Skip to content

Conversation

@konflux-internal-p02
Copy link

@konflux-internal-p02 konflux-internal-p02 bot commented Oct 29, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
keepalived 2.2.8-4.el9_5 -> 2.2.8-6.el9
perl-Net-SSLeay 1.94-1.el9 -> 1.94-3.el9
audit-libs 3.1.5-4.el9 -> 3.1.5-7.el9
crypto-policies 20250128-1.git5269e22.el9 -> 20250905-1.git377cc42.el9_7
curl-minimal 7.76.1-31.el9_6.1 -> 7.76.1-34.el9
cyrus-sasl-lib 2.1.27-21.el9 -> 2.1.27-22.el9
elfutils-libelf 0.192-6.el9_6 -> 0.193-1.el9
glibc 2.34-168.el9_6.23 -> 2.34-231.el9
glibc-common 2.34-168.el9_6.23 -> 2.34-231.el9
glibc-gconv-extra 2.34-168.el9_6.23 -> 2.34-231.el9
glibc-minimal-langpack 2.34-168.el9_6.23 -> 2.34-231.el9
iproute 6.11.0-1.el9 -> 6.14.0-2.el9
kmod-libs 28-10.el9 -> 28-11.el9
libbpf 2:1.5.0-1.el9 -> 2:1.5.0-2.el9
libcap 2.48-9.el9_2 -> 2.48-10.el9
libcom_err 1.46.5-7.el9 -> 1.46.5-8.el9
libcurl 7.76.1-31.el9_6.1 -> 7.76.1-34.el9
libgcc 11.5.0-5.el9_5 -> 11.5.0-11.el9
libsepol 3.6-2.el9 -> 3.6-3.el9
libssh 0.10.4-13.el9 -> 0.10.4-15.el9_6
libssh-config 0.10.4-13.el9 -> 0.10.4-15.el9_6
libstdc++ 11.5.0-5.el9_5 -> 11.5.0-11.el9
ncurses 6.2-10.20210508.el9_6.2 -> 6.2-12.20210508.el9
ncurses-base 6.2-10.20210508.el9_6.2 -> 6.2-12.20210508.el9
ncurses-libs 6.2-10.20210508.el9_6.2 -> 6.2-12.20210508.el9
openssl 1:3.2.2-6.el9_5.1 -> 1:3.5.1-3.el9
openssl-fips-provider 3.0.7-6.el9_5 -> 3.0.7-8.el9
openssl-fips-provider-so 3.0.7-6.el9_5 -> 3.0.7-8.el9
openssl-libs 1:3.2.2-6.el9_5.1 -> 1:3.5.1-3.el9
redhat-release 9.6-0.1.el9 -> 9.7-0.6.el9
redhat-release-eula 9.6-0.1.el9 -> 9.7-0.6.el9
rpm 4.16.1.3-37.el9 -> 4.16.1.3-39.el9
rpm-libs 4.16.1.3-37.el9 -> 4.16.1.3-39.el9
shadow-utils 2:4.9-12.el9 -> 2:4.9-15.el9
systemd 252-51.el9_6.2 -> 252-55.el9
systemd-libs 252-51.el9_6.2 -> 252-55.el9
systemd-pam 252-51.el9_6.2 -> 252-55.el9
systemd-rpm-macros 252-51.el9_6.2 -> 252-55.el9
tzdata 2025b-1.el9 -> 2025b-2.el9

libssh: out-of-bounds read in sftp_handle()

CVE-2025-5318

More information

Details

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-6.1/lock-file-maintenance-vulnerability branch 3 times, most recently from 1c92da7 to 90ff99c Compare November 4, 2025 12:09
Signed-off-by: konflux-internal-p02 <170854209+konflux-internal-p02[bot]@users.noreply.github.com>
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-6.1/lock-file-maintenance-vulnerability branch from 90ff99c to 4d7efc4 Compare November 11, 2025 12:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant