You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: release_notes/45-release-notes.adoc
+16Lines changed: 16 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,7 @@ toc::[]
24
24
|`4.5.6` | 11 February 2025
25
25
|`4.5.7` | 10 March 2025
26
26
|`4.5.8` | 31 March 2025
27
+
|`4.5.9` | 14 April 2025
27
28
28
29
|====
29
30
@@ -512,4 +513,19 @@ This release also addresses the following security vulnerabilities:
512
513
* link:https://access.redhat.com/security/cve/cve-2025-22868[CVE-2025-22868] Flaw in the `golang.org/x/oauth2/jws` package.
513
514
* link:https://access.redhat.com/security/cve/cve-2025-22869[CVE-2025-22869] Flaw in the `golang.org/x/crypto/ssh` package.
514
515
516
+
[id="about-release-459_{context}"]
517
+
== About release 4.5.9
518
+
519
+
This release of {product-title-short} includes the following bug fix:
520
+
521
+
* Fixed a bug to match the aggregation field of the compliance tables to the widgets for consistency.
522
+
523
+
This release also addresses the following security vulnerabilities:
524
+
525
+
link:https://access.redhat.com/security/cve/cve-2024-21536[CVE-2024-21536] Flaw in the `http-proxy-middleware` package can allow a Denial of Service (DoS) attack.
526
+
527
+
link:https://access.redhat.com/security/cve/cve-2024-57083[CVE-2024-57083] Prototype pollution in redoc can allow a DoS attack.
528
+
529
+
link:https://access.redhat.com/security/cve/cve-2025-30204[CVE-2025-30204] The `jwt-go` implementation of JSON Web Tokens (JWT) allows excessive memory allocation during header parsing that can allow a DOS attack.
0 commit comments