Skip to content

chore(deps): refresh rpm lockfiles [SECURITY]#19340

Merged
Molter73 merged 1 commit intorelease-4.8from
konflux/mintmaker/release-4.8/lock-file-maintenance-vulnerability
Mar 24, 2026
Merged

chore(deps): refresh rpm lockfiles [SECURITY]#19340
Molter73 merged 1 commit intorelease-4.8from
konflux/mintmaker/release-4.8/lock-file-maintenance-vulnerability

Conversation

@red-hat-konflux
Copy link
Copy Markdown
Contributor

@red-hat-konflux red-hat-konflux bot commented Mar 9, 2026

This PR contains the following updates:

File rpms.in.yaml:

Package Change
postgresql 15.15-1.module+el8.10.0+23782+2d6b2a31 -> 15.17-1.module+el8.10.0+24043+d28c3b3f
postgresql-private-libs 15.15-1.module+el8.10.0+23782+2d6b2a31 -> 15.17-1.module+el8.10.0+24043+d28c3b3f
python3.12 3.12.12-2.el8_10 -> 3.12.12-3.el8_10
python3.12-libs 3.12.12-2.el8_10 -> 3.12.12-3.el8_10
glibc 2.28-251.el8_10.27 -> 2.28-251.el8_10.31
glibc-all-langpacks 2.28-251.el8_10.27 -> 2.28-251.el8_10.31
glibc-common 2.28-251.el8_10.27 -> 2.28-251.el8_10.31
glibc-gconv-extra 2.28-251.el8_10.27 -> 2.28-251.el8_10.31
grub2-common 1:2.02-169.el8_10 -> 1:2.02-170.el8_10.1
grub2-tools 1:2.02-169.el8_10 -> 1:2.02-170.el8_10.1
grub2-tools-minimal 1:2.02-169.el8_10 -> 1:2.02-170.el8_10.1
tzdata 2025c-1.el8 -> 2026a-1.el8

postgresql: libpq: libpq undersizes allocations, via integer wraparound

CVE-2025-12818

More information

Details

A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.

Severity

Moderate

References


postgresql: CREATE STATISTICS does not check for schema CREATE privilege

CVE-2025-12817

More information

Details

A vulnerability has been identified in PostgreSQL’s CREATE STATISTICS command where the database does not check that the user has the required schema CREATE privilege. A table owner user could create a statistics object in any schema, blocking other users who legitimately hold CREATE STATISTICS permissions from creating objects with the same name. This results in a denial-of-service of the statistics creation functionality.

Severity

Moderate

References


cpython: POP3 command injection in user-controlled commands

CVE-2025-15367

More information

Details

A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.

Severity

Moderate

References


cpython: email header injection due to unquoted newlines

CVE-2026-1299

More information

Details

A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.

Severity

Moderate

References


cpython: wsgiref.headers.Headers allows header newline injection in Python

CVE-2026-0865

More information

Details

Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.

Severity

Moderate

References


cpython: IMAP command injection in user-controlled commands

CVE-2025-15366

More information

Details

A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.

Severity

Moderate

References


glibc: glibc: Information disclosure via zero-valued network query

CVE-2026-0915

More information

Details

A flaw was found in glibc, the GNU C Library. When an application calls the getnetbyaddr or getnetbyaddr_r functions to resolve a network address, and the system's nsswitch.conf file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.

Severity

Moderate

References


glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory

CVE-2025-15281

More information

Details

A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested review from a team and rhacs-bot as code owners March 9, 2026 18:57
@github-actions github-actions bot added the backport PR to backport changes from master to release branch label Mar 9, 2026
@rhacs-bot
Copy link
Copy Markdown
Contributor

rhacs-bot commented Mar 9, 2026

Images are ready for the commit at 1be6cbf.

To use with deploy scripts, first export MAIN_IMAGE_TAG=4.8.10-rc.0-5-g1be6cbf5a7.

@codecov
Copy link
Copy Markdown

codecov bot commented Mar 9, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 48.73%. Comparing base (5491abd) to head (1be6cbf).
⚠️ Report is 1 commits behind head on release-4.8.

Additional details and impacted files
@@               Coverage Diff               @@
##           release-4.8   #19340      +/-   ##
===============================================
- Coverage        48.73%   48.73%   -0.01%     
===============================================
  Files             2595     2595              
  Lines           190828   190828              
===============================================
- Hits             93003    92995       -8     
- Misses           90513    90519       +6     
- Partials          7312     7314       +2     
Flag Coverage Δ
go-unit-tests 48.73% <ø> (-0.01%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-4.8/lock-file-maintenance-vulnerability branch 4 times, most recently from 9e525cc to a931e20 Compare March 17, 2026 02:05
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-4.8/lock-file-maintenance-vulnerability branch 5 times, most recently from 943ae14 to 070f226 Compare March 20, 2026 21:50
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-4.8/lock-file-maintenance-vulnerability branch from 070f226 to 1be6cbf Compare March 24, 2026 01:52
@github-actions
Copy link
Copy Markdown
Contributor

/konflux-retest scanner-v4-db-on-push

@github-actions
Copy link
Copy Markdown
Contributor

/konflux-retest operator-bundle-on-push

@Molter73 Molter73 merged commit efa2811 into release-4.8 Mar 24, 2026
110 checks passed
@Molter73 Molter73 deleted the konflux/mintmaker/release-4.8/lock-file-maintenance-vulnerability branch March 24, 2026 09:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport PR to backport changes from master to release branch

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants