- Issued:
- 2023-07-06
- Updated:
- 2023-07-06
RHBA-2023:3973 - Bug Fix Advisory
Synopsis
Update Technology Preview of JBoss Web Server 5.7 for OpenShift image with OpenJDK 17 for python CVE
Type/Severity
Bug Fix Advisory
Topic
This erratum covers updates to the current Technology Preview release of the JBoss Web Server 5.7 for OpenShift container image with OpenJDK 17 support to fix python CVE-2023-24329.
Description
The current Technology Preview release of the JBoss Web Server 5.7 for OpenShift image with OpenJDK 17 support has been updated to fix python CVE-2023-24329.
Solution
You can download the RHEL-8-based Middleware Containers image that this update provides from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available in the Red Hat Ecosystem Catalog (see the References section).
Dockerfiles and scripts should be amended to refer to this new image specifically or to the latest image generally.
Affected Products
- Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.11 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8 s390x
Fixes
- BZ - 2173917 - CVE-2023-24329 python: urllib.parse url blocklisting bypass
- CLOUD-4186 - [JWS57 - JDK17 TP] - Important - python: urllib.parse url blocklisting bypass (CVE-2023-24329)
CVEs
ppc64le
jboss-webserver-5/jws57-openjdk17-openshift-rhel8@sha256:c9fe65f0ab0cd82e598580cc0707556a0c7f8a1a8a168b66389e52166fb57ce7 |
s390x
jboss-webserver-5/jws57-openjdk17-openshift-rhel8@sha256:ca91112a53c55d9f3b60e3d8592a41ae34ef3c9eaf0cdd7961e9585892518d05 |
x86_64
jboss-webserver-5/jws57-openjdk17-openshift-rhel8@sha256:35aac74e0f875f58a852d8e2a961999edf82133a5df9957c0cea00601c6b6247 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.