chore(deps): refresh rpm lockfiles [SECURITY]#3374
Merged
red-hat-konflux[bot] merged 1 commit intoMay 20, 2026
Merged
Conversation
rhacs-bot
approved these changes
May 19, 2026
Contributor
rhacs-bot
left a comment
There was a problem hiding this comment.
Auto-approved by automation.
rhacs-bot
approved these changes
May 19, 2026
Contributor
rhacs-bot
left a comment
There was a problem hiding this comment.
Auto-approved by automation.
Signed-off-by: red-hat-konflux <126015336+red-hat-konflux[bot]@users.noreply.github.com>
7cb1a46 to
2375423
Compare
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #3374 +/- ##
=======================================
Coverage 27.34% 27.34%
=======================================
Files 95 95
Lines 5420 5420
Branches 2545 2545
=======================================
Hits 1482 1482
Misses 3211 3211
Partials 727 727
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
File rpms.in.yaml:
20.1.8-3.el9->21.1.8-2.el920.1.8-3.el9->21.1.8-2.el920.1.8-3.el9->21.1.8-2.el93.26.5-3.el9_7->3.31.8-3.el93.26.5-3.el9_7->3.31.8-3.el93.26.5-3.el9_7->3.31.8-3.el920.1.8-3.el9->21.1.8-2.el911.5.0-11.el9->11.5.0-14.el90.193-1.el9->0.194-1.el911.5.0-11.el9->11.5.0-14.el911.5.0-11.el9->11.5.0-14.el92.47.3-1.el9_6->2.52.0-1.el92.47.3-1.el9_6->2.52.0-1.el92.47.3-1.el9_6->2.52.0-1.el92.34-231.el9_7.10->2.34-266.el9_85.14.0-611.55.1.el9_7->5.14.0-687.10.1.el9_811.5.0-11.el9->11.5.0-14.el97.76.1-35.el9_7.3->7.76.1-40.el920.1.8-3.el9->21.1.8-2.el920.1.8-3.el9->21.1.8-2.el911.5.0-11.el9->11.5.0-14.el911.5.0-11.el9->11.5.0-14.el92.37.4-21.el9_7->2.37.4-25.el920.1.8-3.el9->21.1.8-2.el920.1.8-3.el9->21.1.8-2.el920.1.8-3.el9->21.1.8-2.el91:3.5.1-7.el9_7->1:3.5.5-2.el9_82.47.3-1.el9_6->2.52.0-1.el93.6-3.el9->3.6-5.el93.9.25-3.el9_7.3->3.9.25-7.el9_83.1.5-7.el9->3.1.5-8.el93.6-3.el9->3.6-5.el95.3-3.el9->5.4-4.el95.3-3.el9->5.4-4.el93.1.5-7.el9->3.1.5-8.el92.35.2-67.el9_7.1->2.35.2-72.el92.35.2-67.el9_7.1->2.35.2-72.el91.0.8-10.el9_5->1.0.8-11.el98.32-39.el9->8.32-40.el98.32-39.el9->8.32-40.el92.9.6-27.el9->2.9.6-28.el92.9.6-27.el9->2.9.6-28.el920250905-1.git377cc42.el9_7->20260224-1.gitea0f072.el9_820250905-1.git377cc42.el9_7->20260224-1.gitea0f072.el9_87.76.1-35.el9_7.3->7.76.1-40.el90.193-1.el9->0.194-1.el90.193-1.el9->0.194-1.el90.193-1.el9->0.194-1.el90.193-1.el9->0.194-1.el92.5.0-5.el9_7.1->2.5.0-6.el92.34-231.el9_7.10->2.34-266.el9_82.34-231.el9_7.10->2.34-266.el9_82.34-231.el9_7.10->2.34-266.el9_82.34-231.el9_7.10->2.34-266.el9_83.8.3-10.el9_7->3.8.10-3.el91.21.1-9.el9_7->1.21.1-10.el9_811.5.0-11.el9->11.5.0-14.el92.37.4-21.el9_7->2.37.4-25.el92.48-10.el9_7.1->2.48-10.el9_8.17.76.1-35.el9_7.3->7.76.1-40.el90.4.1-4.el9->0.4.1-5.el93.1-38.20210216cvs.el9->3.1-39.20210216cvs.el92.37.4-21.el9_7->2.37.4-25.el911.5.0-11.el9->11.5.0-14.el911.5.0-11.el9->11.5.0-14.el92.37.4-21.el9_7->2.37.4-25.el91.43.0-6.el9_7.1->1.43.0-6.el9_8.12.37.4-21.el9_7->2.37.4-25.el911.5.0-11.el9->11.5.0-14.el92.37.4-21.el9_7->2.37.4-25.el94.1.0-7.el9->4.1.0-10.el98.7p1-49.el9_7->9.9p1-7.el9_88.7p1-49.el9_7->9.9p1-7.el9_81:3.5.1-7.el9_7->1:3.5.5-2.el9_81:3.5.1-7.el9_7->1:3.5.5-2.el9_80.25.3-3.el9_