Skip to content

Refresh RPM lockfiles [SECURITY]#894

Open
red-hat-konflux-kflux-prd-rh02[bot] wants to merge 1 commit intomasterfrom
konflux/mintmaker/master/lock-file-maintenance-vulnerability
Open

Refresh RPM lockfiles [SECURITY]#894
red-hat-konflux-kflux-prd-rh02[bot] wants to merge 1 commit intomasterfrom
konflux/mintmaker/master/lock-file-maintenance-vulnerability

Conversation

@red-hat-konflux-kflux-prd-rh02
Copy link

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot commented Nov 4, 2025

This PR contains the following updates:

File images/must-gather/rpms.in.yaml:

Package Change
openshift-clients 4.16.0-202410172045.p0.gcf533b5.assembly.stream.el9 -> 4.20.0-202603030647.p2.g64e778a.assembly.stream.el9
jq 1.6-17.el9 -> 1.6-19.el9
rsync 3.2.3-20.el9 -> 3.2.5-3.el9
tar 2:1.34-7.el9 -> 2:1.34-9.el9_7

File images/openscap/rpms.in.yaml:

Package Change
openscap 1:1.3.12-1.el9_6 -> 1:1.3.13-1.el9_7
openscap-scanner 1:1.3.12-1.el9_6 -> 1:1.3.13-1.el9_7
expat 2.5.0-5.el9_6 -> 2.5.0-5.el9_7.1
kmod-libs 28-10.el9 -> 28-11.el9
libfdisk 2.37.4-21.el9 -> 2.37.4-21.el9_7
openssl 1:3.2.2-6.el9_5.1 -> 1:3.5.1-7.el9_7
pam 1.5.1-25.el9_6 -> 1.5.1-26.el9_6
systemd 252-51.el9_6.1 -> 252-55.el9_7.7
systemd-pam 252-51.el9_6.1 -> 252-55.el9_7.7
systemd-rpm-macros 252-51.el9_6.1 -> 252-55.el9_7.7
util-linux 2.37.4-21.el9 -> 2.37.4-21.el9_7
util-linux-core 2.37.4-21.el9 -> 2.37.4-21.el9_7

Warning

Some dependencies could not be looked up. Check the warning logs for more information.


expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing

CVE-2025-59375

More information

Details

A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.

Severity

Important

References


util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

CVE-2025-14104

More information

Details

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

Severity

Moderate

References


systemd-coredump: race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump

CVE-2025-4598

More information

Details

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.

A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.

Severity

Moderate

References


runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects

CVE-2025-52881

More information

Details

A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.

Severity

Important

References


golang: net/url: Memory exhaustion in query parameter parsing in net/url

CVE-2025-61726

More information

Details

A flaw was found in the net/url package in the Go standard library. The package does not enforce a limit on the number of unique query parameters it parses. A Go application using the net/http.Request.ParseForm method will try to process all parameters provided in the request. A specially crafted HTTP request containing a massive number of query parameters will cause the application to consume an excessive amount of memory, eventually causing the application to crash or become unresponsive, resulting in a denial of service.

Severity

Important

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@openshift-ci
Copy link

openshift-ci bot commented Nov 4, 2025

Hi @red-hat-konflux-kflux-prd-rh02[bot]. Thanks for your PR.

I'm waiting for a github.com member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@github-actions
Copy link

github-actions bot commented Nov 4, 2025

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-9b6b29f1a929cb6a5f59e44c1167191ae653d651

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 9b6b29f to 55ff0c8 Compare November 11, 2025 08:15
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-55ff0c830f37ec1282113a133366899fbf22d8b9

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 55ff0c8 to 53b4769 Compare November 11, 2025 20:30
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-53b47692a990764696b59670482826eaefb3b076

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 53b4769 to 4117fee Compare November 17, 2025 04:27
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-4117fee46a929ad1fda520e5f02ed4d2677fa434

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 4117fee to 0388841 Compare November 17, 2025 08:23
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-0388841cb286db39a7ee46dab298efc2c851a8c8

