Bug 2412590 - CVE-2025-58183 kubernetes1.34: Unbounded allocation when parsing GNU sparse map [fedora-43]
Summary: CVE-2025-58183 kubernetes1.34: Unbounded allocation when parsing GNU sparse m...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: kubernetes1.34
Version: 43
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Brad Smith
QA Contact:
URL:
Whiteboard: {"flaws": ["a7808f86-b817-420a-a332-b...
Depends On:
Blocks: CVE-2025-58183
TreeView+ depends on / blocked
 
Reported: 2025-11-05 14:35 UTC by Guilherme de Almeida Suckevicz
Modified: 2025-11-17 01:55 UTC (History)
2 users (show)

Fixed In Version: kubernetes1.34-1.34.2-1.fc44
Clone Of:
Environment:
Last Closed: 2025-11-15 01:23:13 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2025-11-05 14:35:17 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

Comment 1 Fedora Update System 2025-11-15 01:12:33 UTC
FEDORA-2025-eeedae8757 (kubernetes1.34-1.34.2-1.fc44) has been submitted as an update to Fedora 44.
https://bodhi.fedoraproject.org/updates/FEDORA-2025-eeedae8757

Comment 2 Fedora Update System 2025-11-15 01:23:13 UTC
FEDORA-2025-eeedae8757 (kubernetes1.34-1.34.2-1.fc44) has been pushed to the Fedora 44 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 3 Fedora Update System 2025-11-15 15:26:58 UTC
FEDORA-2025-f32b1debd8 (kubernetes1.34-1.34.2-1.fc43) has been submitted as an update to Fedora 43.
https://bodhi.fedoraproject.org/updates/FEDORA-2025-f32b1debd8

Comment 4 Fedora Update System 2025-11-15 16:02:07 UTC
FEDORA-2025-4c576d1bd9 (kubernetes1.34-1.34.2-1.fc42) has been submitted as an update to Fedora 42.
https://bodhi.fedoraproject.org/updates/FEDORA-2025-4c576d1bd9

Comment 5 Fedora Update System 2025-11-15 16:33:09 UTC
FEDORA-2025-ebce31df24 (kubernetes1.34-1.34.2-1.fc41) has been submitted as an update to Fedora 41.
https://bodhi.fedoraproject.org/updates/FEDORA-2025-ebce31df24

Comment 6 Fedora Update System 2025-11-16 01:40:33 UTC
FEDORA-2025-f32b1debd8 has been pushed to the Fedora 43 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-f32b1debd8`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-f32b1debd8

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 7 Fedora Update System 2025-11-17 01:22:28 UTC
FEDORA-2025-4c576d1bd9 has been pushed to the Fedora 42 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-4c576d1bd9`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-4c576d1bd9

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 8 Fedora Update System 2025-11-17 01:55:12 UTC
FEDORA-2025-ebce31df24 has been pushed to the Fedora 41 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2025-ebce31df24`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2025-ebce31df24

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.


Note You need to log in before you can comment on or make changes to this bug.