5->0.26.2-1.el90.25.3-3.el9_5->0.26.2-1.el91.5.1-26.el9_6->1.5.1-28.el93.6-3.el9->3.6-5.el93.9.25-3.el9_7.3->3.9.25-7.el9_83.9.25-3.el9_7.3->3.9.25-7.el9_89.7-0.10.el9->9.8-1.0.el99.7-0.10.el9->9.8-1.0.el94.16.1.3-39.el9->4.16.1.3-40.el94.16.1.3-39.el9->4.16.1.3-40.el94.8-9.el9->4.8-10.el92:4.9-15.el9->2:4.9-16.el93.34.1-9.el9_7->3.34.1-10.el9_8252-55.el9_7.9->252-67.el9_8.2252-55.el9_7.9->252-67.el9_8.2252-55.el9_7.9->252-67.el9_8.2252-55.el9_7.9->252-67.el9_8.22:1.34-9.el9_7->2:1.34-11.el96.0-59.el9->6.0-60.el92.37.4-21.el9_7->2.37.4-25.el92.37.4-21.el9_7->2.37.4-25.el92:8.2.2637-23.el9_7.3->2:8.2.2637-26.el9_8.42.0.6-1.el9->2.0.6-3.el92.34-231.el9_7.10->2.34-266.el9_8python: Python: Command-line option injection in webbrowser.open() via crafted URLs
CVE-2026-4519
More information
Severity
Important
References
cpython: wsgiref.headers.Headers allows header newline injection in Python
CVE-2026-0865
More information
Severity
Moderate
References
python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules
CVE-2026-6100
More information
Severity
Important
References
python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API
CVE-2026-4786
More information
Severity
Important
References
gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
CVE-2025-14831
More information
Severity
Moderate
References
krb5: MIT Kerberos 5: Denial of Service via NULL pointer dereference in NegoEx mechanism
CVE-2026-40355
More information
Severity
Important
References
krb5: MIT Kerberos 5 (krb5): Denial of Service via integer underflow and out-of-bounds read
CVE-2026-40356
More information
Severity
Important
References
libcap: libcap: Privilege escalation via TOCTOU race condition in cap_set_file()
CVE-2026-4878
More information
Severity
Important
References
OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username
CVE-2026-35386
More information
Severity
Important
References
OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage
CVE-2026-35387
More information
Severity
Important
References
OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode
CVE-2026-35385
More information
Severity
Important
References
OpenSSH: OpenSSH: Low integrity impact from unconfirmed proxy-mode multiplexing sessions
CVE-2026-35388
More information
Severity
Important
References
OpenSSH: OpenSSH: Security bypass via mishandling of authorized_keys principals option
CVE-2026-35414
More information
Severity
Important
References
p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters
CVE-2026-2100
More information
Severity
Moderate
References
systemd: systemd: Arbitrary code execution or Denial of Service via spurious IPC API call data
CVE-2026-29111
More information
Severity
Moderate
References
🔧 This Pull Request updates lock files to use the latest dependency versions.
Configuration
📅 Schedule: Branch creation - "" in timezone Etc/UTC, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
To execute skipped test pipelines write comment
/ok-to-test.Documentation
Find out how to configure dependency updates in MintMaker documentation or see all available configuration options in Renovate documentation.