Refresh RPM lockfiles (release-2.12) [SECURITY] #1985
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.



This PR contains the following updates:
File rpms.in.yaml:
11.5.0-5.el9_5->11.5.0-11.el911.5.0-5.el9_5->11.5.0-11.el911.5.0-5.el9_5->11.5.0-11.el92.34-168.el9_6.20->2.34-231.el9_7.25.14.0-570.24.1.el9_6->5.14.0-611.7.1.el9_711.5.0-5.el9_5->11.5.0-11.el911.5.0-5.el9_5->11.5.0-11.el911.5.0-5.el9_5->11.5.0-11.el93.1.5-4.el9->3.1.5-7.el92.35.2-63.el9->2.35.2-67.el92.35.2-63.el9->2.35.2-67.el920250128-1.git5269e22.el9->20250905-1.git377cc42.el9_72.1.27-21.el9->2.1.27-22.el90.192-6.el9_6->0.193-1.el90.192-6.el9_6->0.193-1.el90.192-6.el9_6->0.193-1.el90.192-6.el9_6->0.193-1.el92.34-168.el9_6.20->2.34-231.el9_7.22.34-168.el9_6.20->2.34-231.el9_7.22.34-168.el9_6.20->2.34-231.el9_7.22.34-168.el9_6.20->2.34-231.el9_7.228-10.el9->28-11.el911.5.0-5.el9_5->11.5.0-11.el92.48-9.el9_2->2.48-10.el91.46.5-7.el9->1.46.5-8.el97.76.1-31.el9->7.76.1-34.el911.5.0-5.el9_5->11.5.0-11.el911.5.0-5.el9_5->11.5.0-11.el93.6-2.el9->3.6-3.el90.10.4-13.el9->0.10.4-15.el9_70.10.4-13.el9->0.10.4-15.el9_711.5.0-5.el9_5->11.5.0-11.el96.2-10.20210508.el9->6.2-12.20210508.el96.2-10.20210508.el9->6.2-12.20210508.el91:3.2.2-6.el9_5.1->1:3.5.1-4.el9_73.0.7-6.el9_5->3.0.7-8.el93.0.7-6.el9_5->3.0.7-8.el91:3.2.2-6.el9_5.1->1:3.5.1-4.el9_71.5.1-25.el9_6->1.5.1-26.el9_69.6-0.1.el9->9.7-0.7.el92:4.9-12.el9->2:4.9-15.el9252-51.el9_6.1->252-55.el9_7.2252-51.el9_6.1->252-55.el9_7.2252-51.el9_6.1->252-55.el9_7.2252-51.el9_6.1->252-55.el9_7.22025b-1.el9->2025b-2.el92.34-168.el9_6.20->2.34-231.el9_7.2Warning
Some dependencies could not be looked up. Check the warning logs for more information.
glibc: Double free in glibc
CVE-2025-8058
More information
Severity
Moderate
References
kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
CVE-2025-21928
More information
Severity
Important
References
kernel: net/sched: fix use-after-free in taprio_dev_notifier
CVE-2025-38087
More information
Severity
Important
References
microcode_ctl: From CVEorg collector
CVE-2024-28956
More information
Severity
Important
References
kernel: cifs: Fix integer overflow while processing closetimeo mount option
CVE-2025-21962
More information
Severity
Important
References
kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry
CVE-2025-37958
More information
Severity
Moderate
References
kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()
CVE-2025-22121
More information
Severity
Moderate
References
kernel: media: uvcvideo: Fix double free in error path
CVE-2024-57980
More information
Severity
Moderate
References
kernel: udp: Fix memory accounting leak.
CVE-2025-22058
More information
Severity
Important
References
kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()
CVE-2022-49788
More information
Severity
Important
References
kernel: tls: always refresh the queue when reading sock
CVE-2025-38471
More information
Severity
Important
References
kernel: i2c/designware: Fix an initialization issue
CVE-2025-38380
More information
Severity
Important
References
kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done
CVE-2025-38052
More information
Severity
Important
References
kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error
CVE-2025-38089
More information
Severity
Important
References
kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds
CVE-2025-38159
More information
Severity
Important
References
kernel: wifi: iwlwifi: limit printed string from FW file
CVE-2025-21905
More information
Severity
Moderate
References
kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()
CVE-2025-21867
More information
Severity
Important
References
kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
CVE-2025-38085
More information
Severity
Important
References
kernel: media: uvcvideo: Remove dangling pointers
CVE-2024-58002
More information
Severity
Important
References
kernel: ice: fix eswitch code memory leak in reset scenario
CVE-2025-38417
More information
Severity
Important
References
kernel: net: ch9200: fix uninitialised access during mii_nway_restart
CVE-2025-38086
More information
Severity
Moderate
References
kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling
CVE-2025-37797
More information
Severity
Moderate
References
kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access
CVE-2025-38110
More information
Severity
Moderate
References
kernel: net: fix udp gso skb_segment after pull from frag_list
CVE-2025-38124
More information
Severity
Important
References
kernel: net_sched: ets: Fix double list add in class with netem as child qdisc
CVE-2025-37914
More information
Severity
Important
References
kernel: RDMA/core: Fix use-after-free when rename device name
CVE-2025-22085
More information
Severity
Moderate
References
kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
CVE-2025-22020
More information
Severity
Important
References
kernel: Bluetooth: hci_core: Fix use-after-free in vhci_flush()
CVE-2025-38250
More information
Severity
Important
References
kernel: RDMA/mlx5: Fix page_size variable overflow
CVE-2025-22091
More information
Severity
Moderate
References
kernel: mm/hugetlb: unshare page tables during VMA split, not before
CVE-2025-38084
More information
Severity
Important
References
kernel: padata: fix UAF in padata_reorder
CVE-2025-21727
More information
Severity
Important
References
kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc
CVE-2025-37890
More information
Severity
Important
References
kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()
CVE-2025-21929
More information
Severity
Important
References
kernel: ext4: avoid journaling sb update on error if journal is destroying
CVE-2025-22113
More information
Severity
Moderate
References
libssh: out-of-bounds read in sftp_handle()
CVE-2025-5318
More information
Severity
Moderate
References
ncurses: segfaulting OOB read
CVE-2022-29458
More information
Severity
Low
References
linux-pam: Incomplete fix for CVE-2025-6020
CVE-2025-8941
More information
Severity
Important
References
linux-pam: Linux-pam directory Traversal
CVE-2025-6020
More information
Severity
Important
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone America/New_York, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.