Skip to content

Conversation

@red-hat-konflux
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Dec 18, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
binutils 2.30-127.el8_10 -> 2.30-128.el8_10
coreutils 8.30-15.el8 -> 8.30-16.el8_10
coreutils-common 8.30-15.el8 -> 8.30-16.el8_10
curl 7.61.1-34.el8_10.8 -> 7.61.1-34.el8_10.9
dracut 049-237.git20250603.el8_10 -> 049-239.git20251127.el8_10
findutils 1:4.6.0-23.el8_10 -> 1:4.6.0-24.el8_10
libblkid 2.32.1-46.el8 -> 2.32.1-47.el8_10
libcurl 7.61.1-34.el8_10.8 -> 7.61.1-34.el8_10.9
libcurl-devel 7.61.1-34.el8_10.8 -> 7.61.1-34.el8_10.9
libfdisk 2.32.1-46.el8 -> 2.32.1-47.el8_10
libmount 2.32.1-46.el8 -> 2.32.1-47.el8_10
libsmartcols 2.32.1-46.el8 -> 2.32.1-47.el8_10
libuuid 2.32.1-46.el8 -> 2.32.1-47.el8_10
libuuid-devel 2.32.1-46.el8 -> 2.32.1-47.el8_10
openssh 8.0p1-26.el8_10 -> 8.0p1-27.el8_10
openssh-clients 8.0p1-26.el8_10 -> 8.0p1-27.el8_10
pam 1.3.1-38.el8_10 -> 1.3.1-39.el8_10
shadow-utils 2:4.6-22.el8 -> 2:4.6-23.el8_10
tzdata 2025b-1.el8 -> 2025c-1.el8
util-linux 2.32.1-46.el8 -> 2.32.1-47.el8_10

binutils: GNU Binutils Linker heap-based overflow

CVE-2025-11083

More information

Details

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

Severity

Moderate

References


curl: libcurl: Curl out of bounds read for cookie path

CVE-2025-9086

More information

Details

  1. A cookie is set using the secure keyword for https://target
  2. curl is redirected to or otherwise made to speak with http://target (same
    hostname, but using clear text HTTP) using the same cookie set
  3. The same cookie name is set - but with just a slash as path (path='/').
    Since this site is not secure, the cookie should just be ignored.
  4. A bug in the path comparison logic makes curl read outside a heap buffer
    boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.

Severity

Moderate

References


openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand

CVE-2025-61985

More information

Details

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

Severity

Moderate

References


openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand

CVE-2025-61984

More information

Details

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested review from a team and rhacs-bot as code owners December 18, 2025 00:58
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.21/lock-file-maintenance-vulnerability branch 6 times, most recently from 7bd79c9 to 03b2ce4 Compare December 22, 2025 17:04
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.21/lock-file-maintenance-vulnerability branch from 03b2ce4 to 7306e6e Compare December 22, 2025 21:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants