chore(deps): refresh rpm lockfiles [SECURITY]#19567
chore(deps): refresh rpm lockfiles [SECURITY]#19567red-hat-konflux[bot] wants to merge 1 commit intorelease-4.10from
Conversation
|
Images are ready for the commit at 60fec92. To use with deploy scripts, first |
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
60fec92 to
56d2341
Compare
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## release-4.10 #19567 +/- ##
================================================
- Coverage 49.38% 49.38% -0.01%
================================================
Files 2660 2660
Lines 200669 200669
================================================
- Hits 99095 99092 -3
- Misses 94130 94135 +5
+ Partials 7444 7442 -2
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
/konflux-retest operator-bundle-on-push |
|
@red-hat-konflux[bot]: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
This PR contains the following updates:
File rpms.in.yaml:
8.30-16.el8_10->8.30-17.el8_108.30-16.el8_10->8.30-17.el8_107.61.1-34.el8_10.10->7.61.1-34.el8_10.113.6.16-8.el8_10.4->3.6.16-8.el8_10.57.61.1-34.el8_10.10->7.61.1-34.el8_10.113.6.8-73.el8_10->3.6.8-74.el8_103.6.8-73.el8_10->3.6.8-74.el8_10gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
CVE-2025-14831
More information
Details
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
Severity
Moderate
References
gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function
CVE-2025-9820
More information
Details
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
Severity
Moderate
References
python: cpython: URL parser allowed square brackets in domain names
CVE-2025-0938
More information
Details
A flaw was found in Python. The Python standard library functions
urllib.parse.urlsplitandurlparseaccept domain names that included square brackets, which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.Severity
Moderate
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.