Skip to content

Conversation

@red-hat-konflux
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Nov 17, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
expat 2.2.5-17.el8_10 -> 2.5.0-1.el8_10
kernel-headers 4.18.0-553.83.1.el8_10 -> 4.18.0-553.85.1.el8_10
libssh 0.9.6-15.el8_10 -> 0.9.6-16.el8_10
libssh-config 0.9.6-15.el8_10 -> 0.9.6-16.el8_10

expat: parsing large tokens can trigger a denial of service

CVE-2023-52425

More information

Details

A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.

Severity

Important

References


expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing

CVE-2025-59375

More information

Details

A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.

Severity

Important

References


libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat

CVE-2024-8176

More information

Details

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.

Severity

Important

References


expat: internal entity expansion

CVE-2013-0340

More information

Details

expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.

Severity

Important

References


libssh: Incorrect Return Code Handling in ssh_kdf() in libssh

CVE-2025-5372

More information

Details

A flaw was found in libssh versions built with OpenSSL versions older than 3.0, specifically in the ssh_kdf() function responsible for key derivation. Due to inconsistent interpretation of return values where OpenSSL uses 0 to indicate failure and libssh uses 0 for success—the function may mistakenly return a success status even when key derivation fails. This results in uninitialized cryptographic key buffers being used in subsequent communication, potentially compromising SSH sessions' confidentiality, integrity, and availability.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested a review from rhacs-bot as a code owner November 17, 2025 13:05
@red-hat-konflux red-hat-konflux bot added build-builder-image rebuild-test-container Rebuild the collector-tests container. labels Nov 17, 2025
@red-hat-konflux red-hat-konflux bot requested a review from a team as a code owner November 17, 2025 13:05
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.23/lock-file-maintenance-vulnerability branch 2 times, most recently from 7b03dcd to 08b5e37 Compare November 20, 2025 21:03
@codecov-commenter
Copy link

codecov-commenter commented Nov 20, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 27.60%. Comparing base (7bb43dd) to head (48572c3).
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@              Coverage Diff              @@
##           release-3.23    #2675   +/-   ##
=============================================
  Coverage         27.60%   27.60%           
=============================================
  Files                95       95           
  Lines              5422     5422           
  Branches           2523     2523           
=============================================
  Hits               1497     1497           
  Misses             3213     3213           
  Partials            712      712           
Flag Coverage Δ
collector-unit-tests 27.60% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.23/lock-file-maintenance-vulnerability branch 2 times, most recently from 4f8d75e to 48572c3 Compare November 24, 2025 17:15
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.23/lock-file-maintenance-vulnerability branch from 48572c3 to c716331 Compare November 25, 2025 13:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant