Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2024:1745 - Bug Fix Advisory
Issued:
2024-04-10
Updated:
2024-04-10

RHBA-2024:1745 - Bug Fix Advisory

  • Overview
  • Updated Images

Synopsis

updated Red Hat Enterprise Linux 9 container images

Type/Severity

Bug Fix Advisory

Topic

Updated Red Hat Enterprise Linux 9 container images are now available

Description

The Red Hat Enterprise Linux 9 container images have been updated to address the following security advisory: RHSA-2024:1688 (see References)

Users of Red Hat Enterprise Linux 9 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images.

You can find images updated by this advisory in Red Hat Container Catalog (see References).

Solution

The Red Hat Enterprise Linux 9 container images provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).

Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x

Fixes

  • BZ - 2264569 - CVE-2023-46809 nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin)
  • BZ - 2264574 - CVE-2024-22019 nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks
  • BZ - 2264582 - CVE-2024-21892 nodejs: code injection and privilege escalation through Linux capabilities
  • BZ - 2265717 - CVE-2024-21896 nodejs: path traversal by monkey-patching buffer internals
  • BZ - 2265720 - CVE-2024-21891 nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization
  • BZ - 2265722 - CVE-2024-21890 nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write
  • BZ - 2265727 - CVE-2024-22017 nodejs: setuid() does not drop all privileges due to io_uring

CVEs

  • CVE-2023-4244
  • CVE-2023-5717
  • CVE-2023-6356
  • CVE-2023-6535
  • CVE-2023-6536
  • CVE-2023-6606
  • CVE-2023-6610
  • CVE-2023-6817
  • CVE-2023-51042
  • CVE-2023-52425
  • CVE-2024-0193
  • CVE-2024-0646
  • CVE-2024-28757

References

  • https://access.redhat.com/errata/RHSA-2024:1688
  • https://access.redhat.com/containers

aarch64

rhel9/nodejs-20@sha256:87ca4134cfe66e12618c311c8e2dfe0182e06a7760aed695aafb8d9f0dd2d5d7
ubi9/nodejs-20@sha256:87ca4134cfe66e12618c311c8e2dfe0182e06a7760aed695aafb8d9f0dd2d5d7
ubi9/nodejs-20-minimal@sha256:02cbd9a3a998f1e6e17c14f00e46a67117938149061b7a2a8356f65748054136
rhel9/nodejs-20-minimal@sha256:02cbd9a3a998f1e6e17c14f00e46a67117938149061b7a2a8356f65748054136
ubi9/perl-532@sha256:53bda632cc06c8bca645a8eb8d5407abb9be747c944022089791ca6aff504e1e
rhel9/perl-532@sha256:53bda632cc06c8bca645a8eb8d5407abb9be747c944022089791ca6aff504e1e
rhel9/php-80@sha256:b7bba5bf8ac28621c1021b66e02988624f0c4b76a8f76a294a606d1cda52a234
ubi9/php-80@sha256:b7bba5bf8ac28621c1021b66e02988624f0c4b76a8f76a294a606d1cda52a234
rhel9/php-81@sha256:0150ad5b1b26fadfaf0591f4e61f33895ce3748692d63032624222122c24c020
ubi9/php-81@sha256:0150ad5b1b26fadfaf0591f4e61f33895ce3748692d63032624222122c24c020
rhel9/python-311@sha256:6bfacbe81c31bd32c3cdf9a99aa7883918b6af8d32eec6168ce403b9c5c32664
ubi9/python-311@sha256:6bfacbe81c31bd32c3cdf9a99aa7883918b6af8d32eec6168ce403b9c5c32664
ubi9/python-39@sha256:57be720afebe5663ec5e8392489bdf16fea910868bcb3e4de51d71f221efbe2a
rhel9/python-39@sha256:57be720afebe5663ec5e8392489bdf16fea910868bcb3e4de51d71f221efbe2a
ubi9/ruby-30@sha256:9bb49253d19a434e550d7f1927dbbc60261f0dc95e94caeff0749c33d8c87eab
rhel9/ruby-30@sha256:9bb49253d19a434e550d7f1927dbbc60261f0dc95e94caeff0749c33d8c87eab
ubi9/ruby-31@sha256:e6f67276f3cd1f1700ff43060517c8986123aadffc31365c3b17571460d91138
rhel9/ruby-31@sha256:e6f67276f3cd1f1700ff43060517c8986123aadffc31365c3b17571460d91138
rhel9/s2i-base@sha256:efb954ea5b51c2db99ab1be06822e90d325748ec3afd2a3aaf23012b9ccb51db
ubi9/s2i-base@sha256:efb954ea5b51c2db99ab1be06822e90d325748ec3afd2a3aaf23012b9ccb51db

ppc64le

rhel9/nodejs-20@sha256:a9ea17524ecb5b733a74a0aedf3a6fb316948ae06b8eff7da9932ff4d267862b
ubi9/nodejs-20@sha256:a9ea17524ecb5b733a74a0aedf3a6fb316948ae06b8eff7da9932ff4d267862b
ubi9/nodejs-20-minimal@sha256:4c60febff9b6c54f09ef251a6e28a4ff6fff218f129375491207e1c3a4b3dc5d
rhel9/nodejs-20-minimal@sha256:4c60febff9b6c54f09ef251a6e28a4ff6fff218f129375491207e1c3a4b3dc5d
ubi9/perl-532@sha256:00a0da9b777b836ac495a07b8c148b24bd94bee008dd37634946fe0ea7bb3c6b
rhel9/perl-532@sha256:00a0da9b777b836ac495a07b8c148b24bd94bee008dd37634946fe0ea7bb3c6b
rhel9/php-80@sha256:b85f48316f773b7eda32a29f343b644519bd55d85683503189ee1f184158d520
ubi9/php-80@sha256:b85f48316f773b7eda32a29f343b644519bd55d85683503189ee1f184158d520
rhel9/php-81@sha256:3b1628410dfd437357cb56097237e59647dc1faeb3e73b7f1146652cc3b652d5
ubi9/php-81@sha256:3b1628410dfd437357cb56097237e59647dc1faeb3e73b7f1146652cc3b652d5
rhel9/python-311@sha256:11169655323b2962a7c7a254ca2b38add9974cd01946462d33507fe25b4d4be5
ubi9/python-311@sha256:11169655323b2962a7c7a254ca2b38add9974cd01946462d33507fe25b4d4be5
ubi9/python-39@sha256:59d76312bfe9c745bf6b91282aee5039aa44b2199a4dbe5c1af7597fd8dda1c1
rhel9/python-39@sha256:59d76312bfe9c745bf6b91282aee5039aa44b2199a4dbe5c1af7597fd8dda1c1
ubi9/ruby-30@sha256:106f3f8b52cdb32d6055dc91e8ad1e189de5ee07aa6ee2eb2e917da5314bd27f
rhel9/ruby-30@sha256:106f3f8b52cdb32d6055dc91e8ad1e189de5ee07aa6ee2eb2e917da5314bd27f
ubi9/ruby-31@sha256:e961a37475ed311bec010e354ce81f5a184289bdf506835eb399cd7c821fa83a
rhel9/ruby-31@sha256:e961a37475ed311bec010e354ce81f5a184289bdf506835eb399cd7c821fa83a
rhel9/s2i-base@sha256:2b22ccfb988811394402ea78856698c42ad212c779c2ab77f65a41a25de69a76
ubi9/s2i-base@sha256:2b22ccfb988811394402ea78856698c42ad212c779c2ab77f65a41a25de69a76

s390x

rhel9/nodejs-20@sha256:23e984af9a359014ffdf46b4dff5d72c225aab6a26e9b0347414a0f339a7e40a
ubi9/nodejs-20@sha256:23e984af9a359014ffdf46b4dff5d72c225aab6a26e9b0347414a0f339a7e40a
ubi9/nodejs-20-minimal@sha256:f531d15d9227f62bf294e840251b5a1b2c95faea2939e71a35ce7b2340851e56
rhel9/nodejs-20-minimal@sha256:f531d15d9227f62bf294e840251b5a1b2c95faea2939e71a35ce7b2340851e56
ubi9/perl-532@sha256:813e1b34f6006001393d16898746af7b38fda9506550a473e0c11854b65cf301
rhel9/perl-532@sha256:813e1b34f6006001393d16898746af7b38fda9506550a473e0c11854b65cf301
rhel9/php-80@sha256:122e344d1e9f24ef972b34537f1de1b300a32fef71e567e4bd432bdabc6b03f7
ubi9/php-80@sha256:122e344d1e9f24ef972b34537f1de1b300a32fef71e567e4bd432bdabc6b03f7
rhel9/php-81@sha256:395eba15e71f9f6130dbe620193cbae0286cb93beb19c17ed19498ac9934453d
ubi9/php-81@sha256:395eba15e71f9f6130dbe620193cbae0286cb93beb19c17ed19498ac9934453d
rhel9/python-311@sha256:4325e7d7a63150094445ff1aa4ba2c8e1e9e4b3c18bb769bdeb63f1b56f87549
ubi9/python-311@sha256:4325e7d7a63150094445ff1aa4ba2c8e1e9e4b3c18bb769bdeb63f1b56f87549
ubi9/python-39@sha256:80a5ff3a9b93b1bb0219dabba8356dab3998dbb70fca32b1bfe3fb3eae5f2bc5
rhel9/python-39@sha256:80a5ff3a9b93b1bb0219dabba8356dab3998dbb70fca32b1bfe3fb3eae5f2bc5
ubi9/ruby-30@sha256:2e5db9ce95cacee003bb0992fa8d848deef21f9fa78b2db362e24d242e02cd73
rhel9/ruby-30@sha256:2e5db9ce95cacee003bb0992fa8d848deef21f9fa78b2db362e24d242e02cd73
ubi9/ruby-31@sha256:d30c698d900d924f1bf43137b21af36a2e2b8d7a05fa197ffcfbd7085cd509fc
rhel9/ruby-31@sha256:d30c698d900d924f1bf43137b21af36a2e2b8d7a05fa197ffcfbd7085cd509fc
rhel9/s2i-base@sha256:9fcd2605de6b50a670d3c32079bebc5decd5196c5d3fc865867a1fae96402ecf
ubi9/s2i-base@sha256:9fcd2605de6b50a670d3c32079bebc5decd5196c5d3fc865867a1fae96402ecf

x86_64

rhel9/nodejs-20@sha256:028b5df088b08b1a343877613e74dea21c82986264db58e67f0f43d19ba89c13
ubi9/nodejs-20@sha256:028b5df088b08b1a343877613e74dea21c82986264db58e67f0f43d19ba89c13
ubi9/nodejs-20-minimal@sha256:c8f9411cf4d0e8713ec081301c56b92389bddebdcb4c52f51b044ded1be7b6aa
rhel9/nodejs-20-minimal@sha256:c8f9411cf4d0e8713ec081301c56b92389bddebdcb4c52f51b044ded1be7b6aa
ubi9/perl-532@sha256:72909c52eb230ae6c242222bce84a27167b2bff453731ec91508f3f694ccfd08
rhel9/perl-532@sha256:72909c52eb230ae6c242222bce84a27167b2bff453731ec91508f3f694ccfd08
rhel9/php-80@sha256:2822112b1acc7a223a343b722b5b153d820da8bcbeb984b4258f27652ebbebb1
ubi9/php-80@sha256:2822112b1acc7a223a343b722b5b153d820da8bcbeb984b4258f27652ebbebb1
rhel9/php-81@sha256:b3a619bbda5999576d53e399094746d3e3c940ed816fc56f90aeae3af0ecefe3
ubi9/php-81@sha256:b3a619bbda5999576d53e399094746d3e3c940ed816fc56f90aeae3af0ecefe3
rhel9/python-311@sha256:526a3ac129953d2b658ca6df77cde212add4e9bc3cc84824cda4bb6db488be9b
ubi9/python-311@sha256:526a3ac129953d2b658ca6df77cde212add4e9bc3cc84824cda4bb6db488be9b
ubi9/python-39@sha256:5b8dd87d19a7f9e5ba0b900471f0920e109e0412fbdc49539073ed86afdadf8a
rhel9/python-39@sha256:5b8dd87d19a7f9e5ba0b900471f0920e109e0412fbdc49539073ed86afdadf8a
ubi9/ruby-30@sha256:b1d47a9bb08ff62bb8628dab954d1fa01e3dc2a163abde0bc56608eba38133bf
rhel9/ruby-30@sha256:b1d47a9bb08ff62bb8628dab954d1fa01e3dc2a163abde0bc56608eba38133bf
ubi9/ruby-31@sha256:0165a52d3abb5063ac33c99c1aeec71a3e3f239be6cd53af07b102189cbeeed5
rhel9/ruby-31@sha256:0165a52d3abb5063ac33c99c1aeec71a3e3f239be6cd53af07b102189cbeeed5
rhel9/s2i-base@sha256:987291a3a283e60d2293421dc21405082fb271db6be428aa5607f34c256f1ddc
ubi9/s2i-base@sha256:987291a3a283e60d2293421dc21405082fb271db6be428aa5607f34c256f1ddc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility