- Issued:
- 2024-12-02
- Updated:
- 2024-12-02
RHBA-2024:10463 - Bug Fix Advisory
Synopsis
updated quarkus/mandrel-for-jdk-21-rhel8 container image
Type/Severity
Bug Fix Advisory
Topic
An updated quarkus/mandrel-for-jdk-21-rhel8 container image is now available for Red Hat build of Quarkus 3.8 on RHEL 8.
Description
The quarkus/mandrel-for-jdk-21-rhel8 container image has been updated for Red Hat build of Quarkus 3.8 on RHEL 8 to address the following security advisories: RHSA-2024:10379 and RHSA-2024:10281. For more information about these advisories, see the References section.
Users of quarkus/mandrel-for-jdk-21-rhel8 container images are advised to upgrade to the updated images, which contain backported patches to correct security issues, fix bugs, and add enhancements. Users of these images are also encouraged to rebuild all container images that depend on the images.
You can find images updated by this advisory in Red Hat Container Catalog. For more information, see the References section.
Solution
You can download the Red Hat build of Quarkus 3.8 on RHEL 8 container image provided by this update from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (for more information, see the References section).
You should amend Dockerfiles and scripts either to refer to this new image specifically, or to the latest image generally.
Affected Products
- Red Hat build of Quarkus 3 x86_64
- Red Hat build of Quarkus 3 aarch64
Fixes
- BZ - 2319212 - CVE-2024-10041 pam: libpam: Libpam vulnerable to read hashed password
- BZ - 2324291 - CVE-2024-10963 pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
CVEs
aarch64
| quarkus/mandrel-for-jdk-21-rhel8@sha256:8d7d5cdd3aa53b7ead07ab597c166015864e02533c396c2ddd94929a950c8a24 |
x86_64
| quarkus/mandrel-for-jdk-21-rhel8@sha256:5581095c46c934266d3d31b7a1c81df9fa85f5acf5c7cedd007934cd49ebcc43 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.