Yelp, the GNOME user help application, allows help documents to execute arbitrary JavaScript. A malicious help document may exfiltrate user files to a remote server.
According to some write-ups, I'm increasing the impact of this vulnerability. https://gist.github.com/parrot409/e970b155358d45b298d7024edd9b17f2 https://blogs.gnome.org/mcatanzaro/2025/04/15/dangerous-arbitrary-file-read-vulnerability-in-yelp-cve-2025-3155/
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:4451 https://access.redhat.com/errata/RHSA-2025:4451
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:4450 https://access.redhat.com/errata/RHSA-2025:4450
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:4457 https://access.redhat.com/errata/RHSA-2025:4457
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:4455 https://access.redhat.com/errata/RHSA-2025:4455
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:4456 https://access.redhat.com/errata/RHSA-2025:4456
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:4505 https://access.redhat.com/errata/RHSA-2025:4505
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:4532 https://access.redhat.com/errata/RHSA-2025:4532
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:7430 https://access.redhat.com/errata/RHSA-2025:7430
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:7569 https://access.redhat.com/errata/RHSA-2025:7569