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 0388841 to 69ebc8b Compare November 19, 2025 00:27
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-69ebc8b1812414972dd0cfc316c52d765cc1526d

@yuumasato
Copy link
Member

/retest

@yuumasato yuumasato added this to the 1.9.0 milestone Nov 24, 2025
@yuumasato
Copy link
Member

/test e2e-aws-serial

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 69ebc8b to 3f0c6c1 Compare November 26, 2025 16:50
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-3f0c6c112896d4c1b6c95f1a7b4c77f239c36042

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 3f0c6c1 to 1dbd0bc Compare December 1, 2025 12:23
@github-actions
Copy link

github-actions bot commented Dec 1, 2025

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-1dbd0bcbd6b316f114b37d47d8f35feec86e5ae2

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 1dbd0bc to 2e5b8d7 Compare December 2, 2025 00:46
@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 0804272 to 0778bfb Compare February 19, 2026 04:31
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-0778bfb95795ebe9ebe95e1b8316ec384612b2fe

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 0778bfb to 9510675 Compare February 20, 2026 12:25
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-9510675dc3fc9328dc1d4a0c8ceb1113768c27d8

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 9510675 to b6b51aa Compare February 20, 2026 16:30
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-b6b51aafa9d7495a43ed7a6e75580ff2a72017cb

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from b6b51aa to b4cb816 Compare February 25, 2026 20:24
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-b4cb816191d10eb929c2a99bf6efc775fcfadde6

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch 2 times, most recently from 828b82f to 73e46d4 Compare March 2, 2026 20:21
@github-actions
Copy link

github-actions bot commented Mar 2, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-73e46d41359b8d8a6f935472c83aa5c714013780

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 73e46d4 to 2c74d0f Compare March 3, 2026 16:21
@github-actions
Copy link

github-actions bot commented Mar 3, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-2c74d0f63f512fe085b3b27f448ea343ac74ed3d

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch 2 times, most recently from 3b01f0e to 5363ba1 Compare March 4, 2026 08:24
@github-actions
Copy link

github-actions bot commented Mar 4, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-5363ba1c85276e1223939240a9eb03128a936770

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 5363ba1 to a2bdb2e Compare March 4, 2026 16:21
@github-actions
Copy link

github-actions bot commented Mar 4, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-a2bdb2ef9c43ea134d6374f4195c01417ee5e94f

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from a2bdb2e to 750db4d Compare March 4, 2026 20:22
@github-actions
Copy link

github-actions bot commented Mar 4, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-750db4d4ff5c6da83d0e8ef43c882476e88e4367

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 750db4d to 8cd501b Compare March 5, 2026 00:31
@github-actions
Copy link

github-actions bot commented Mar 5, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-8cd501b6a76c244f776f0da9e942219c2a280de4

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 8cd501b to e2f8584 Compare March 5, 2026 20:24
@github-actions
Copy link

github-actions bot commented Mar 5, 2026

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-e2f8584d0243f7832d7eabb6671061c69cee12a9

@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from e2f8584 to 606e34d Compare March 11, 2026 08:31
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-606e34d8268b8411cf1f7c405750c573d95ba09b

Signed-off-by: red-hat-konflux-kflux-prd-rh02 <190377777+red-hat-konflux-kflux-prd-rh02[bot]@users.noreply.github.com>
@red-hat-konflux-kflux-prd-rh02 red-hat-konflux-kflux-prd-rh02 bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 606e34d to b4c3226 Compare March 12, 2026 12:21
@github-actions
Copy link

🤖 To deploy this PR, run the following command:

make catalog-deploy CATALOG_IMG=ghcr.io/complianceascode/compliance-operator-catalog:894-b4c3226fed870bc28fb2eb8495ee336933591537

@openshift-ci
Copy link

openshift-ci bot commented Mar 12, 2026

@red-hat-konflux-kflux-prd-rh02[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-rosa b4c3226 link true /test e2e-rosa
ci/prow/images b4c3226 link true /test images
ci/prow/e2e-aws-parallel-arm b4c3226 link true /test e2e-aws-parallel-arm

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant