Skip to content

Conversation

@red-hat-konflux
Copy link
Contributor

@red-hat-konflux red-hat-konflux bot commented Feb 5, 2026

This PR contains the following updates:

File rpms.in.yaml:

Package Change
gcc-toolset-14-binutils 2.41-4.el8_10 -> 2.41-4.el8_10.1
gcc-toolset-14-gcc 14.2.1-10.el8_10 -> 14.2.1-11.el8_10
gcc-toolset-14-gcc-c++ 14.2.1-10.el8_10 -> 14.2.1-11.el8_10
gcc-toolset-14-libstdc++-devel 14.2.1-10.el8_10 -> 14.2.1-11.el8_10
python3.12 3.12.12-1.el8_10 -> 3.12.12-2.el8_10
python3.12-libs 3.12.12-1.el8_10 -> 3.12.12-2.el8_10
brotli 1.0.6-3.el8 -> 1.0.6-4.el8_10
libselinux 2.9-10.el8_10 -> 2.9-11.el8_10
libselinux-devel 2.9-10.el8_10 -> 2.9-11.el8_10
libselinux-utils 2.9-10.el8_10 -> 2.9-11.el8_10
python3-libselinux 2.9-10.el8_10 -> 2.9-11.el8_10
s390utils-base 2:2.29.0-3.el8_10.3 -> 2:2.29.0-3.el8_10.4
s390utils-core 2:2.29.0-3.el8_10.3 -> 2:2.29.0-3.el8_10.4
s390utils-se-data 2:2.29.0-3.el8_10.3 -> 2:2.29.0-3.el8_10.4

cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked

CVE-2025-8291

More information

Details

The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.

Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.

Severity

Moderate

References


cpython: Excessive read buffering DoS in http.client

CVE-2025-13836

More information

Details

A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.

Severity

Moderate

References


Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS

CVE-2025-6176

More information

Details

Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.

Severity

Important

References

🔧 This Pull Request updates lock files to use the latest dependency versions.


Configuration

📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

To execute skipped test pipelines write comment /ok-to-test.


Documentation

Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.

@red-hat-konflux red-hat-konflux bot requested a review from rhacs-bot as a code owner February 5, 2026 21:01
@red-hat-konflux red-hat-konflux bot added build-builder-image rebuild-test-container Rebuild the collector-tests container. labels Feb 5, 2026
@red-hat-konflux red-hat-konflux bot requested review from a team as code owners February 5, 2026 21:01
Copy link
Contributor

@rhacs-bot rhacs-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved by automation.

@codecov-commenter
Copy link

codecov-commenter commented Feb 5, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 27.38%. Comparing base (b7bc5d4) to head (2860bd3).
✅ All tests successful. No failed tests found.

Additional details and impacted files
@@           Coverage Diff           @@
##           master    #2873   +/-   ##
=======================================
  Coverage   27.38%   27.38%           
=======================================
  Files          95       95           
  Lines        5427     5427           
  Branches     2548     2548           
=======================================
  Hits         1486     1486           
  Misses       3214     3214           
  Partials      727      727           
Flag Coverage Δ
collector-unit-tests 27.38% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 219295e to ba53401 Compare February 6, 2026 09:05
@red-hat-konflux red-hat-konflux bot enabled auto-merge (squash) February 10, 2026 13:09
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch 2 times, most recently from 686ca34 to 6bc5661 Compare February 10, 2026 21:06
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
@red-hat-konflux red-hat-konflux bot force-pushed the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch from 6bc5661 to 2860bd3 Compare February 12, 2026 09:15
@red-hat-konflux red-hat-konflux bot merged commit b065750 into master Feb 12, 2026
73 checks passed
@red-hat-konflux red-hat-konflux bot deleted the konflux/mintmaker/master/lock-file-maintenance-vulnerability branch February 12, 2026 10:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants