Bug 2454017
| Summary: | CVE-2026-4800 frama-c: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all] | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Jon Moroney <jmoroney> |
| Component: | frama-c | Assignee: | Jerry James <loganjerry> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | rawhide | CC: | Andre.MARONEZE, loganjerry |
| Target Milestone: | --- | Keywords: | Security, SecurityTracking |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | {"flaws": ["9bea0361-156d-4476-b60c-effb975141e0"]} | ||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2026-04-01 21:36:20 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2453496 | ||
|
Description
Jon Moroney
2026-04-01 20:21:35 UTC
Is there some way we can get the frama-c package off of the list of packages to be scanned for JavaScript vulnerabilities? The JavaScript bits of this package are not, and will not be, used to build the package and are not, and will not be, shipped with any binary RPM built from the package. |