chore(deps): refresh rpm lockfiles [SECURITY]#19716
chore(deps): refresh rpm lockfiles [SECURITY]#19716red-hat-konflux[bot] wants to merge 1 commit intorelease-4.10from
Conversation
|
Images are ready for the commit at c357d42. To use with deploy scripts, first |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## release-4.10 #19716 +/- ##
================================================
- Coverage 49.34% 49.34% -0.01%
================================================
Files 2661 2661
Lines 200825 200825
================================================
- Hits 99107 99099 -8
- Misses 94276 94282 +6
- Partials 7442 7444 +2
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
@red-hat-konflux[bot]: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
8bca89e to
c357d42
Compare
This PR contains the following updates:
File rpms.in.yaml:
3.12.12-3.el8_10->3.12.12-4.el8_103.12.12-3.el8_10->3.12.12-4.el8_10cpython: email header injection due to unquoted newlines
CVE-2026-1299
More information
Details
A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.
Severity
Moderate
References
cpython: POP3 command injection in user-controlled commands
CVE-2025-15367
More information
Details
A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.
Severity
Moderate
References
python: Python: Command-line option injection in webbrowser.open() via crafted URLs
CVE-2026-4519
More information
Details
A flaw was found in Python. The
webbrowser.open()API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.Severity
Important
References
cpython: wsgiref.headers.Headers allows header newline injection in Python
CVE-2026-0865
More information
Details
Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.
Severity
Moderate
References
cpython: IMAP command injection in user-controlled commands
CVE-2025-15366
More information
Details
A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.
Severity
Moderate
References
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
CVE-2025-12084
More information
Details
A flaw was found in cpython. This vulnerability allows impacted availability via a quadratic algorithm in
xml.dom.minidommethods, such asappendChild(), when building excessively nested documents due to a dependency on_clear_id_cache()Severity
Moderate
References
cpython: Excessive read buffering DoS in http.client
CVE-2025-13836
More information
Details
A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.
Severity
Moderate
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.