Skip to content

chore(deps): refresh rpm lockfiles [SECURITY]#3866

Merged
openshift-merge-bot[bot] merged 1 commit intorelease-4.20from
konflux/mintmaker/release-4.20/lock-file-maintenance-vulnerability
Mar 31, 2026
Merged

chore(deps): refresh rpm lockfiles [SECURITY]#3866
openshift-merge-bot[bot] merged 1 commit intorelease-4.20from
konflux/mintmaker/release-4.20/lock-file-maintenance-vulnerability

Conversation

@red-hat-konflux
Copy link
Copy Markdown
Contributor

@red-hat-konflux red-hat-konflux bot commented Mar 27, 2026

This PR contains the following updates:

File cnf-tests/.konflux/rpms.in.yaml:

Package Change
kernel-tools-libs 5.14.0-611.41.1.el9_7 -> 5.14.0-611.45.1.el9_7

kernel: net/sched: cls_u32: use skb_header_pointer_careful()

CVE-2026-23204

More information

Details

In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_u32: use skb_header_pointer_careful()

skb_header_pointer() does not fully validate negative @​offset values.

Use skb_header_pointer_careful() instead.

GangMin Kim provided a report and a repro fooling u32_classify():

BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0
net/sched/cls_u32.c:221

Severity

Moderate

References


kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()

CVE-2026-23193

More information

Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()

In iscsit_dec_session_usage_count(), the function calls complete() while
holding the sess->session_usage_lock. Similar to the connection usage count
logic, the waiter signaled by complete() (e.g., in the session release
path) may wake up and free the iscsit_session structure immediately.

This creates a race condition where the current thread may attempt to
execute spin_unlock_bh() on a session structure that has already been
deallocated, resulting in a KASAN slab-use-after-free.

To resolve this, release the session_usage_lock before calling complete()
to ensure all dereferences of the sess pointer are finished before the
waiter is allowed to proceed with deallocation.

Severity

Moderate

References


kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem

CVE-2025-38180

More information

Details

A flaw was found in the Linux kernel's Asynchronous Transfer Mode (ATM) subsystem. An authenticated local attacker could exploit a Use-After-Free (UAF) vulnerability in the /proc/net/atm/lec handling. This flaw occurs due to improper dev_put() calls without prior dev_hold() calls, leading to an imbalance in reference counting. Successful exploitation could allow the attacker to achieve privilege escalation or cause a denial of service.

Severity

Moderate

References


kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies

CVE-2025-40096

More information

Details

A flaw was found in the kernel subsystem handling of the DRM scheduler. Under certain error conditions, the function drm_sched_job_add_dependency() consumes a fence reference and then later erroneously attempts to free it again (double free). This may lead to memory corruption and, in some configurations, escalation of privileges.

Severity

Moderate

References


kernel: ALSA: aloop: Fix racy access at PCM trigger

CVE-2026-23191

More information

Details

In the Linux kernel, the following vulnerability has been resolved:

ALSA: aloop: Fix racy access at PCM trigger

The PCM trigger callback of aloop driver tries to check the PCM state
and stop the stream of the tied substream in the corresponding cable.
Since both check and stop operations are performed outside the cable
lock, this may result in UAF when a program attempts to trigger
frequently while opening/closing the tied stream, as spotted by
fuzzers.

For addressing the UAF, this patch changes two things:

  • It covers the most of code in loopback_check_format() with
    cable->lock spinlock, and add the proper NULL checks. This avoids
    already some racy accesses.
  • In addition, now we try to check the state of the capture PCM stream
    that may be stopped in this function, which was the major pain point
    leading to UAF.

Severity

Moderate

References


kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code execution

CVE-2026-23171

More information

Details

A flaw was found in the Linux kernel's bonding module. This use-after-free vulnerability occurs when a new slave device is added to the bonding array but fails during the enslave process. A local attacker can exploit this by triggering the enslave failure, which may lead to a system crash, resulting in a Denial of Service (DoS), or potentially allow for arbitrary code execution.

Severity

Moderate

References


kernel: Linux kernel: Local denial of service and memory leak in DAMON sysfs via setup failure

CVE-2026-23144

More information

Details

A flaw was found in the Linux kernel's Data Access MONitor (DAMON) sysfs interface. A local attacker, typically a privileged user, could exploit a cleanup bug during DAMON context setup. If the setup fails after the attrs directory is created, stale sysfs directories are left behind. This can lead to a local denial of service, making the DAMON sysfs interface unusable until a system reboot, and potentially cause a kernel memory leak if repeatedly triggered.

Severity

Moderate

References


kernel: macvlan: fix error recovery in macvlan_common_newlink()

CVE-2026-23209

More information

Details

A use-after-free vulnerability was found in the macvlan driver. When creating a macvlan interface in source mode fails after the source MAC has been added to the hash table (e.g., due to an invalid interface name), the hash entry still references the freed net_device structure. Subsequent packets matching that source MAC trigger use-after-free in macvlan_forward_source().

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@openshift-ci openshift-ci bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Mar 29, 2026
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-4.20/lock-file-maintenance-vulnerability branch from b0e515c to f6345f3 Compare March 30, 2026 19:13
@openshift-ci openshift-ci bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Mar 30, 2026
@fontivan
Copy link
Copy Markdown
Contributor

/approve
/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Mar 31, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Mar 31, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: fontivan, red-hat-konflux[bot]

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 31, 2026
@openshift-merge-bot openshift-merge-bot bot merged commit f9075c0 into release-4.20 Mar 31, 2026
4 checks passed
@openshift-merge-bot openshift-merge-bot bot deleted the konflux/mintmaker/release-4.20/lock-file-maintenance-vulnerability branch March 31, 2026 12:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant