Skip to content

chore(deps): update github actions (major)#1166

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/major-github-actions
Open

chore(deps): update github actions (major)#1166
renovate[bot] wants to merge 1 commit intomainfrom
renovate/major-github-actions

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Feb 24, 2026

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Type Update Change
actions/upload-artifact action major v6v7
docker/login-action action major v3v4
docker/setup-buildx-action action major v3v4
dorny/test-reporter action major v1v3
dorny/test-reporter action major v2.5.0v3
hashicorp/setup-terraform action major v3v4
marocchino/sticky-pull-request-comment action major v2v3.0.4

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

actions/upload-artifact (actions/upload-artifact)

v7.0.1

Compare Source

What's Changed

Full Changelog: actions/upload-artifact@v7...v7.0.1

v7.0.0

Compare Source

v7 What's new

Direct Uploads

Adds support for uploading single files directly (unzipped). Callers can set the new archive parameter to false to skip zipping the file during upload. Right now, we only support single files. The action will fail if the glob passed resolves to multiple files. The name parameter is also ignored with this setting. Instead, the name of the artifact will be the name of the uploaded file.

ESM

To support new versions of the @actions/* packages, we've upgraded the package to ESM.

What's Changed

New Contributors

Full Changelog: actions/upload-artifact@v6...v7.0.0

v7

Compare Source

docker/login-action (docker/login-action)

v4.1.0

Compare Source

Full Changelog: docker/login-action@v4.0.0...v4.1.0

v4.0.0

Compare Source

Full Changelog: docker/login-action@v3.7.0...v4.0.0

v4

Compare Source

v3.7.0

Compare Source

Full Changelog: docker/login-action@v3.6.0...v3.7.0

v3.6.0

Compare Source

Full Changelog: docker/login-action@v3.5.0...v3.6.0

v3.5.0

Compare Source

Full Changelog: docker/login-action@v3.4.0...v3.5.0

v3.4.0

Compare Source

Full Changelog: docker/login-action@v3.3.0...v3.4.0

v3.3.0

Compare Source

Full Changelog: docker/login-action@v3.2.0...v3.3.0

v3.2.0

Compare Source

Full Changelog: docker/login-action@v3.1.0...v3.2.0

v3.1.0

Compare Source

Full Changelog: docker/login-action@v3.0.0...v3.1.0

docker/setup-buildx-action (docker/setup-buildx-action)

v4

Compare Source

v4.0.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.12.0...v4.0.0

v3.12.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.11.1...v3.12.0

v3.11.1

Compare Source

Full Changelog: docker/setup-buildx-action@v3.11.0...v3.11.1

v3.11.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.10.0...v3.11.0

v3.10.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.9.0...v3.10.0

v3.9.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.8.0...v3.9.0

v3.8.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.7.1...v3.8.0

v3.7.1

Compare Source

Full Changelog: docker/setup-buildx-action@v3.7.0...v3.7.1

v3.7.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.6.1...v3.7.0

v3.6.1

Compare Source

Full Changelog: docker/setup-buildx-action@v3.6.0...v3.6.1

v3.6.0

Compare Source

  • Create temp docker context if default one has TLS data loaded before creating a container builder by @​crazy-max in #​341

Full Changelog: docker/setup-buildx-action@v3.5.0...v3.6.0

v3.5.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.4.0...v3.5.0

v3.4.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.3.0...v3.4.0

v3.3.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.2.0...v3.3.0

v3.2.0

Compare Source

[!NOTE]
config and config-inline input names are deprecated and will be removed in next major release.

Full Changelog: docker/setup-buildx-action@v3.1.0...v3.2.0

v3.1.0

Compare Source

Full Changelog: docker/setup-buildx-action@v3.0.0...v3.1.0

dorny/test-reporter (dorny/test-reporter)

v3

Compare Source

v3.0.0

Compare Source

Note: The v3 release requires NodeJS 24 runtime on GitHub Actions runners.

What's Changed

Other Changes

New Contributors

Full Changelog: dorny/test-reporter@v2.7.0...v3.0.0

v2.7.0

Compare Source

What's Changed
  • Feature: Add slug-prefix output for link anchors #​731
  • Feature: Report jest-junit testsuite errors as failures #​155
  • Security: Update dependencies to fix reported security vulnerabilities
Other Changes
New Contributors

Full Changelog: dorny/test-reporter@v2.6.0...v2.7.0

v2.6.0

Compare Source

We updated all dependency packages to latest versions to fix reported security vulnerabilities.

What's Changed
  • Fix: For workflow_run events, resolve the commit of the check run from related pull request head commits first (matching workflow_run.head_branch, then first PR), and fall back to workflow_run.head_sha for non-PR runs #​673
  • Change: The test-reporter action will listed all artifacts associated with the build run #​693
  • Maintenance: Upgrade to ESLint v9 #​629
New Contributors

Full Changelog: dorny/test-reporter@v2.5.0...v2.6.0

v2.5.0

Compare Source

What's Changed

Features
Project maintanance

Full Changelog: dorny/test-reporter@v2.4.0...v2.5.0

v2.4.0

Compare Source

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v2.3.0...v2.4.0

v2.3.0

Compare Source

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v2.2.0...v2.3.0

v2.2.0

Compare Source

v2.1.1

Compare Source

A bug fix release of the test-reporter action.

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v2.1.0...v2.1.1

v2.1.0

Compare Source

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v2.0.0...v2.1.0

v2.0.0

Compare Source

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v1.9.1...v2.0.0

v2

Compare Source

v1.9.1

Compare Source

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v1.9.0...v1.9.1

v1.9.0

Compare Source

What's Changed

Features
  • Add support for the rspec-json format #​398
  • Updated packages #​405

Contributors

Full Changelog: dorny/test-reporter@v1.8.0...v1.9.0

v1.9

Compare Source

v1.8.0

Compare Source

What's Changed

New Contributors

Full Changelog: dorny/test-reporter@v1.7.0...v1.8.0

v1.7.0

Compare Source

What's Changed


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Feb 24, 2026

🔍 Vulnerabilities of dockerhubaneo/armonik_core_stream_test_client:0.38.1-renovatemajorgithubactions.5.sha.0418bb93

📦 Image Reference dockerhubaneo/armonik_core_stream_test_client:0.38.1-renovatemajorgithubactions.5.sha.0418bb93
digestsha256:f97d2da069d6668a31eeeff2d7e85fead02c9cee8db925e82e29a5bcb6f11778
vulnerabilitiescritical: 0 high: 2 medium: 11 low: 3
platformlinux/amd64
size343 MB
packages1130
📦 Base Image ubuntu:24.04
also known as
  • 84bda043709f9066841484e9b8e440aa0d6d04ab49d09e367ef0fb68ace864cf
  • latest
  • noble
  • noble-20260410
digestsha256:cdb5fd928fced577cfecf12c8966e830fcdf42ee481fb0b91904eeddc2fe5eff
vulnerabilitiescritical: 0 high: 0 medium: 7 low: 2
critical: 0 high: 2 medium: 0 low: 0 System.Security.Cryptography.Xml 10.0.5 (nuget)

pkg:nuget/System.Security.Cryptography.Xml@10.0.5

high 7.5: CVE--2026--33116 Improper Input Validation

Affected range>=10.0.0
<=10.0.5
Fixed version10.0.6
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.873%
EPSS Percentile75th percentile
Description

Executive Summary:

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in EncryptedXml class where an attacker can cause an infinite loop and perform a Denial of Service attack.

Announcement

Announcement for this issue can be found at dotnet/announcements#392

CVSS Details

  • Version: 3.1
  • Severity: High
  • Score: 7.5
  • Vector: 7.5 CVSS: 3.1AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
  • Weakness: CWE-835 CWE-400 CWE-20: Loop with Unreachable Exit Condition ('Infinite Loop') Uncontrolled Resource Consumption Improper Input Validation

Affected Platforms

  • Platforms: All
  • Architectures: All

Affected Packages

The vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below

.NET 10

Package name Affected version Patched version
System.Security.Cryptography.Xml >=10.0.0, <=10.0.5 10.0.6

.NET 9

Package name Affected version Patched version
System.Security.Cryptography.Xml >=9.0.0, <=9.0.14 9.0.15

.NET 8

Package name Affected version Patched version
System.Security.Cryptography.Xml >=8.0.0, <=8.0.2 8.0.3

Advisory FAQ

How do I know if I am affected?

If using a package listed in affected packages, you're exposed to the vulnerability.

How do I fix the issue?

To update the Using the System.Security.Cryptography.xml NuGet package, use one of the following methods:

NuGet Package Manager UI in Visual Studio:

  • Open your project in Visual Studio.
  • Right-click on your project in Solution Explorer and select "Manage NuGet Packages..." or navigate to "Project > Manage NuGet Packages".
  • In the NuGet Package Manager window, select the "Updates" tab. This tab lists packages with available updates from your configured package sources.
  • Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.
  • Click the "Update" button.

Using the NuGet Package Manager Console in Visual Studio:

  • Open your project in Visual Studio.
  • Navigate to "Tools > NuGet Package Manager > Package Manager Console".
  • To update a specific package to its latest version, use the following Update-Package command:

Update-Package -Id System.Security.Cryptography.xml

Using the .NET CLI (Command Line Interface):

  • Open a terminal or command prompt in your project's directory.
  • To update a specific package to its latest version, use the following add package command:

dotnet add package System.Security.Cryptography.xml

Once you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.

Other Information

Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the MSRC Researcher Portal. Further information can be found in the MSRC Report an Issue FAQ.

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

External Links

CVE-2026-33116

Acknowledgements

Ludvig Pedersen

Revisions

V1.0 (April 14, 2026): Advisory published.

high 7.5: CVE--2026--26171 Uncontrolled Resource Consumption

Affected range>=10.0.0
<=10.0.5
Fixed version10.0.6
CVSS Score7.5
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score0.562%
EPSS Percentile68th percentile
Description

Executive Summary:

Microsoft is releasing this security advisory to provide information about a vulnerability in System.Security.Cryptography.Xml. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in EncryptedXml class where uncontrolled resource consumption can give an attacker to the ability to perform a Denial of Service attack.

Announcement

Announcement for this issue can be found at dotnet/announcements#389

CVSS Details

  • Version: 3.1
  • Severity: High
  • Score: 7.5
  • Vector: 7.5: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H E:U/RL:O/RC:C
  • Weakness: CWE-400 CWE-611: Uncontrolled Resource Consumption Improper Restriction of XML External Entity Reference

Affected Platforms

  • Platforms: All
  • Architectures: All

Affected Packages

The vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below

.NET 10

Package name Affected version Patched version
System.Security.Cryptography.xml >=10.0.0, <=10.0.5; 10.0.6

.NET 9

Package name Affected version Patched version
System.Security.Cryptography.xml >=9.0.0, <=9.0.14; 9.0.15

.NET 8

Package name Affected version Patched version
System.Security.Cryptography.xml >=8.0.0, <=8.0.2; 8.0.3

Advisory FAQ

How do I know if I am affected?

If using an affected package listed in affected packages, you're exposed to the vulnerability.

How do I fix the issue?

To update the Using the System.Security.Cryptography.Xml NuGet package, use one of the following methods:

NuGet Package Manager UI in Visual Studio:

  • Open your project in Visual Studio.
  • Right-click on your project in Solution Explorer and select "Manage NuGet Packages..." or navigate to "Project > Manage NuGet Packages".
  • In the NuGet Package Manager window, select the "Updates" tab. This tab lists packages with available updates from your configured package sources.
  • Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.
  • Click the "Update" button.

Using the NuGet Package Manager Console in Visual Studio:

  • Open your project in Visual Studio.
  • Navigate to "Tools > NuGet Package Manager > Package Manager Console".
  • To update a specific package to its latest version, use the following Update-Package command:

Update-Package -Id System.Security.Cryptography.xml

Using the .NET CLI (Command Line Interface):

  • Open a terminal or command prompt in your project's directory.
  • To update a specific package to its latest version, use the following add package command:

dotnet add package System.Security.Cryptography.Xml

Once you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.

Other Information

Reporting Security Issues

If you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the MSRC Researcher Portal. Further information can be found in the MSRC Report an Issue FAQ.

Security reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.

Support

You can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.

Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

External Links

CVE-2026-26171

Acknowledgements

Ludvig Pedersen

Revisions

V1.0 (April 14, 2026): Advisory published.

critical: 0 high: 0 medium: 3 low: 0 libc6 2.39-0ubuntu8.7 (deb)

pkg:deb/ubuntu/libc6@2.39-0ubuntu8.7?arch=amd64&distro=ubuntu-24.04&upstream=glibc

medium : CVE--2026--4438

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.033%
EPSS Percentile10th percentile
Description

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

medium : CVE--2026--4437

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.050%
EPSS Percentile16th percentile
Description

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

medium : CVE--2026--4046

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.044%
EPSS Percentile13th percentile
Description

The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.

critical: 0 high: 0 medium: 2 low: 0 tar 1.35+dfsg-3build1 (deb)

pkg:deb/ubuntu/tar@1.35%2Bdfsg-3build1?arch=amd64&distro=ubuntu-24.04

medium : CVE--2026--5704

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.010%
EPSS Percentile1st percentile
Description

A flaw was found in tar. A remote attacker could exploit this vulnerability by crafting a malicious archive, leading to hidden file injection with fully attacker-controlled content. This bypasses pre-extraction inspection mechanisms, potentially allowing an attacker to introduce malicious files onto a system without detection.

medium : CVE--2025--45582

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.081%
EPSS Percentile24th percentile
Description

GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.

critical: 0 high: 0 medium: 1 low: 0 dpkg 1.22.6ubuntu6.5 (deb)

pkg:deb/ubuntu/dpkg@1.22.6ubuntu6.5?arch=amd64&distro=ubuntu-24.04

medium : CVE--2026--2219

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.023%
EPSS Percentile6th percentile
Description

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-5ubuntu2.2 (deb)

pkg:deb/ubuntu/libcap2@1%3A2.66-5ubuntu2.2?arch=amd64&distro=ubuntu-24.04

medium : CVE--2026--4878

Affected range<1:2.66-5ubuntu2.4
Fixed version1:2.66-5ubuntu2.4
EPSS Score0.004%
EPSS Percentile0th percentile
Description

A flaw was found in libcap. A local unprivileged user can exploit a Time-of-check-to-time-of-use (TOCTOU) race condition in the cap_set_file() function. This allows an attacker with write access to a parent directory to redirect file capability updates to an attacker-controlled file. By doing so, capabilities can be injected into or stripped from unintended executables, leading to privilege escalation.

critical: 0 high: 0 medium: 1 low: 0 git 1:2.43.0-1ubuntu7.3 (deb)

pkg:deb/ubuntu/git@1%3A2.43.0-1ubuntu7.3?arch=amd64&distro=ubuntu-24.04

medium 8.8: CVE--2024--52005

Affected range>=0
Fixed versionNot Fixed
CVSS Score8.8
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score0.384%
EPSS Percentile60th percentile
Description

Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.

critical: 0 high: 0 medium: 1 low: 0 wget 1.21.4-1ubuntu4.1 (deb)

pkg:deb/ubuntu/wget@1.21.4-1ubuntu4.1?arch=amd64&distro=ubuntu-24.04

medium 6.1: CVE--2021--31879

Affected range>=0
Fixed versionNot Fixed
CVSS Score6.1
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Score0.150%
EPSS Percentile36th percentile
Description

GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.

critical: 0 high: 0 medium: 1 low: 0 util-linux 2.39.3-9ubuntu6.5 (deb)

pkg:deb/ubuntu/util-linux@2.39.3-9ubuntu6.5?arch=amd64&distro=ubuntu-24.04

medium : CVE--2026--27456

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.012%
EPSS Percentile2nd percentile
Description

util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privileges (euid=0) without verifying that the path has not been replaced between both operations. Neither O_NOFOLLOW, nor inode comparison, nor post-open fstat() are employed. This allows a local unprivileged user to replace the source file with a symlink pointing to any root-owned file or device during the race window, causing the SUID binary to open and mount it as root. Exploitation requires an /etc/fstab entry with user,loop options whose path points to a directory where the attacker has write permission, and that /usr/bin/mount has the SUID bit set (the default configuration on virtually all Linux distributions). The impact is unauthorized read access to root-protected files and block devices, including backup images, disk volumes, and any file containing a valid filesystem. This issue has been patched in version 2.41.4.

critical: 0 high: 0 medium: 1 low: 0 libexpat1 2.6.1-2ubuntu0.4 (deb)

pkg:deb/ubuntu/libexpat1@2.6.1-2ubuntu0.4?arch=amd64&distro=ubuntu-24.04&upstream=expat

medium 5.5: CVE--2025--66382

Affected range>=0
Fixed versionNot Fixed
CVSS Score5.5
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
EPSS Score0.011%
EPSS Percentile1st percentile
Description

In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.

critical: 0 high: 0 medium: 0 low: 1 passwd 1:4.13+dfsg1-4ubuntu3.2 (deb)

pkg:deb/ubuntu/passwd@1%3A4.13%2Bdfsg1-4ubuntu3.2?arch=amd64&distro=ubuntu-24.04&upstream=shadow

low : CVE--2024--56433

Affected range>=0
Fixed versionNot Fixed
EPSS Score4.509%
EPSS Percentile89th percentile
Description

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

critical: 0 high: 0 medium: 0 low: 1 libicu74 74.2-1ubuntu3.1 (deb)

pkg:deb/ubuntu/libicu74@74.2-1ubuntu3.1?arch=amd64&distro=ubuntu-24.04&upstream=icu

low : CVE--2025--5222

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.046%
EPSS Percentile14th percentile
Description

A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.

critical: 0 high: 0 medium: 0 low: 1 libgcrypt20 1.10.3-2build1 (deb)

pkg:deb/ubuntu/libgcrypt20@1.10.3-2build1?arch=amd64&distro=ubuntu-24.04

low : CVE--2024--2236

Affected range>=0
Fixed versionNot Fixed
EPSS Score0.588%
EPSS Percentile69th percentile
Description

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

@renovate renovate Bot force-pushed the renovate/major-github-actions branch from 8b24b62 to 958757b Compare February 26, 2026 20:41
@renovate renovate Bot changed the title chore(deps): update hashicorp/setup-terraform action to v4 chore(deps): update github actions (major) Feb 26, 2026
@renovate renovate Bot force-pushed the renovate/major-github-actions branch 3 times, most recently from 9c0ab58 to 326d884 Compare March 5, 2026 10:00
@renovate renovate Bot force-pushed the renovate/major-github-actions branch 2 times, most recently from bf51ddd to 0ece6d6 Compare March 13, 2026 16:56
@renovate renovate Bot force-pushed the renovate/major-github-actions branch 2 times, most recently from 1e8ef5b to a1a22a6 Compare March 26, 2026 16:34
@renovate renovate Bot force-pushed the renovate/major-github-actions branch 2 times, most recently from 099e497 to cb40dcd Compare April 5, 2026 08:51
@renovate renovate Bot force-pushed the renovate/major-github-actions branch from cb40dcd to e177a3c Compare April 10, 2026 22:13
@renovate renovate Bot force-pushed the renovate/major-github-actions branch 3 times, most recently from e652618 to 332efb3 Compare April 21, 2026 22:08
@renovate renovate Bot force-pushed the renovate/major-github-actions branch from 332efb3 to 0418bb9 Compare April 23, 2026 16:09
@sonarqubecloud
Copy link
Copy Markdown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants