First published: Mon Feb 10 2025(Updated: )
Moderate: tbb security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
redhat/tbb | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/python3-tbb | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/python3-tbb-debuginfo | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/python3-tbb-debuginfo | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-debuginfo | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-debuginfo | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-debugsource | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-debugsource | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-devel | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-devel | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-doc | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/python3-tbb | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/python3-tbb-debuginfo | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-debuginfo | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-debugsource | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-devel | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
redhat/tbb-doc | <2018.2-10.el8_4.1 | 2018.2-10.el8_4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1212 is classified as moderate.
To fix RHSA-2025:1212, upgrade to the package versions 2018.2-10.el8_4.1 for tbb and related packages.
RHSA-2025:1212 affects multiple packages including tbb, python3-tbb, and tbb-devel on various Red Hat Enterprise Linux installations.
RHSA-2025:1212 addresses a vulnerability related to untrusted code execution via the <option> tag in HTML.
Users of affected systems should apply the updates as soon as possible to mitigate the risk associated with this vulnerability.