- Issued:
- 2024-12-12
- Updated:
- 2024-12-12
RHBA-2024:11026 - Bug Fix Advisory
Synopsis
updated devspaces/udi-rhel8 container image
Type/Severity
Bug Fix Advisory
Topic
Updated devspaces/udi-rhel8 container image is now available for Red Hat OpenShift Dev Spaces 3 Containers.
Description
The devspaces/udi-rhel8 container image has been updated for Red Hat OpenShift Dev Spaces 3 Containers to address the following security advisory: RHSA-2024:10952 (see References)
Users of devspaces/udi-rhel8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.
You can find images updated by this advisory in Red Hat Container Catalog (see References).
Solution
The Red Hat OpenShift Dev Spaces 3 Containers container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).
Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.
Affected Products
- Red Hat OpenShift Dev Spaces 3 x86_64
Fixes
- BZ - 2170770 - CVE-2023-0568 php: 1-byte array overrun in common path resolve code
- BZ - 2170771 - CVE-2023-0567 php: Password_verify() always return true with some hash
- BZ - 2219290 - CVE-2023-3247 php: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP
- BZ - 2229396 - CVE-2023-3823 php: XML loading external entity without being enabled
- BZ - 2230101 - CVE-2023-3824 php: phar Buffer mismanagement
- BZ - 2275058 - CVE-2024-2756 php: host/secure cookie bypass due to partial CVE-2022-31629 fix
- BZ - 2275061 - CVE-2024-3096 php: password_verify can erroneously return true, opening ATO risk
- BZ - 2291252 - CVE-2024-5458 php: Filter bypass in filter_var (FILTER_VALIDATE_URL)
- BZ - 2317049 - CVE-2024-8925 php: Erroneous parsing of multipart form data
- BZ - 2317051 - CVE-2024-8927 php: cgi.force_redirect configuration is bypassable due to the environment variable collision
- BZ - 2317144 - CVE-2024-9026 php: PHP-FPM Log Manipulation Vulnerability
CVEs
ppc64le
devspaces/udi-rhel8@sha256:04f66007d673076fe94360a51a551008f512fed2780f8ed97c33f69d1406ce8c |
s390x
devspaces/udi-rhel8@sha256:d2fd4adb8dfa441280e0eb8802f8e777285d01c2a2967e6ab3635dc84f78330a |
x86_64
devspaces/udi-rhel8@sha256:2307d71e2112d264ba07ce9fc95649f8c273ffc286840ad6410ea4e83c4ea47b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.