chore(deps): refresh rpm lockfiles [SECURITY]#19340
Merged
Molter73 merged 1 commit intorelease-4.8from Mar 24, 2026
Merged
Conversation
Contributor
|
Images are ready for the commit at 1be6cbf. To use with deploy scripts, first |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## release-4.8 #19340 +/- ##
===============================================
- Coverage 48.73% 48.73% -0.01%
===============================================
Files 2595 2595
Lines 190828 190828
===============================================
- Hits 93003 92995 -8
- Misses 90513 90519 +6
- Partials 7312 7314 +2
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
9e525cc to
a931e20
Compare
943ae14 to
070f226
Compare
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
070f226 to
1be6cbf
Compare
Contributor
|
/konflux-retest scanner-v4-db-on-push |
Contributor
|
/konflux-retest operator-bundle-on-push |
Molter73
approved these changes
Mar 24, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
File rpms.in.yaml:
15.15-1.module+el8.10.0+23782+2d6b2a31->15.17-1.module+el8.10.0+24043+d28c3b3f15.15-1.module+el8.10.0+23782+2d6b2a31->15.17-1.module+el8.10.0+24043+d28c3b3f3.12.12-2.el8_10->3.12.12-3.el8_103.12.12-2.el8_10->3.12.12-3.el8_102.28-251.el8_10.27->2.28-251.el8_10.312.28-251.el8_10.27->2.28-251.el8_10.312.28-251.el8_10.27->2.28-251.el8_10.312.28-251.el8_10.27->2.28-251.el8_10.311:2.02-169.el8_10->1:2.02-170.el8_10.11:2.02-169.el8_10->1:2.02-170.el8_10.11:2.02-169.el8_10->1:2.02-170.el8_10.12025c-1.el8->2026a-1.el8postgresql: libpq: libpq undersizes allocations, via integer wraparound
CVE-2025-12818
More information
Details
A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.
Severity
Moderate
References
postgresql: CREATE STATISTICS does not check for schema CREATE privilege
CVE-2025-12817
More information
Details
A vulnerability has been identified in PostgreSQL’s CREATE STATISTICS command where the database does not check that the user has the required schema CREATE privilege. A table owner user could create a statistics object in any schema, blocking other users who legitimately hold CREATE STATISTICS permissions from creating objects with the same name. This results in a denial-of-service of the statistics creation functionality.
Severity
Moderate
References
cpython: POP3 command injection in user-controlled commands
CVE-2025-15367
More information
Details
A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.
Severity
Moderate
References
cpython: email header injection due to unquoted newlines
CVE-2026-1299
More information
Details
A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.
Severity
Moderate
References
cpython: wsgiref.headers.Headers allows header newline injection in Python
CVE-2026-0865
More information
Details
Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.
Severity
Moderate
References
cpython: IMAP command injection in user-controlled commands
CVE-2025-15366
More information
Details
A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.
Severity
Moderate
References
glibc: glibc: Information disclosure via zero-valued network query
CVE-2026-0915
More information
Details
A flaw was found in glibc, the GNU C Library. When an application calls the
getnetbyaddrorgetnetbyaddr_rfunctions to resolve a network address, and the system'snsswitch.conffile is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.Severity
Moderate
References
glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
CVE-2025-15281
More information
Details
A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.
Severity
Moderate
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.