Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2023:3254 - Bug Fix Advisory
Issued:
2023-05-22
Updated:
2023-05-22

RHBA-2023:3254 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

updated Red Hat Enterprise Linux 9 container images

Type/Severity

Bug Fix Advisory

Topic

Updated Red Hat Enterprise Linux 9 container images are now available

Description

The Red Hat Enterprise Linux 9 container images have been updated to address the following security advisory: RHSA-2023:3245 (see References)

Users of Red Hat Enterprise Linux 9 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.

You can find images updated by this advisory in Red Hat Container Catalog (see References).

Solution

The Red Hat Enterprise Linux 9 container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).

Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x

Fixes

  • BZ - 2168160 - CVE-2023-22490 git: data exfiltration with maliciously crafted repository
  • BZ - 2168161 - CVE-2023-23946 git: git apply: a path outside the working tree can be overwritten with crafted input
  • BZ - 2188333 - CVE-2023-25652 git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents
  • BZ - 2188337 - CVE-2023-25815 git: malicious placement of crafted messages when git was compiled with runtime prefix
  • BZ - 2188338 - CVE-2023-29007 git: arbitrary configuration injection when renaming or deleting a section from a configuration file

CVEs

  • CVE-2022-4904
  • CVE-2022-25147
  • CVE-2022-25881
  • CVE-2022-48337
  • CVE-2022-48338
  • CVE-2022-48339
  • CVE-2023-1999
  • CVE-2023-2491
  • CVE-2023-22490
  • CVE-2023-23918
  • CVE-2023-23920
  • CVE-2023-23936
  • CVE-2023-23946
  • CVE-2023-24807
  • CVE-2023-25136
  • CVE-2023-25652
  • CVE-2023-25815
  • CVE-2023-27535
  • CVE-2023-29007

References

  • https://access.redhat.com/errata/RHSA-2023:3245
  • https://access.redhat.com/containers

aarch64

ubi9/perl-532@sha256:c787f6b436863ffafc7612a6b93a8012d03d77151f9379a9316b8494ca0e532f
rhel9/perl-532@sha256:c787f6b436863ffafc7612a6b93a8012d03d77151f9379a9316b8494ca0e532f
rhel9/php-80@sha256:3718bbe0c6cc59683ba3355b37be6d1f36bc8fbf3065d5310d54a40456ccfde2
ubi9/php-80@sha256:3718bbe0c6cc59683ba3355b37be6d1f36bc8fbf3065d5310d54a40456ccfde2
rhel9/php-81@sha256:a5f58f51b06b3bab13e6dad3fee47219c2846878ed9a5f2f13931aae820ed681
ubi9/php-81@sha256:a5f58f51b06b3bab13e6dad3fee47219c2846878ed9a5f2f13931aae820ed681
rhel9/python-311@sha256:ac9b5d845460f6173a2752b99e48e4aa1a9e87f44160527f999c51c31b98d882
ubi9/python-311@sha256:ac9b5d845460f6173a2752b99e48e4aa1a9e87f44160527f999c51c31b98d882
ubi9/python-39@sha256:13a3a6811447a43069db02b79630302d2e4636bdba99fbe10b655fc1b60ac273
rhel9/python-39@sha256:13a3a6811447a43069db02b79630302d2e4636bdba99fbe10b655fc1b60ac273
ubi9/ruby-30@sha256:9d2d8bc247c412285bd9cc1290cc5ca2558b627072cd067ee680c98792ee2e98
rhel9/ruby-30@sha256:9d2d8bc247c412285bd9cc1290cc5ca2558b627072cd067ee680c98792ee2e98
ubi9/ruby-31@sha256:c2503a5c1782a484a8f7084e62fe230e1d188435bed9ae07a0ef57c902ee7918
rhel9/ruby-31@sha256:c2503a5c1782a484a8f7084e62fe230e1d188435bed9ae07a0ef57c902ee7918
rhel9/s2i-base@sha256:011b1192b1223e5d23e8a1c77700cdd43abfd9d5d46cded8ff906fb21e68d600
ubi9/s2i-base@sha256:011b1192b1223e5d23e8a1c77700cdd43abfd9d5d46cded8ff906fb21e68d600

ppc64le

ubi9/perl-532@sha256:344c6a43805ce45e07241acf6748686b29cd78cbeaa6ac4c3d9c982608d5bbed
rhel9/perl-532@sha256:344c6a43805ce45e07241acf6748686b29cd78cbeaa6ac4c3d9c982608d5bbed
rhel9/php-80@sha256:89c1adf0a3bbd76b9529a057822ac43a216648b1da2a92d4247543b76cc9ff47
ubi9/php-80@sha256:89c1adf0a3bbd76b9529a057822ac43a216648b1da2a92d4247543b76cc9ff47
rhel9/php-81@sha256:ed8a453ad92ee835aa24e63d140f108442817144220cf4ceba15b95ea1d1dd63
ubi9/php-81@sha256:ed8a453ad92ee835aa24e63d140f108442817144220cf4ceba15b95ea1d1dd63
rhel9/python-311@sha256:a2ad3a6a476b0023a181018e11ae8eca86824245c21b66586dbb2efbc1ce65cc
ubi9/python-311@sha256:a2ad3a6a476b0023a181018e11ae8eca86824245c21b66586dbb2efbc1ce65cc
ubi9/python-39@sha256:e865e767c9d83b616f31afe05369caee748babd0f5bae6ef56afffd8efa5ca08
rhel9/python-39@sha256:e865e767c9d83b616f31afe05369caee748babd0f5bae6ef56afffd8efa5ca08
ubi9/ruby-30@sha256:a0dceedccb6cb83c6761ccb78633201f1731c85a63d12209193408a5a2a6430e
rhel9/ruby-30@sha256:a0dceedccb6cb83c6761ccb78633201f1731c85a63d12209193408a5a2a6430e
ubi9/ruby-31@sha256:ef4fe553194a4460da41958bdfb02c054611fe0154032af7e76ee203ef722bdc
rhel9/ruby-31@sha256:ef4fe553194a4460da41958bdfb02c054611fe0154032af7e76ee203ef722bdc
rhel9/s2i-base@sha256:4174056a1041d95ffb4e9c638e483b117a85e26b4ce6e47959efbcb39fbb0e37
ubi9/s2i-base@sha256:4174056a1041d95ffb4e9c638e483b117a85e26b4ce6e47959efbcb39fbb0e37

s390x

ubi9/perl-532@sha256:892acf65f4a6c6758b8add674455ba3f8f45c70a6ad4393cc24e56f9d82612f2
rhel9/perl-532@sha256:892acf65f4a6c6758b8add674455ba3f8f45c70a6ad4393cc24e56f9d82612f2
rhel9/php-80@sha256:79d1f61d04622cb6597b27cc02cdd8c3f2440d070cf2620adcbb9a7c9eda6cd3
ubi9/php-80@sha256:79d1f61d04622cb6597b27cc02cdd8c3f2440d070cf2620adcbb9a7c9eda6cd3
rhel9/php-81@sha256:ef314acf6a3b92f09a4e03dadc31f86b350b6469b94f63d95afbc2bb8f6c96f1
ubi9/php-81@sha256:ef314acf6a3b92f09a4e03dadc31f86b350b6469b94f63d95afbc2bb8f6c96f1
rhel9/python-311@sha256:1c1072acd44e76b02009c897ecee38dcacf97744cdaeca476482d337e22ff6ba
ubi9/python-311@sha256:1c1072acd44e76b02009c897ecee38dcacf97744cdaeca476482d337e22ff6ba
ubi9/python-39@sha256:0c1de575108facd93af3f898e165d6a782cc894bdb7310e01d897051c2aa3430
rhel9/python-39@sha256:0c1de575108facd93af3f898e165d6a782cc894bdb7310e01d897051c2aa3430
ubi9/ruby-30@sha256:da80e8782621d86ccbfbd04742d4d2b481951a54cb9c6170902d07112bcdfba4
rhel9/ruby-30@sha256:da80e8782621d86ccbfbd04742d4d2b481951a54cb9c6170902d07112bcdfba4
ubi9/ruby-31@sha256:0003b84b1f3d5d6e6e0e4bd6164a1f2d83d59723926bbd7568e33a9db205c9c6
rhel9/ruby-31@sha256:0003b84b1f3d5d6e6e0e4bd6164a1f2d83d59723926bbd7568e33a9db205c9c6
rhel9/s2i-base@sha256:8e584b8cb9c11fc18d93b9a39f959284804b3eb7e8e40b97b56092adc081174e
ubi9/s2i-base@sha256:8e584b8cb9c11fc18d93b9a39f959284804b3eb7e8e40b97b56092adc081174e

x86_64

ubi9/perl-532@sha256:a883af1c1be419e9844024d26538a72d2fb4c0d949f927e21e6471a9dfbf558a
rhel9/perl-532@sha256:a883af1c1be419e9844024d26538a72d2fb4c0d949f927e21e6471a9dfbf558a
rhel9/php-80@sha256:c5f6c389f407b88a4e27fef01c7ab8e78f3eee3a739bc06671005f776448088e
ubi9/php-80@sha256:c5f6c389f407b88a4e27fef01c7ab8e78f3eee3a739bc06671005f776448088e
rhel9/php-81@sha256:7fd110efc6cb9df85a70faf40d64b10c643a79fe89f7b01138721dcde7efcddb
ubi9/php-81@sha256:7fd110efc6cb9df85a70faf40d64b10c643a79fe89f7b01138721dcde7efcddb
rhel9/python-311@sha256:ee81d328e3efeeed537a7aa46b9735cd28f2bd469c6c80f49e31a115b4b09dd5
ubi9/python-311@sha256:ee81d328e3efeeed537a7aa46b9735cd28f2bd469c6c80f49e31a115b4b09dd5
ubi9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d
rhel9/python-39@sha256:c62e9c0b7ec343ee4b0e0c695a3c8d42d8070e0b9a752079830be0892dc1f89d
ubi9/ruby-30@sha256:c9daf8c561e43ee49254fc122ce1287df5650c15e2d0d29daad64c7a908a4a0e
rhel9/ruby-30@sha256:c9daf8c561e43ee49254fc122ce1287df5650c15e2d0d29daad64c7a908a4a0e
ubi9/ruby-31@sha256:ff89638b728d4f9eb3e07035b869c42694c552f56133d0445dff7e262d3a9460
rhel9/ruby-31@sha256:ff89638b728d4f9eb3e07035b869c42694c552f56133d0445dff7e262d3a9460
rhel9/s2i-base@sha256:3e838f455bc00679122bb611986ffca24cc4b3e6d10ced0f9c69dbba2c594fab
ubi9/s2i-base@sha256:3e838f455bc00679122bb611986ffca24cc4b3e6d10ced0f9c69dbba2c594fab

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility