chore(deps): refresh rpm lockfiles [SECURITY]#2896
Merged
red-hat-konflux[bot] merged 2 commits intorelease-3.23from Feb 11, 2026
Merged
Conversation
rhacs-bot
approved these changes
Feb 10, 2026
Contributor
rhacs-bot
left a comment
There was a problem hiding this comment.
Auto-approved by automation.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## release-3.23 #2896 +/- ##
=============================================
Coverage 27.61% 27.61%
=============================================
Files 96 96
Lines 5424 5424
Branches 2523 2523
=============================================
Hits 1498 1498
Misses 3214 3214
Partials 712 712
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
|
/retest collector-on-push |
fe04cd4 to
7ea591c
Compare
|
/retest collector-on-push |
1 similar comment
|
/retest collector-on-push |
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
7ea591c to
7a1cf02
Compare
Contributor
Author
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
File rpms.in.yaml:
14.2.1-10.el8_10->14.2.1-11.el8_1014.2.1-10.el8_10->14.2.1-11.el8_1014.2.1-10.el8_10->14.2.1-11.el8_103.12.12-1.el8_10->3.12.12-2.el8_103.12.12-1.el8_10->3.12.12-2.el8_101.0.6-3.el8->1.0.6-4.el8_102.9-10.el8_10->2.9-11.el8_102.9-10.el8_10->2.9-11.el8_102.9-10.el8_10->2.9-11.el8_102.9-10.el8_10->2.9-11.el8_102:2.29.0-3.el8_10.3->2:2.29.0-3.el8_10.42:2.29.0-3.el8_10.3->2:2.29.0-3.el8_10.42:2.29.0-3.el8_10.3->2:2.29.0-3.el8_10.4cpython: python: Python zipfile End of Central Directory (EOCD) Locator record offset not checked
CVE-2025-8291
More information
Details
The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.
Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.
Severity
Moderate
References
cpython: Excessive read buffering DoS in http.client
CVE-2025-13836
More information
Details
A flaw was found in the http.client module in the Python standard library. When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This issue allows a malicious server to cause the client to read large amounts of data into memory, potentially causing memory allocations errors, swapping, out-of-memory conditions or even system freezes.
Severity
Moderate
References
Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS
CVE-2025-6176
More information
Details
Scrapy are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
Severity
Important
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.