Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions assemblies/assembly-release-notes-fixed-security-issues.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,11 @@
This section lists security issues fixed in {product} {product-version}.

== {product} {product-bundle-version}
include::./modules/release-notes/snip-fixed-security-issues-in-product-1.4.3.adoc[leveloffset=+2]

// nothing yet so don't include this
// include::./modules/release-notes/snip-fixed-security-issues-in-rpm-1.4.2.adoc[leveloffset=+2]
== {product} 1.4.2
include::./modules/release-notes/snip-fixed-security-issues-in-product-1.4.2.adoc[leveloffset=+2]

// nothing yet so don't include this
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
CVE-2025-27516
CVE-2025-29775
CVE-2025-29774
Empty file.
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
= {product} dependency updates

link:https://access.redhat.com/security/cve/CVE-2025-27516[CVE-2025-27516]::
A flaw was found in Jinja. In affected versions, an oversight in how the Jinja sandboxed environment interacts with the `|attr` filter allows an attacker who controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications that execute untrusted templates. Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to use the `|attr` filter to get a reference to a string's plain format method, bypassing the sandbox.

link:https://access.redhat.com/security/cve/CVE-2025-29774[CVE-2025-29774]::
A flaw was found in the xml-crypto library for Node.js. An attacker can exploit this vulnerability to bypass authentication or authorization mechanisms in systems that rely on xml-crypto to verify signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks.

link:https://access.redhat.com/security/cve/CVE-2025-29775[CVE-2025-29775]::
A flaw was found in the xml-crypto library for Node.js. An attacker can exploit this vulnerability to bypass authentication or authorization mechanisms in systems that rely on xml-crypto to verify signed XML documents. The vulnerability allows an attacker to modify a valid signed XML message in a way that still passes signature verification checks.
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
= RHEL 9 platform RPM updates