Skip to content

Commit 3c94107

Browse files
authored
Added fixed security issues for 1.4.3 (#1059)
1 parent 6bac9a8 commit 3c94107

5 files changed

+19
-0
lines changed

assemblies/assembly-release-notes-fixed-security-issues.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@
55
This section lists security issues fixed in {product} {product-version}.
66

77
== {product} {product-bundle-version}
8+
include::./modules/release-notes/snip-fixed-security-issues-in-product-1.4.3.adoc[leveloffset=+2]
9+
10+
// nothing yet so don't include this
11+
// include::./modules/release-notes/snip-fixed-security-issues-in-rpm-1.4.2.adoc[leveloffset=+2]
12+
== {product} 1.4.2
813
include::./modules/release-notes/snip-fixed-security-issues-in-product-1.4.2.adoc[leveloffset=+2]
914

1015
// nothing yet so don't include this
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
CVE-2025-27516
2+
CVE-2025-29775
3+
CVE-2025-29774

modules/release-notes/list-fixed-security-issues-in-rpm-1.4.3.txt

Whitespace-only changes.
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
= {product} dependency updates
2+
3+
link:https://access.redhat.com/security/cve/CVE-2025-27516[CVE-2025-27516]::
4+
A flaw was found in Jinja. In affected versions, an oversight in how the Jinja sandboxed environment interacts with the `|attr` filter allows an attacker who controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications that execute untrusted templates. Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to use the `|attr` filter to get a reference to a string's plain format method, bypassing the sandbox.
5+
6+
link:https://access.redhat.com/security/cve/CVE-2025-29774[CVE-2025-29774]::
7+
A flaw was found in the xml-crypto library for Node.js. An attacker can exploit this vulnerability to bypass authentication or authorization mechanisms in systems that rely on xml-crypto to verify signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks.
8+
9+
link:https://access.redhat.com/security/cve/CVE-2025-29775[CVE-2025-29775]::
10+
A flaw was found in the xml-crypto library for Node.js. An attacker can exploit this vulnerability to bypass authentication or authorization mechanisms in systems that rely on xml-crypto to verify signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
= RHEL 9 platform RPM updates

0 commit comments

Comments
 (0)