Skip to content

Conversation

@konflux-internal-p02
Copy link
Contributor

@konflux-internal-p02 konflux-internal-p02 bot commented Sep 10, 2025

This PR contains the following updates:

File rpms.in.yaml:

Package Change
brotli 1.0.6-3.el8 -> 1.0.6-4.el8_10
coreutils 8.30-15.el8 -> 8.30-16.el8_10
coreutils-common 8.30-15.el8 -> 8.30-16.el8_10
curl 7.61.1-34.el8_10.8 -> 7.61.1-34.el8_10.9
device-mapper 8:1.02.181-15.el8_10.2 -> 8:1.02.181-15.el8_10.3
device-mapper-libs 8:1.02.181-15.el8_10.2 -> 8:1.02.181-15.el8_10.3
dracut 049-237.git20250603.el8_10 -> 049-239.git20251127.el8_10
findutils 1:4.6.0-23.el8_10 -> 1:4.6.0-24.el8_10
glib2 2.56.4-167.el8_10 -> 2.56.4-168.el8_10
glibc 2.28-251.el8_10.25 -> 2.28-251.el8_10.27
glibc-all-langpacks 2.28-251.el8_10.25 -> 2.28-251.el8_10.27
glibc-common 2.28-251.el8_10.25 -> 2.28-251.el8_10.27
glibc-gconv-extra 2.28-251.el8_10.25 -> 2.28-251.el8_10.27
libblkid 2.32.1-46.el8 -> 2.32.1-48.el8_10
libcurl 7.61.1-34.el8_10.8 -> 7.61.1-34.el8_10.9
libfdisk 2.32.1-46.el8 -> 2.32.1-48.el8_10
libmount 2.32.1-46.el8 -> 2.32.1-48.el8_10
libselinux 2.9-10.el8_10 -> 2.9-11.el8_10
libsmartcols 2.32.1-46.el8 -> 2.32.1-48.el8_10
libuuid 2.32.1-46.el8 -> 2.32.1-48.el8_10
openssl 1:1.1.1k-14.el8_6 -> 1:1.1.1k-14.el8_10
openssl-libs 1:1.1.1k-14.el8_6 -> 1:1.1.1k-14.el8_10
os-prober 1.74-9.el8 -> 1.74-11.el8_10
pam 1.3.1-38.el8_10 -> 1.3.1-39.el8_10
platform-python 3.6.8-71.el8_10 -> 3.6.8-73.el8_10
python3-libs 3.6.8-71.el8_10 -> 3.6.8-73.el8_10
shadow-utils 2:4.6-22.el8 -> 2:4.6-23.el8_10
systemd 239-82.el8_10.8 -> 239-82.el8_10.13
systemd-libs 239-82.el8_10.8 -> 239-82.el8_10.13
systemd-pam 239-82.el8_10.8 -> 239-82.el8_10.13
systemd-udev 239-82.el8_10.8 -> 239-82.el8_10.13
tzdata 2025b-1.el8 -> 2025c-1.el8
util-linux 2.32.1-46.el8 -> 2.32.1-48.el8_10
s390utils-base 2:2.29.0-3.el8_10.3 -> 2:2.29.0-3.el8_10.4
s390utils-core 2:2.29.0-3.el8_10.3 -> 2:2.29.0-3.el8_10.4
s390utils-se-data 2:2.29.0-3.el8_10.3 -> 2:2.29.0-3.el8_10.4

Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS

CVE-2025-6176

More information

Details

Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

Severity

Important

References


curl: libcurl: Curl out of bounds read for cookie path

CVE-2025-9086

More information

Details

  1. A cookie is set using the secure keyword for https://target
  2. curl is redirected to or otherwise made to speak with http://target (same
    hostname, but using clear text HTTP) using the same cookie set
  3. The same cookie name is set - but with just a slash as path (path=\"/\",).
    Since this site is not secure, the cookie should just be ignored.
  4. A bug in the path comparison logic makes curl read outside a heap buffer
    boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.

Severity

Moderate

References


glib: Integer overflow in in g_escape_uri_string()

CVE-2025-13601

More information

Details

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

Severity

Moderate

References


util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

CVE-2025-14104

More information

Details

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

Severity

Moderate

References


cpython: POP3 command injection in user-controlled commands

CVE-2025-15367

More information

Details

A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.

Severity

Moderate

References


cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service

CVE-2025-12084

More information

Details

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Severity

Moderate

References


cpython: IMAP command injection in user-controlled commands

CVE-2025-15366

More information

Details

A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.

Severity

Moderate

References


cpython: wsgiref.headers.Headers allows header newline injection in Python

CVE-2026-0865

More information

Details

User-controlled header names and values containing newlines can allow injecting HTTP headers.

Severity

Moderate

References


cpython: email header injection due to unquoted newlines

CVE-2026-1299

More information

Details

A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 3 times, most recently from 7bf9b96 to 450aa1d Compare September 16, 2025 08:07
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 7 times, most recently from 040bd5d to 09e08a4 Compare September 29, 2025 04:13
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 3 times, most recently from d1913a8 to 1aba844 Compare October 1, 2025 16:09
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 5 times, most recently from 60d49fd to baf37dd Compare October 13, 2025 16:08
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 4 times, most recently from d6c0b10 to 255e99c Compare October 20, 2025 04:07
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 6 times, most recently from 9ebc1c2 to 0f6e911 Compare October 29, 2025 12:09
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 2 times, most recently from 5bb9c85 to 47b63d6 Compare October 30, 2025 08:07
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 6 times, most recently from ec15a92 to b7ef9ed Compare January 21, 2026 12:13
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 11 times, most recently from 24ee107 to 1052af4 Compare January 29, 2026 00:13
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 6 times, most recently from b65a550 to 684eb28 Compare February 5, 2026 12:13
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch 5 times, most recently from 6810314 to 8ed968c Compare February 10, 2026 12:19
Signed-off-by: konflux-internal-p02 <170854209+konflux-internal-p02[bot]@users.noreply.github.com>
@konflux-internal-p02 konflux-internal-p02 bot force-pushed the konflux/mintmaker/release-5.3/lock-file-maintenance-vulnerability branch from 8ed968c to 4442efa Compare February 10, 2026 16:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants