Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Nov 8, 2025

This PR contains the following updates:

Package Type Update Change Age Confidence
docker/setup-qemu-action action minor v3.6.0 -> v3.7.0 age confidence
github.com/opencontainers/runc replace patch v1.3.2 -> v1.3.3 age confidence
github.com/testcontainers/testcontainers-go/modules/k3s require minor v0.39.0 -> v0.40.0 age confidence
go (source) toolchain patch 1.25.3 -> 1.25.4 age confidence
kubewarden/github-actions action patch v4.5.13 -> v4.5.15 age confidence
sigs.k8s.io/controller-runtime require patch v0.22.3 -> v0.22.4 age confidence

Release Notes

docker/setup-qemu-action (docker/setup-qemu-action)

v3.7.0

Compare Source

Full Changelog: docker/setup-qemu-action@v3.6.0...v3.7.0

opencontainers/runc (github.com/opencontainers/runc)

v1.3.3: runc v1.3.3 -- "奴らに支配されていた恐怖を"

Compare Source

[!NOTE]
Some vendors were given a pre-release version of this release.
This public release includes two extra patches to fix regressions
discovered very late during the embargo period and were thus not
included in the pre-release versions. Please update to this version.

This release contains fixes for three high-severity security
vulnerabilities in runc (CVE-2025-31133, CVE-2025-52565, and
CVE-2025-52881). All three vulnerabilities ultimately allow (through
different methods) for full container breakouts by bypassing runc's
restrictions for writing to arbitrary /proc files.

Security
  • CVE-2025-31133 exploits an issue with how masked paths are implemented in
    runc. When masking files, runc will bind-mount the container's /dev/null
    inode on top of the file. However, if an attacker can replace /dev/null
    with a symlink to some other procfs file, runc will instead bind-mount the
    symlink target read-write. This issue affected all known runc versions.

  • CVE-2025-52565 is very similar in concept and application to
    CVE-2025-31133, except that it exploits a flaw in /dev/console
    bind-mounts. When creating the /dev/console bind-mount (to /dev/pts/$n),
    if an attacker replaces /dev/pts/$n with a symlink then runc will
    bind-mount the symlink target over /dev/console. This issue affected all
    versions of runc >= 1.0.0-rc3.

  • CVE-2025-52881 is a more sophisticated variant of CVE-2019-19921,
    which was a flaw that allowed an attacker to trick runc into writing the LSM
    process labels for a container process into a dummy tmpfs file and thus not
    apply the correct LSM labels to the container process. The mitigation we
    applied for CVE-2019-19921 was fairly limited and effectively only caused
    runc to verify that when we write LSM labels that those labels are actual
    procfs files. This issue affects all known runc versions.

Added
Static Linking Notices

The runc binary distributed with this release are statically linked with
the following GNU LGPL-2.1 licensed libraries, with runc acting
as a "work that uses the Library":

The versions of these libraries were not modified from their upstream versions,
but in order to comply with the LGPL-2.1 (§6(a)), we have attached the
complete source code for those libraries which (when combined with the attached
runc source code) may be used to exercise your rights under the LGPL-2.1.

However we strongly suggest that you make use of your distribution's packages
or download them from the authoritative upstream sources, especially since
these libraries are related to the security of your containers.


Thanks to the following contributors for making this release possible:

Signed-off-by: Aleksa Sarai [email protected]

testcontainers/testcontainers-go (github.com/testcontainers/testcontainers-go/modules/k3s)

v0.40.0

Compare Source

What's Changed
⚠️ Breaking Changes

The below modules receive a breaking change in the signature of their functional options, as now all of them return an error when needed (returning nil for success). Therefore, you're only affected when assigning the options to variables.

  • Old: type Option func(*options)
  • New: type Option func(*options) error
🚀 Features
🐛 Bug Fixes
📖 Documentation
🧹 Housekeeping
📦 Dependency updates
golang/go (go)

v1.25.4

kubewarden/github-actions (kubewarden/github-actions)

v4.5.15

Compare Source

🧰 Maintenance

  • chore(deps): Consume kwctl 1.30 in kwctl-installer (#​251)

v4.5.14

Compare Source

🐛 Bug Fixes

  • fix: Use --bundle when signing with cosign v3 (#​250)
kubernetes-sigs/controller-runtime (sigs.k8s.io/controller-runtime)

v0.22.4

Compare Source

What's Changed

Full Changelog: kubernetes-sigs/controller-runtime@v0.22.3...v0.22.4


Configuration

📅 Schedule: Branch creation - Only on Sunday and Saturday ( * * * * 0,6 ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner November 8, 2025 03:30
@renovate
Copy link
Contributor Author

renovate bot commented Nov 8, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 10 additional dependencies were updated

Details:

Package Change
github.com/docker/docker v28.3.3+incompatible -> v28.5.1+incompatible
github.com/testcontainers/testcontainers-go v0.39.0 -> v0.40.0
golang.org/x/crypto v0.41.0 -> v0.43.0
golang.org/x/mod v0.27.0 -> v0.28.0
golang.org/x/net v0.43.0 -> v0.45.0
golang.org/x/sync v0.16.0 -> v0.17.0
golang.org/x/sys v0.36.0 -> v0.37.0
golang.org/x/term v0.34.0 -> v0.36.0
golang.org/x/text v0.28.0 -> v0.30.0
golang.org/x/tools v0.36.0 -> v0.37.0

@github-project-automation github-project-automation bot moved this to Pending review in Kubewarden Nov 8, 2025
@codecov
Copy link

codecov bot commented Nov 8, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 74.19%. Comparing base (2e7dfc6) to head (77b60ee).
⚠️ Report is 2 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #1238      +/-   ##
==========================================
+ Coverage   74.10%   74.19%   +0.09%     
==========================================
  Files          30       30              
  Lines        3306     3306              
==========================================
+ Hits         2450     2453       +3     
+ Misses        690      688       -2     
+ Partials      166      165       -1     
Flag Coverage Δ
integration-tests 59.56% <ø> (+0.09%) ⬆️
unit-tests 60.46% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@viccuad viccuad merged commit 5d7a92e into main Nov 10, 2025
14 checks passed
@github-project-automation github-project-automation bot moved this from Pending review to Done in Kubewarden Nov 10, 2025
@renovate renovate bot deleted the renovate/all-updates branch November 10, 2025 08:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Archived in project

Development

Successfully merging this pull request may close these issues.

2 participants