- Issued:
- 2020-11-04
- Updated:
- 2020-11-04
RHBA-2020:4423 - Bug Fix Advisory
Synopsis
new and updated Application Stream container images
Type/Severity
Bug Fix Advisory
Topic
New and updated Application Stream container images are now available in the Red Hat Container Registry.
Description
Red Hat Enterprise Linux 8 Application Stream container images are based on
the corresponding Application Stream component and the ubi8 base image.
The ubi8 base image has been updated to the latest version. The Application Stream container images have been updated to provide enhancements and bug fixes from the RHEL 8.3 release.
This update introduces the following new images:
ubi8/nodejs-14
ubi8/ruby-27
ubi8/php-74
ubi8/perl-530
ubi8/nginx-118
The following Application Stream container images have been updated:
rhel8/httpd-24
rhel8/mariadb-103
rhel8/memcached
rhel8/mysql-80
rhel8/nginx-114
rhel8/nginx-116
ubi8/nodejs-10
ubi8/nodejs-12
ubi8/perl-526
ubi8/php-72
ubi8/php-73
rhel8/postgresql-10
rhel8/postgresql-12
rhel8/postgresql-96
ubi8/python-27
ubi8/python-36
ubi8/python-38
rhel8/redis-5
ubi8/ruby-25
ubi8/ruby-26
ubi8/s2i-base
ubi8/s2i-core
rhel8/varnish-6
To pull a container image, run the following command as root:
podman pull registry.redhat.io/<image_name>
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.
Solution
The container images provided by this update can be downloaded from the Red
Hat Container Registry at registry.redhat.io using the "podman pull"
command.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.8 x86_64
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 1732828 - Add perl-530-container
- BZ - 1838061 - rebuild of memcached-container 8.3
- BZ - 1838093 - rebuild of nginx-116-container 8.3
- BZ - 1838095 - rebuild of mariadb-103-container 8.3
- BZ - 1838098 - rebuild of httpd-24-container 8.3
- BZ - 1838101 - rebuild of nginx-114-container 8.3
- BZ - 1838103 - rebuild of redis-5-container 8.3
- BZ - 1838105 - rebuild of mysql-80-container 8.3
- BZ - 1838106 - rebuild of postgresql-10-container 8.3
- BZ - 1838108 - rebuild of s2i-base-container 8.3
- BZ - 1838113 - rebuild of postgresql-96-container 8.3
- BZ - 1838118 - rebuild of postgresql-12-container 8.3
- BZ - 1838119 - rebuild of varnish-6-container 8.3
- BZ - 1845926 - rebuild of s2i-core-container 8.3
- BZ - 1845950 - rebuild of ruby-25-container 8.3
- BZ - 1845951 - rebuild of nodejs-10-container 8.3
- BZ - 1845953 - rebuild of python-36-container 8.3
- BZ - 1845955 - rebuild of php-72-container 8.3
- BZ - 1845958 - rebuild of php-73-container 8.3
- BZ - 1845959 - rebuild of python-38-container 8.3
- BZ - 1845960 - rebuild of ruby-26-container 8.3
- BZ - 1845961 - rebuild of perl-526-container 8.3
- BZ - 1845963 - rebuild of python-27-container 8.3
- BZ - 1847009 - rebuild of nodejs-12-container 8.3
- BZ - 1847975 - rebuild of perl-530-container 8.3
- BZ - 1853670 - rebuild of nginx-118-container 8.3
- BZ - 1853672 - rebuild of nodejs-14-container 8.3
- BZ - 1853673 - rebuild of ruby-27-container 8.3
- BZ - 1853676 - rebuild of php-74-container 8.3
CVEs
- CVE-2018-14553
- CVE-2018-20843
- CVE-2019-1551
- CVE-2019-5018
- CVE-2019-6977
- CVE-2019-6978
- CVE-2019-8625
- CVE-2019-8710
- CVE-2019-8720
- CVE-2019-8743
- CVE-2019-8764
- CVE-2019-8766
- CVE-2019-8769
- CVE-2019-8771
- CVE-2019-8782
- CVE-2019-8783
- CVE-2019-8808
- CVE-2019-8811
- CVE-2019-8812
- CVE-2019-8813
- CVE-2019-8814
- CVE-2019-8815
- CVE-2019-8816
- CVE-2019-8819
- CVE-2019-8820
- CVE-2019-8823
- CVE-2019-8835
- CVE-2019-8844
- CVE-2019-8846
- CVE-2019-11068
- CVE-2019-13050
- CVE-2019-13627
- CVE-2019-14889
- CVE-2019-15165
- CVE-2019-15903
- CVE-2019-16168
- CVE-2019-16935
- CVE-2019-17450
- CVE-2019-17546
- CVE-2019-18197
- CVE-2019-19221
- CVE-2019-19906
- CVE-2019-19956
- CVE-2019-20218
- CVE-2019-20387
- CVE-2019-20388
- CVE-2019-20454
- CVE-2019-20807
- CVE-2019-20907
- CVE-2019-20916
- CVE-2020-1730
- CVE-2020-1751
- CVE-2020-1752
- CVE-2020-3862
- CVE-2020-3864
- CVE-2020-3865
- CVE-2020-3867
- CVE-2020-3868
- CVE-2020-3885
- CVE-2020-3894
- CVE-2020-3895
- CVE-2020-3897
- CVE-2020-3899
- CVE-2020-3900
- CVE-2020-3901
- CVE-2020-3902
- CVE-2020-6405
- CVE-2020-7595
- CVE-2020-8177
- CVE-2020-8492
- CVE-2020-8619
- CVE-2020-8622
- CVE-2020-8623
- CVE-2020-8624
- CVE-2020-9327
- CVE-2020-9802
- CVE-2020-9803
- CVE-2020-9805
- CVE-2020-9806
- CVE-2020-9807
- CVE-2020-9843
- CVE-2020-9850
- CVE-2020-9862
- CVE-2020-9893
- CVE-2020-9894
- CVE-2020-9895
- CVE-2020-9915
- CVE-2020-9925
- CVE-2020-10018
- CVE-2020-10029
- CVE-2020-11793
- CVE-2020-13630
- CVE-2020-13631
- CVE-2020-13632
- CVE-2020-14382
- CVE-2020-14391
- CVE-2020-14422
- CVE-2020-15503
- CVE-2020-24490
- CVE-2020-25661
- CVE-2020-25662
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.