Skip to content

Conversation

@konflux-internal-p02
Copy link

@konflux-internal-p02 konflux-internal-p02 bot commented Nov 20, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
ca-certificates 2024.2.69_v8.0.303-80.0.el8_10 -> 2025.2.80_v9.0.304-80.2.el8_10
expat 2.2.5-17.el8_10 -> 2.5.0-1.el8_10
glib2 2.56.4-166.el8_10 -> 2.56.4-167.el8_10
libssh 0.9.6-15.el8_10 -> 0.9.6-16.el8_10
libssh-config 0.9.6-15.el8_10 -> 0.9.6-16.el8_10
systemd 239-82.el8_10.5 -> 239-82.el8_10.8
systemd-libs 239-82.el8_10.5 -> 239-82.el8_10.8
systemd-pam 239-82.el8_10.5 -> 239-82.el8_10.8
systemd-udev 239-82.el8_10.5 -> 239-82.el8_10.8

expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing

CVE-2025-59375

More information

Details

A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.

Severity

Important

References


expat: internal entity expansion

CVE-2013-0340

More information

Details

expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.

Severity

Important

References


libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat

CVE-2024-8176

More information

Details

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.

Severity

Important

References


expat: parsing large tokens can trigger a denial of service

CVE-2023-52425

More information

Details

A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.

Severity

Important

References


libssh: Incorrect Return Code Handling in ssh_kdf() in libssh

CVE-2025-5372

More information

Details

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 2 times, most recently from ce0b0cd to 7339777 Compare November 24, 2025 20:16
Signed-off-by: konflux-internal-p02 <170854209+konflux-internal-p02[bot]@users.noreply.github.com>
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch from 7339777 to 324fe10 Compare November 25, 2025 12:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant