- Issued:
- 2024-01-22
- Updated:
- 2024-01-22
RHSA-2024:0325 - Important: Updated RHEL-7-based Middleware container images
Synopsis
Important: Updated RHEL-7-based Middleware container images
Type/Severity
Security Advisory Important
Topic
Updated RHEL-7-based Middleware container images are now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The RHEL-7-based Middleware Containers container images have been updated for the January 2024 OpenJDK Critical Patch Update (CPU).
Users of RHEL-7-based Middleware Containers container images are advised to upgrade to these updated images. Users of these images are also encouraged to rebuild all container images that depend on these images.
You can find images updated by this advisory in the Red Hat Container Catalog (see the References section).
Security Fix(es):
- SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Container Platform | 4.9 | x86_64 |
| Red Hat OpenShift Container Platform | 4.8 | x86_64 |
| Red Hat OpenShift Container Platform for Power | 4.9 | ppc64le |
| Red Hat OpenShift Container Platform for Power | 4.8 | ppc64le |
| Red Hat OpenShift Container Platform for IBM Z and LinuxONE | 4.9 | s390x |
| Red Hat OpenShift Container Platform for IBM Z and LinuxONE | 4.8 | s390x |
Fixes
CVEs
- CVE-2022-1471
- CVE-2022-43552
- CVE-2024-20918
- CVE-2024-20919
- CVE-2024-20921
- CVE-2024-20926
- CVE-2024-20945
- CVE-2024-20952
References
- https://access.redhat.com/security/updates/classification/#important
- This content is not included.This content is not included.https://access.redhat.com/containers
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.