Skip to content

Conversation

@red-hat-konflux
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Dec 4, 2025

This PR contains the following updates:

File .hermetic_builds/rpms.in.yaml:

Package Change
kernel-headers 5.14.0-611.13.1.el9_7 -> 5.14.0-611.16.1.el9_7
python3.12 3.12.11-2.el9 -> 3.12.12-1.el9_7
python3.12-devel 3.12.11-2.el9 -> 3.12.12-1.el9_7
python3.12-libs 3.12.11-2.el9 -> 3.12.12-1.el9_7
binutils 2.35.2-67.el9 -> 2.35.2-67.el9_7.1
binutils-gold 2.35.2-67.el9 -> 2.35.2-67.el9_7.1
openssh 8.7p1-46.el9 -> 8.7p1-47.el9_7
openssh-clients 8.7p1-46.el9 -> 8.7p1-47.el9_7

cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked

CVE-2025-8291

More information

Details

The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.

Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.

Severity

Moderate

References


binutils: GNU Binutils Linker heap-based overflow

CVE-2025-11083

More information

Details

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

Severity

Moderate

References


openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand

CVE-2025-61985

More information

Details

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

Severity

Moderate

References


openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand

CVE-2025-61984

More information

Details

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Europe/Prague, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@jira-linking
Copy link

jira-linking bot commented Dec 4, 2025

Commits missing Jira IDs:
d544786

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master-master/lock-file-maintenance-vulnerability branch 4 times, most recently from a946368 to 441f691 Compare December 18, 2025 04:44
@codecov-commenter
Copy link

codecov-commenter commented Dec 18, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 65.48%. Comparing base (da22b40) to head (14a6e3a).
⚠️ Report is 25 commits behind head on master.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #2086      +/-   ##
==========================================
- Coverage   65.55%   65.48%   -0.08%     
==========================================
  Files          56       56              
  Lines        6640     6652      +12     
==========================================
+ Hits         4353     4356       +3     
- Misses       2287     2296       +9     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master-master/lock-file-maintenance-vulnerability branch 23 times, most recently from 2abb1c3 to 413ee5e Compare December 24, 2025 16:48
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master-master/lock-file-maintenance-vulnerability branch from 413ee5e to d544786 Compare December 24, 2025 16:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant