Skip to content

Conversation

@red-hat-konflux
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Oct 21, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
clang 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
clang-libs 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
clang-resource-filesystem 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
compiler-rt 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
gcc-toolset-14-gcc 14.2.1-7.1.el8_10 -> 14.2.1-10.el8_10
gcc-toolset-14-gcc-c++ 14.2.1-7.1.el8_10 -> 14.2.1-10.el8_10
gcc-toolset-14-libstdc++-devel 14.2.1-7.1.el8_10 -> 14.2.1-10.el8_10
gcc-toolset-14-runtime 14.0-0.el8_10 -> 14.0-1.el8_10
libomp 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
libomp-devel 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
llvm 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
llvm-libs 19.1.7-2.module+el8.10.0+23045+e1f8e80e -> 20.1.8-2.module+el8.10.0+23372+3f2ea6fa
ca-certificates 2024.2.69_v8.0.303-80.0.el8_10 -> 2025.2.80_v9.0.304-80.2.el8_10
glib2 2.56.4-166.el8_10 -> 2.56.4-167.el8_10
kernel-headers 4.18.0-553.79.1.el8_10 -> 4.18.0-553.83.1.el8_10
libssh 0.9.6-14.el8 -> 0.9.6-15.el8_10
libssh-config 0.9.6-14.el8 -> 0.9.6-15.el8_10
systemd 239-82.el8_10.5 -> 239-82.el8_10.8
systemd-libs 239-82.el8_10.5 -> 239-82.el8_10.8
systemd-pam 239-82.el8_10.5 -> 239-82.el8_10.8
systemd-udev 239-82.el8_10.5 -> 239-82.el8_10.8

libssh: out-of-bounds read in sftp_handle()

CVE-2025-5318

More information

Details

A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested review from a team and rhacs-bot as code owners October 21, 2025 00:25
Copy link
Contributor

@rhacs-bot rhacs-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved by automation.

Copy link
Contributor

@rhacs-bot rhacs-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved by automation.

@codecov-commenter
Copy link

codecov-commenter commented Oct 21, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 27.60%. Comparing base (0d9a1a5) to head (f3c10b7).
⚠️ Report is 5 commits behind head on release-3.22.
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@              Coverage Diff              @@
##           release-3.22    #2602   +/-   ##
=============================================
  Coverage         27.60%   27.60%           
=============================================
  Files                95       95           
  Lines              5422     5422           
  Branches           2523     2523           
=============================================
  Hits               1497     1497           
  Misses             3213     3213           
  Partials            712      712           
Flag Coverage Δ
collector-unit-tests 27.60% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.22/lock-file-maintenance-vulnerability branch 8 times, most recently from e452189 to d909603 Compare October 29, 2025 12:25
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.22/lock-file-maintenance-vulnerability branch 8 times, most recently from df8dd2d to 1e3771e Compare November 5, 2025 12:24
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.22/lock-file-maintenance-vulnerability branch 3 times, most recently from 7b6c502 to 2f738d2 Compare November 10, 2025 04:24
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.22/lock-file-maintenance-vulnerability branch 5 times, most recently from b1165be to 382e8c7 Compare November 12, 2025 17:16
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.22/lock-file-maintenance-vulnerability branch from 382e8c7 to f3c10b7 Compare November 12, 2025 20:56
@dashrews78
Copy link
Contributor

Closed in favor of #2666

@dashrews78
Copy link
Contributor

Closed in favor of #2666

@dashrews78 dashrews78 closed this Nov 13, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants