-
Notifications
You must be signed in to change notification settings - Fork 29
chore(deps): refresh rpm lockfiles [SECURITY] #2600
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-3.23
Are you sure you want to change the base?
chore(deps): refresh rpm lockfiles [SECURITY] #2600
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto-approved by automation.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Auto-approved by automation.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## release-3.23 #2600 +/- ##
=============================================
Coverage 27.60% 27.60%
=============================================
Files 95 95
Lines 5422 5422
Branches 2523 2523
=============================================
Hits 1497 1497
Misses 3213 3213
Partials 712 712
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
861c7dd to
c91f45b
Compare
e614dbc to
d4fdcd7
Compare
d4fdcd7 to
0e3113d
Compare
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
0e3113d to
89faee1
Compare
This PR contains the following updates:
File rpms.in.yaml:
2024.2.69_v8.0.303-80.0.el8_10->2025.2.80_v9.0.304-80.2.el8_102.56.4-166.el8_10->2.56.4-167.el8_104.18.0-553.79.1.el8_10->4.18.0-553.82.1.el8_100.9.6-14.el8->0.9.6-15.el8_100.9.6-14.el8->0.9.6-15.el8_10239-82.el8_10.5->239-82.el8_10.8239-82.el8_10.5->239-82.el8_10.8239-82.el8_10.5->239-82.el8_10.8239-82.el8_10.5->239-82.el8_10.8libssh: out-of-bounds read in sftp_handle()
CVE-2025-5318
More information
Details
A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.
Severity
Moderate
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.