.

A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch 3 times, most recently from f7ad781 to 7de73cc Compare November 4, 2025 04:12
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch 2 times, most recently from b90754e to a868b72 Compare November 4, 2025 12:10
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch 2 times, most recently from 17433c5 to dcb3b49 Compare November 11, 2025 16:12
@Gaurav1A
Copy link

/retest

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch from dcb3b49 to 25ae355 Compare November 13, 2025 12:18
@Gaurav1A
Copy link

/retest

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch from 25ae355 to b29c88c Compare November 19, 2025 08:15
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch 2 times, most recently from 3c85318 to c19fcd1 Compare December 1, 2025 04:14
Signed-off-by: konflux-internal-p02 <170854209+konflux-internal-p02[bot]@users.noreply.github.com>
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-7.1/lock-file-maintenance-vulnerability branch from c19fcd1 to b254d22 Compare December 3, 2025 12:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants