- Issued:
- 2024-12-19
- Updated:
- 2024-12-19
RHBA-2024:11543 - Bug Fix Advisory
Synopsis
Update JBoss Web Server 6.0 for OpenShift images to fix pam CVEs
Type/Severity
Bug Fix Advisory
Topic
This erratum covers updates to the current Red Hat JBoss Web Server 6.0 for OpenShift images to fix pam CVEs.
Description
Red Hat xPaaS provides images for many of the Red Hat Middleware products that are available for use within the OpenShift Container Platform cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments.
The current JBoss Web Server 6.0 for OpenShift images have been updated to fix the following pam CVEs:
- pam: CVE-2024-10041
- pam: CVE-2024-10963
Solution
To update to the latest JBoss Web Server 6.0.3 for OpenShift image on UBI8, perform the following steps to pull in the content:
1. On your master host(s), ensure that you are logged in to the command line interface as a cluster administrator or user who has project administrator access to the global "openshift" project:
$ oc login -u system:admin
2. Depending on the OpenJDK version, run one of the following commands to update the core JBoss Web Server 6.0 tomcat 10 OpenShift image stream in the "openshift" project:
- For OpenJDK 17: To update the core JBoss Web Server 6.0 tomcat 10 with OpenJDK 17 OpenShift image, run the following command:
$ oc -n openshift import-image jboss-webserver60-openjdk17-tomcat10-openshift-ubi8:6.0.3
- For OpenJDK 21: To update the core JBoss Web Server 6.0 tomcat 10 with OpenJDK 21 OpenShift image, run the following command:
$ oc -n openshift import-image jboss-webserver60-openjdk21-tomcat10-openshift-ubi8:6.0.3
Affected Products
- Red Hat OpenShift Container Platform 4.12 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.11 for RHEL 8 x86_64
Fixes
(none)aarch64
jboss-webserver-6/jws60-openjdk17-openshift-rhel8@sha256:bb12476cef80b48f00bbcdf2d9d5a6133aec36fcbaddf5964e59d69ed9381675 |
jboss-webserver-6/jws60-openjdk21-openshift-rhel8@sha256:2b7512b06f98f1ba56196d701b7d88623ddf6f7978566125ea441326cb13bbeb |
ppc64le
jboss-webserver-6/jws60-openjdk17-openshift-rhel8@sha256:ab371b25cb3f87c4aee53795b941d45fc3edb3c4679fce62d6cb4513b382d7c8 |
jboss-webserver-6/jws60-openjdk21-openshift-rhel8@sha256:25a191f2dccd44918f0abd96cf38657656d289ca5afc0c01faba6584c1e3bb55 |
s390x
jboss-webserver-6/jws60-openjdk17-openshift-rhel8@sha256:c81a823f590d4f152a40b2eed4052ccd51961463aae56b4022673af0212fdd0b |
jboss-webserver-6/jws60-openjdk21-openshift-rhel8@sha256:8dc65929b56084dbd12c4c5318961923718f37d58c84811903caaf75e79f053a |
x86_64
jboss-webserver-6/jws60-openjdk17-openshift-rhel8@sha256:847b3c43e3fbb23a1bea6bce0979f018a0b83d3a93e38d8dc1872ec32a00f6fa |
jboss-webserver-6/jws60-openjdk21-openshift-rhel8@sha256:6f72ca27f1e827cc092d112fab585e1ced1fc6418ffa018bb72cb08facc3312e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.