- Issued:
- 2022-06-30
- Updated:
- 2022-06-30
RHBA-2022:5437 - Bug Fix Advisory
Synopsis
updated integration/service-registry-rhel8-operator-metadata container image
Type/Severity
Bug Fix Advisory
Topic
Updated integration/service-registry-rhel8-operator-metadata container image is now available for RHEL 8-based Middleware Containers.
Description
The integration/service-registry-rhel8-operator-metadata container image has
been updated for RHEL 8-based Middleware Containers to address the following
security advisory: RHBA-2022:5170 (see References)
Users of integration/service-registry-rhel8-operator-metadata container images
are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs, and add these enhancements.
Users of these images are also encouraged to rebuild all container images that
depend on these images.
You can find images updated by this advisory in Red Hat Container Catalog (see
References).
Solution
You can download the RHEL 8-based Middleware Containers image provided by this update from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are
available from the Red Hat Container Catalog (see References).
You must update Dockerfiles and scripts either to refer to this new image
specifically, or to the latest image generally.
Affected Products
- Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.6 for RHEL 8 x86_64
Fixes
- BZ - 1991685 - CVE-2021-3695 grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap
- BZ - 1991686 - CVE-2021-3696 grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling
- BZ - 1991687 - CVE-2021-3697 grub2: Crafted JPEG image can lead to buffer underflow write in the heap
- BZ - 2083339 - CVE-2022-28733 grub2: Integer underflow in grub_net_recv_ip4_packets
- BZ - 2090463 - CVE-2022-28734 grub2: Out-of-bound write when handling split HTTP headers
- BZ - 2090857 - CVE-2022-28735 grub2: shim_lock verifier allows non-kernel files to be loaded
- BZ - 2090899 - CVE-2022-28737 shim: Buffer overflow when loading crafted EFI images
- BZ - 2092613 - CVE-2022-28736 grub2: use-after-free in grub_cmd_chainloader()
CVEs
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.