Refresh RPM lockfiles [SECURITY] #332
Open
+108
−108
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
Warning
Some dependencies could not be looked up. Check the warning logs for more information.
gitk: git script execution flaw
CVE-2025-27614
More information
Severity
Important
References
git: Git GUI can create and overwrite files for which the user has write permission
CVE-2025-46835
More information
Severity
Important
References
git: Newline confusion in credential helpers can lead to credential exfiltration in git
CVE-2024-52006
More information
Severity
Important
References
git: Git does not sanitize URLs when asking for credentials interactively
CVE-2024-50349
More information
Severity
Important
References
git: Git arbitrary file writes
CVE-2025-48385
More information
Severity
Important
References
git: Git arbitrary code execution
CVE-2025-48384
More information
Severity
Important
References
gitk: Git file creation flaw
CVE-2025-27613
More information
Severity
Important
References
jq: jq has signed integer overflow in jv.c:jvp_array_write
CVE-2024-23337
More information
Severity
Moderate
References
jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)
CVE-2025-48060
More information
Severity
Moderate
References
cpython: python: Extraction filter bypass for linking outside extraction directory
CVE-2025-4330
More information
Severity
Important
References
cpython: python: Bypass extraction filter to modify file metadata outside extraction directory
CVE-2024-12718
More information
Severity
Important
References
cpython: Cpython infinite loop when parsing a tarfile
CVE-2025-8194
More information
Severity
Moderate
References
cpython: Tarfile extracts filtered members when errorlevel=0
CVE-2025-4435
More information
Severity
Important
References
python: cpython: Arbitrary writes via tarfile realpath overflow
CVE-2025-4517
More information
Severity
Important
References
cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory
CVE-2025-4138
More information
Severity
Important
References
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
CVE-2025-47273
More information
Severity
Moderate
References
linux-pam: Incomplete fix for CVE-2025-6020
CVE-2025-8941
More information
Severity
Important
References
linux-pam: Linux-pam directory Traversal
CVE-2025-6020
More information
Severity
Important
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test
.This PR has been generated by MintMaker (powered by Renovate Bot).