Skip to content

Commit ee41def

Browse files
committed
release notes for patch 4.5.9
1 parent abdeb12 commit ee41def

File tree

2 files changed

+18
-2
lines changed

2 files changed

+18
-2
lines changed

modules/common-attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,9 @@ endif::[]
5555
:osp: Red{nbsp}Hat OpenShift
5656
:olm-first: Operator Lifecycle Manager (OLM)
5757
:olm: OLM
58-
:rhacs-version: 4.5.8
58+
:rhacs-version: 4.5.9
5959
:ocp-supported-version: 4.11
60-
:ocp-latest-version: 4.17
60+
:ocp-latest-version: 4.18
6161
:product-rosa: Red{nbsp}Hat OpenShift Service on AWS
6262
:product-rosa-short: ROSA
6363
:product-title: Red{nbsp}Hat Advanced Cluster Security for Kubernetes

release_notes/45-release-notes.adoc

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ toc::[]
2424
|`4.5.6` | 11 February 2025
2525
|`4.5.7` | 10 March 2025
2626
|`4.5.8` | 31 March 2025
27+
|`4.5.9` | 14 April 2025
2728

2829
|====
2930

@@ -512,4 +513,19 @@ This release also addresses the following security vulnerabilities:
512513
* link:https://access.redhat.com/security/cve/cve-2025-22868[CVE-2025-22868] Flaw in the `golang.org/x/oauth2/jws` package.
513514
* link:https://access.redhat.com/security/cve/cve-2025-22869[CVE-2025-22869] Flaw in the `golang.org/x/crypto/ssh` package.
514515

516+
[id="about-release-459_{context}"]
517+
== About release 4.5.9
518+
519+
This release of {product-title-short} includes the following bug fix:
520+
521+
* Fixed a bug to match the aggregation field of the compliance tables to the widgets for consistency.
522+
523+
This release also addresses the following security vulnerabilities:
524+
525+
link:https://access.redhat.com/security/cve/cve-2024-21536[CVE-2024-21536] Flaw in the `http-proxy-middleware` package can allow a Denial of Service (DoS) attack.
526+
527+
link:https://access.redhat.com/security/cve/cve-2024-57083[CVE-2024-57083] Prototype pollution in redoc can allow a DoS attack.
528+
529+
link:https://access.redhat.com/security/cve/cve-2025-30204[CVE-2025-30204] The `jwt-go` implementation of JSON Web Tokens (JWT) allows excessive memory allocation during header parsing that can allow a DOS attack.
530+
515531
include::modules/image-versions.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)