First published: Thu Mar 27 2025(Updated: )
An ansible-core rebuild for OpenStack based on python 3.9.<br>Security Fix(es):<br><li> Jinja sandbox breakout through attr filter selecting format method</li> (CVE-2025-27516)<br>For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openstack-ansible-core | <2.14.2-4.7.el9 | 2.14.2-4.7.el9 |
Red Hat Enterprise Linux 8 | ||
Red Hat OpenStack Director Deployment Tools | ||
Red Hat OpenStack Services on OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:3371 is classified as important due to the potential for a sandbox breakout.
To fix RHSA-2025:3371, update the openstack-ansible-core package to the latest version as specified in the advisory.
RHSA-2025:3371 affects the openstack-ansible-core package version 2.14.2-4.7.el9 and other Red Hat OpenStack products.
RHSA-2025:3371 addresses the CVE-2025-27516 vulnerability, which involves a Jinja sandbox breakout.
Yes, RHSA-2025:3371 is a security advisory issued by Red Hat regarding a critical vulnerability.