Bug 2454017

Summary: CVE-2026-4800 frama-c: lodash: Arbitrary code execution via untrusted input in template imports [fedora-all]
Product: [Fedora] Fedora Reporter: Jon Moroney <jmoroney>
Component: frama-cAssignee: Jerry James <loganjerry>
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: high    
Version: rawhideCC: Andre.MARONEZE, loganjerry
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["9bea0361-156d-4476-b60c-effb975141e0"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-04-01 21:36:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2453496    

Description Jon Moroney 2026-04-01 20:21:35 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Jerry James 2026-04-01 21:36:20 UTC
Is there some way we can get the frama-c package off of the list of packages to be scanned for JavaScript vulnerabilities?  The JavaScript bits of this package are not, and will not be, used to build the package and are not, and will not be, shipped with any binary RPM built from the package.