Skip to content

chore(deps): refresh rpm lockfiles [SECURITY]#19716

Open
red-hat-konflux[bot] wants to merge 1 commit intorelease-4.10from
konflux/mintmaker/release-4.10/lock-file-maintenance-vulnerability
Open

chore(deps): refresh rpm lockfiles [SECURITY]#19716
red-hat-konflux[bot] wants to merge 1 commit intorelease-4.10from
konflux/mintmaker/release-4.10/lock-file-maintenance-vulnerability

Conversation

@red-hat-konflux
Copy link
Copy Markdown
Contributor

@red-hat-konflux red-hat-konflux bot commented Mar 31, 2026

This PR contains the following updates:

File rpms.in.yaml:

Package Change
python3.12 3.12.12-3.el8_10 -> 3.12.12-4.el8_10
python3.12-libs 3.12.12-3.el8_10 -> 3.12.12-4.el8_10

cpython: email header injection due to unquoted newlines

CVE-2026-1299

More information

Details

A flaw was found in the email module in the Python standard library. When serializing an email message, the BytesGenerator class fails to properly quote newline characters for email headers. This issue is exploitable when the LiteralHeader class is used as it does not respect email folding rules, allowing an attacker to inject email headers and potentially modify message recipients or the email body, and spoof sender information.

Severity

Moderate

References


cpython: POP3 command injection in user-controlled commands

CVE-2025-15367

More information

Details

A flaw was found in the poplib module in the Python standard library. The poplib module does not reject control characters, such as newlines, in user-controlled input passed to POP3 commands. This issue allows an attacker to inject additional commands to be executed in the POP3 server.

Severity

Moderate

References


python: Python: Command-line option injection in webbrowser.open() via crafted URLs

CVE-2026-4519

More information

Details

A flaw was found in Python. The webbrowser.open() API, used to launch web browsers, does not properly sanitize input. This allows a remote attacker to craft a malicious URL containing leading dashes. When such a URL is opened, certain web browsers may interpret these dashes as command-line options, which could lead to unexpected behavior, information disclosure, or potentially arbitrary code execution, impacting the integrity of the system.

Severity

Important

References


cpython: wsgiref.headers.Headers allows header newline injection in Python

CVE-2026-0865

More information

Details

Missing newline filtering has been discovered in Python. User-controlled header names and values containing newlines can allow injecting HTTP headers.

Severity

Moderate

References


cpython: IMAP command injection in user-controlled commands

CVE-2025-15366

More information

Details

A flaw was found in the imaplib module in the Python standard library. The imaplib module does not reject control characters, such as newlines, in user-controlled input passed to IMAP commands. This issue allows an attacker to inject additional commands to be executed in the IMAP server.

Severity

Moderate

References


cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service

CVE-2025-12084

More information

Details

A flaw was found in cpython. This vulnerability allows impacted availability via a quadratic algorithm in xml.dom.minidom methods, such as appendChild(), when building excessively nested documents due to a dependency on _clear_id_cache()

Severity

Moderate

References


cpython: Excessive read buffering DoS in http.client

CVE-2025-13836

More information

Details

A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.

Severity

Moderate

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested review from a team and rhacs-bot as code owners March 31, 2026 17:50
@github-actions github-actions bot added the backport PR to backport changes from master to release branch label Mar 31, 2026
@rhacs-bot
Copy link
Copy Markdown
Contributor

rhacs-bot commented Mar 31, 2026

Images are ready for the commit at c357d42.

To use with deploy scripts, first export MAIN_IMAGE_TAG=4.10.1-rc.0-23-gc357d42091.

@codecov
Copy link
Copy Markdown

codecov bot commented Mar 31, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 49.34%. Comparing base (9114502) to head (c357d42).
⚠️ Report is 1 commits behind head on release-4.10.

Additional details and impacted files
@@               Coverage Diff                @@
##           release-4.10   #19716      +/-   ##
================================================
- Coverage         49.34%   49.34%   -0.01%     
================================================
  Files              2661     2661              
  Lines            200825   200825              
================================================
- Hits              99107    99099       -8     
- Misses            94276    94282       +6     
- Partials           7442     7444       +2     
Flag Coverage Δ
go-unit-tests 49.34% <ø> (-0.01%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@openshift-ci
Copy link
Copy Markdown

openshift-ci bot commented Mar 31, 2026

@red-hat-konflux[bot]: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/gke-nongroovy-compatibility-tests 8bca89e link false /test gke-nongroovy-compatibility-tests

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/release-4.10/lock-file-maintenance-vulnerability branch from 8bca89e to c357d42 Compare March 31, 2026 22:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport PR to backport changes from master to release branch

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant