Skip to content

chore(deps): refresh rpm lockfiles [SECURITY]#2932

Merged
red-hat-konflux[bot] merged 1 commit intomasterfrom
konflux/mintmaker/master/lock-file-maintenance-vulnerability
Feb 18, 2026
Merged

chore(deps): refresh rpm lockfiles [SECURITY]#2932
red-hat-konflux[bot] merged 1 commit intomasterfrom
konflux/mintmaker/master/lock-file-maintenance-vulnerability

Conversation

@red-hat-konflux
Copy link
Contributor

This PR contains the following updates:

File rpms.in.yaml:

Package Change
cmake 3.26.5-2.el9 -> 3.26.5-3.el9_7
cmake-data 3.26.5-2.el9 -> 3.26.5-3.el9_7
cmake-filesystem 3.26.5-2.el9 -> 3.26.5-3.el9_7
glibc-devel 2.34-231.el9_7.2 -> 2.34-231.el9_7.10
kernel-headers 5.14.0-611.26.1.el9_7 -> 5.14.0-611.34.1.el9_7
libcurl-devel 7.76.1-34.el9 -> 7.76.1-35.el9_7.3
libuuid-devel 2.37.4-21.el9 -> 2.37.4-21.el9_7
openssl-devel 1:3.5.1-5.el9_7 -> 1:3.5.1-7.el9_7
python-unversioned-command 3.9.25-2.el9_7 -> 3.9.25-3.el9_7
curl 7.76.1-34.el9 -> 7.76.1-35.el9_7.3
glibc 2.34-231.el9_7.2 -> 2.34-231.el9_7.10
glibc-common 2.34-231.el9_7.2 -> 2.34-231.el9_7.10
glibc-gconv-extra 2.34-231.el9_7.2 -> 2.34-231.el9_7.10
glibc-minimal-langpack 2.34-231.el9_7.2 -> 2.34-231.el9_7.10
libblkid 2.37.4-21.el9 -> 2.37.4-21.el9_7
libbrotli 1.0.9-7.el9_5 -> 1.0.9-9.el9_7
libcurl 7.76.1-34.el9 -> 7.76.1-35.el9_7.3
libfdisk 2.37.4-21.el9 -> 2.37.4-21.el9_7
libmount 2.37.4-21.el9 -> 2.37.4-21.el9_7
libsmartcols 2.37.4-21.el9 -> 2.37.4-21.el9_7
libuuid 2.37.4-21.el9 -> 2.37.4-21.el9_7
openssl 1:3.5.1-5.el9_7 -> 1:3.5.1-7.el9_7
openssl-libs 1:3.5.1-5.el9_7 -> 1:3.5.1-7.el9_7
python3 3.9.25-2.el9_7 -> 3.9.25-3.el9_7
python3-libs 3.9.25-2.el9_7 -> 3.9.25-3.el9_7
util-linux 2.37.4-21.el9 -> 2.37.4-21.el9_7
util-linux-core 2.37.4-21.el9 -> 2.37.4-21.el9_7
glibc-headers 2.34-231.el9_7.2 -> 2.34-231.el9_7.10

glibc: Integer overflow in memalign leads to heap corruption

CVE-2026-0861

More information

Details

A flaw was found in the glibc library. Passing an excessively large alignment value to the memalign suite of functions, such as memalign, posix_memalign, aligned_alloc, valloc and pvalloc, an integer overflow can occur during internal size calculations due to improper overflow checks, causing an allocation of a small chunk of memory which is subsequently used for writing. This issue can result in an application crash or heap memory corruption.

Severity

Moderate

References


glibc: glibc: Information disclosure via zero-valued network query

CVE-2026-0915

More information

Details

A flaw was found in glibc, the GNU C Library. When an application calls the getnetbyaddr or getnetbyaddr_r functions to resolve a network address, and the system's nsswitch.conf file is configured to use a DNS (Domain Name System) backend for network lookups, a query for a zero-valued network can lead to the disclosure of stack memory contents. This information is leaked to the configured DNS resolver, potentially allowing an attacker who controls the resolver to gain sensitive data from the affected system.

Severity

Moderate

References


glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory

CVE-2025-15281

More information

Details

A flaw was found in glibc. When the wordexp function is called with the flags WRDE_REUSE and WRDE_APPEND, it may return uninitialized memory. If the caller inspects the we_wordv array or calls the wordfree function to free the allocated memory, the process will abort, resulting in a denial of service.

Severity

Moderate

References


curl: libcurl: Curl out of bounds read for cookie path

CVE-2025-9086

More information

Details

  1. A cookie is set using the secure keyword for https://target
  2. curl is redirected to or otherwise made to speak with http://target (same
    hostname, but using clear text HTTP) using the same cookie set
  3. The same cookie name is set - but with just a slash as path (path=\"/\",).
    Since this site is not secure, the cookie should just be ignored.
  4. A bug in the path comparison logic makes curl read outside a heap buffer
    boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.

Severity

Moderate

References


util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames

CVE-2025-14104

More information

Details

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the setpwnam() function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

Severity

Moderate

References


cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service

CVE-2025-12084

More information

Details

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Severity

Moderate

References


Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS

CVE-2025-6176

More information

Details

Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

Severity

Important

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot requested review from a team and rhacs-bot as code owners February 18, 2026 01:20
@red-hat-konflux red-hat-konflux bot enabled auto-merge (squash) February 18, 2026 01:20
Copy link
Contributor

@rhacs-bot rhacs-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved by automation.

Copy link
Contributor

@rhacs-bot rhacs-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved by automation.

@github-actions
Copy link

/retest collector-on-push

@codecov-commenter
Copy link

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 27.38%. Comparing base (936a959) to head (a0e80d5).
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #2932   +/-   ##
=======================================
  Coverage   27.38%   27.38%           
=======================================
  Files          95       95           
  Lines        5427     5427           
  Branches     2548     2548           
=======================================
  Hits         1486     1486           
  Misses       3214     3214           
  Partials      727      727           
Flag Coverage Δ
collector-unit-tests 27.38% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@red-hat-konflux red-hat-konflux bot merged commit 28620db into master Feb 18, 2026
94 of 95 checks passed
@red-hat-konflux red-hat-konflux bot deleted the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch February 18, 2026 03:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants