chore(deps): refresh rpm lockfiles [SECURITY]#498
Open
red-hat-konflux[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): refresh rpm lockfiles [SECURITY]#498red-hat-konflux[bot] wants to merge 1 commit intomainfrom
red-hat-konflux[bot] wants to merge 1 commit intomainfrom
Conversation
e7f5551 to
7b94f02
Compare
55e7160 to
ee6de9f
Compare
1c1336a to
0aef2c5
Compare
c4cd1a2 to
6cf6fb5
Compare
d4d14d1 to
11a7a6c
Compare
f904b09 to
73598da
Compare
e29da04 to
549a61e
Compare
549a61e to
81dfed9
Compare
50dcd29 to
d5405c9
Compare
524a79b to
388c09b
Compare
36064cd to
a4921da
Compare
da26058 to
082fd04
Compare
b83e6af to
028003f
Compare
028003f to
6150a8b
Compare
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
File bundle-patch/rpms.in.yaml:
2.2.5-17.el8_10->2.5.0-1.el8_103.6.8-70.el8_10->3.6.8-73.el8_103.6.8-70.el8_10->3.6.8-73.el8_10libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat
CVE-2024-8176
More information
Severity
Important
References
expat: integer overflow in the doProlog function
CVE-2022-23990
More information
Severity
Important
References
expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing
CVE-2025-59375
More information
Severity
Important
References
expat: parsing large tokens can trigger a denial of service
CVE-2023-52425
More information
Severity
Important
References
expat: heap-based buffer over-read via crafted XML input
CVE-2019-15903
More information
Severity
Important
References
expat: internal entity expansion
CVE-2013-0340
More information
Severity
Important
References
expat: Integer overflow in defineAttribute in xmlparse.c
CVE-2022-22824
More information
Severity
Important
References
expat: Integer overflow in nextScaffoldPart in xmlparse.c
CVE-2022-22826
More information
Severity
Important
References
expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate
CVE-2022-43680
More information
Severity
Important
References
expat: Integer overflow in storeAtts in xmlparse.c
CVE-2022-22827
More information
Severity
Important
References
expat: XML Entity Expansion
CVE-2024-28757
More information
Severity
Important
References
expat: Integer overflow in copyString()
CVE-2022-25314
More information
Severity
Important
References
expat: Integer overflow in lookup in xmlparse.c
CVE-2022-22825
More information
Severity
Important
References
expat: Integer overflow in addBinding in xmlparse.c
CVE-2022-22822
More information
Severity
Important
References
expat: Integer overflow in build_model in xmlparse.c
CVE-2022-22823
More information
Severity
Important
References
expat: Stack exhaustion in doctype parsing
CVE-2022-25313
More information
Severity
Important
References
expat: Integer overflow in doProlog in xmlparse.c
CVE-2021-46143
More information
Severity
Important
References
expat: large number of colons in input makes parser consume high amount of resources, leading to DoS
CVE-2018-20843
More information
Severity
Important
References
expat: Large number of prefixed XML attributes on a single tag can crash libexpat
CVE-2021-45960
More information
Severity
Important
References
cpython: POP3 command injection in user-controlled commands
CVE-2025-15367
More information
Severity
Moderate
References
cpython: IMAP command injection in user-controlled commands
CVE-2025-15366
More information
Severity
Moderate
References
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
CVE-2025-12084
More information
Severity
Moderate
References
cpython: email header injection due to unquoted newlines
CVE-2026-1299
More information
Severity
Moderate
References
cpython: wsgiref.headers.Headers allows header newline injection in Python
CVE-2026-0865
More information
Severity
Moderate
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.