Skip to content

chore(deps): refresh rpm lockfiles [SECURITY]#2858

Open
red-hat-konflux[bot] wants to merge 1 commit intorelease-3.24from
konflux/mintmaker/release-3.24/lock-file-maintenance-vulnerability
Open

chore(deps): refresh rpm lockfiles [SECURITY]#2858
red-hat-konflux[bot] wants to merge 1 commit intorelease-3.24from
konflux/mintmaker/release-3.24/lock-file-maintenance-vulnerability

Conversation

@red-hat-konflux
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Feb 3, 2026

This PR contains the following updates:

File rpms.in.yaml:

Package Change
kernel-headers 4.18.0-553.97.1.el8_10 -> 4.18.0-553.100.1.el8_10
libblkid 2.32.1-47.el8_10 -> 2.32.1-48.el8_10
libfdisk 2.32.1-47.el8_10 -> 2.32.1-48.el8_10
libmount 2.32.1-47.el8_10 -> 2.32.1-48.el8_10
libsmartcols 2.32.1-47.el8_10 -> 2.32.1-48.el8_10
libuuid 2.32.1-47.el8_10 -> 2.32.1-48.el8_10
libuuid-devel 2.32.1-47.el8_10 -> 2.32.1-48.el8_10
platform-python 3.6.8-71.el8_10 -> 3.6.8-73.el8_10
python3-libs 3.6.8-71.el8_10 -> 3.6.8-73.el8_10
util-linux 2.32.1-47.el8_10 -> 2.32.1-48.el8_10

util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

CVE-2025-14104

More information

Details

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

Severity

Moderate

References


cpython: IMAP command injection in user-controlled commands

CVE-2025-15366

More information

Details

A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.

Severity

Moderate

References


cpython: wsgiref.headers.Headers allows header newline injection in Python

CVE-2026-0865

More information

Details

User-controlled header names and values containing newlines can allow injecting HTTP headers.

Severity

Moderate

References


cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service

CVE-2025-12084

More information

Details

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Severity

Moderate

References


cpython: POP3 command injection in user-controlled commands

CVE-2025-15367

More information

Details

A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.

Severity

Moderate

References


cpython: email header injection due to unquoted newlines

CVE-2026-1299

More information

Details

A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested review from a team and rhacs-bot as code owners February 3, 2026 20:58
Copy link
Contributor

@rhacs-bot rhacs-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved by automation.

@codecov-commenter
Copy link

codecov-commenter commented Feb 3, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 27.38%. Comparing base (6b73eed) to head (bcfd26c).
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@              Coverage Diff              @@
##           release-3.24    #2858   +/-   ##
=============================================
  Coverage         27.38%   27.38%           
=============================================
  Files                95       95           
  Lines              5427     5427           
  Branches           2548     2548           
=============================================
  Hits               1486     1486           
  Misses             3214     3214           
  Partials            727      727           
Flag Coverage Δ
collector-unit-tests 27.38% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.24/lock-file-maintenance-vulnerability branch 8 times, most recently from 204a1f0 to 7a4d5ad Compare February 5, 2026 17:55
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-3.24/lock-file-maintenance-vulnerability branch from 7a4d5ad to bcfd26c Compare February 6, 2026 09:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants